2007
DOI: 10.1016/j.jpdc.2007.06.004
|View full text |Cite
|
Sign up to set email alerts
|

Performance evaluation of a new scheduling algorithm for distributed systems with security heterogeneity

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
18
0

Year Published

2011
2011
2019
2019

Publication Types

Select...
3
3
3

Relationship

0
9

Authors

Journals

citations
Cited by 40 publications
(23 citation statements)
references
References 26 publications
(30 reference statements)
0
18
0
Order By: Relevance
“…Xie and Qin [14] built three security overhead models for measuring execution time incurred by the security-critical tasks in clusters. Also the performance evaluations of security heterogeneity scheduling algorithm were studied in distributed computing systems [16]. Tang et al [17] used the differential equation to build system node trust model and proposed a security-driven scheduling architecture for directed acyclic graph (DAG) applications.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Xie and Qin [14] built three security overhead models for measuring execution time incurred by the security-critical tasks in clusters. Also the performance evaluations of security heterogeneity scheduling algorithm were studied in distributed computing systems [16]. Tang et al [17] used the differential equation to build system node trust model and proposed a security-driven scheduling architecture for directed acyclic graph (DAG) applications.…”
Section: Related Workmentioning
confidence: 99%
“…This is due to the fact that the coefficient of Poisson probability distribution can be seen as the arrival rate of malicious attacks. Thus, the risk probability of a task with single security service can be represented by an exponential distribution [16,17]:…”
Section: Workload Shaping With Security Guaranteementioning
confidence: 99%
“…Jhawar et al [5] model the security requirements of an application as additional constraints and present a greedy heuristic to perform VM allocation in cloud computing and minimize energy consumption. Similarly, Xie et al [6] and Xiong et al [7] define heuristics that balance security and performance.…”
Section: Related Workmentioning
confidence: 99%
“…[12] researched on scheduling algorithms for independent jobs over grid computing environments, and proposed a space-time genetic strategy. In [13], authors proposed a task assignment algorithm for heterogeneous distributed security-critical systems. A communication mechanism that maximizes the security protection of the internal communication in distributed real-time systems is presented in [14].…”
Section: Related Workmentioning
confidence: 99%