The platform will undergo maintenance on Sep 14 at about 7:45 AM EST and will be unavailable for approximately 2 hours.
2011
DOI: 10.1002/cpe.1850
|View full text |Cite
|
Sign up to set email alerts
|

Security‐aware scheduling model for computational grid

Abstract: SUMMARY Grid applications with stringent security requirements introduce challenging concerns because the schedule devised by nonsecurity‐aware scheduling algorithms may suffer in scheduling security constraints tasks. To make security‐aware scheduling, estimation and quantification of security overhead is necessary. The proposed model quantifies security, in the form of security levels, on the basis of the negotiated cipher suite between task and the grid‐node and incorporates it into existing heuristics MinM… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
11
0

Year Published

2013
2013
2020
2020

Publication Types

Select...
4
2
1

Relationship

1
6

Authors

Journals

citations
Cited by 14 publications
(18 citation statements)
references
References 29 publications
0
11
0
Order By: Relevance
“…It is expected that all submitted tasks to the system must be scheduled and all nodes of the system can be used. Above parameters are also used in [4,12,14].…”
Section: Experimental Evaluations and Resultsmentioning
confidence: 99%
See 2 more Smart Citations
“…It is expected that all submitted tasks to the system must be scheduled and all nodes of the system can be used. Above parameters are also used in [4,12,14].…”
Section: Experimental Evaluations and Resultsmentioning
confidence: 99%
“…Both these paper considers load distribution and load variation among the nodes in CG. In [12], fault tolerance aware scheduling for independent tasks using GA is discussed. In this paper we modify the work of [12] by incorporating dependencies between tasks.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Also, the comparative study reveals that the proposed model has an edge over other contemporary models viz. Min-Min, Max-Min, HEFT and EAMM for energy optimization [17,23,24,25,33].…”
Section: Related Workmentioning
confidence: 99%
“…The future work will consider the resource scheduling problem with consideration on some other QoS parameters such as reliability, perform-ability and security [23] etc. Also, in all the proposed work, at a time only one parameter has been considered.…”
Section: Conclusion and Future Scopementioning
confidence: 99%