Overview of security considerations for computational and data grids
Large-scale science and engineering is frequently done through the interaction of collaborating groups, heterogeneous computing resources, information systems, and instruments, all of which are geographically and organizationally dispersed. The overall motivation for "Grids" is to enable t...
Gespeichert in:
Hauptverfasser: | , , |
---|---|
Format: | Tagungsbericht |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 440 |
---|---|
container_issue | |
container_start_page | 439 |
container_title | |
container_volume | |
creator | Johnston, W.E. Jackson, K.R. Talwar, S. |
description | Large-scale science and engineering is frequently done through the interaction of collaborating groups, heterogeneous computing resources, information systems, and instruments, all of which are geographically and organizationally dispersed. The overall motivation for "Grids" is to enable the routine interactions of these resources to enhance this type of large-scale science and engineering, and thus substantially increase the computing and data handling capabilities available to science and engineering projects. However, even if this environment works in every other way, it will not be viable if it is constantly disrupted by hackers and their kin. Distributed applications are potentially more vulnerable than conventional scientific problem solving environments because there are substantially more targets to attack in order to impact a single application. Much of the overall security of Grids is inherited from the security of the underlying systems. There are, however, some security considerations at the Grid level that are independent of the underlying systems, and we focus on this latter aspect. |
doi_str_mv | 10.1109/HPDC.2001.945216 |
format | Conference Proceeding |
fullrecord | <record><control><sourceid>proquest_6IE</sourceid><recordid>TN_cdi_ieee_primary_945216</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>945216</ieee_id><sourcerecordid>31676954</sourcerecordid><originalsourceid>FETCH-LOGICAL-i234t-f4eaa654eb41279682262580a530dae5fe93291cb94164f21c01c4b1488391673</originalsourceid><addsrcrecordid>eNqFkL1PwzAQxS0BEqV0R0ye2FJ854_EI2qBIlUqA8yRk1yQUdoUOynqf49F2bnlTk8_Pb13jN2AmAMIe796XS7mKATMrdII5oxdidxYDWhNcc4mIArMCivySzaL8VOkUVpZNBO23BwoHDx9877lkeox-OHI634XfUPBDT5dvO1Dkrb7cfgVXMfdruGNGxz_CL6J1-yidV2k2d-esvenx7fFKltvnl8WD-vMo1RD1ipyzmhFlQLMUzREg7oQTkvRONItWYkW6soqMKpFqAXUqgJVFNKCyeWU3Z1896H_GikO5dbHmrrO7agfYykTlGqrf0HMhbTJMIG3J9ATUbkPfuvCsTx9Uf4AUAJkwg</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype><pqid>27039673</pqid></control><display><type>conference_proceeding</type><title>Overview of security considerations for computational and data grids</title><source>IEEE Electronic Library (IEL) Conference Proceedings</source><creator>Johnston, W.E. ; Jackson, K.R. ; Talwar, S.</creator><creatorcontrib>Johnston, W.E. ; Jackson, K.R. ; Talwar, S.</creatorcontrib><description>Large-scale science and engineering is frequently done through the interaction of collaborating groups, heterogeneous computing resources, information systems, and instruments, all of which are geographically and organizationally dispersed. The overall motivation for "Grids" is to enable the routine interactions of these resources to enhance this type of large-scale science and engineering, and thus substantially increase the computing and data handling capabilities available to science and engineering projects. However, even if this environment works in every other way, it will not be viable if it is constantly disrupted by hackers and their kin. Distributed applications are potentially more vulnerable than conventional scientific problem solving environments because there are substantially more targets to attack in order to impact a single application. Much of the overall security of Grids is inherited from the security of the underlying systems. There are, however, some security considerations at the Grid level that are independent of the underlying systems, and we focus on this latter aspect.</description><identifier>ISSN: 1082-8907</identifier><identifier>ISBN: 0769512968</identifier><identifier>ISBN: 9780769512969</identifier><identifier>DOI: 10.1109/HPDC.2001.945216</identifier><language>eng</language><publisher>IEEE</publisher><subject>Collaboration ; Computer hacking ; Data engineering ; Data handling ; Data security ; Grid computing ; Information security ; Information systems ; Instruments ; Large-scale systems</subject><ispartof>Proceedings 10th IEEE International Symposium on High Performance Distributed Computing, 2001, p.439-440</ispartof><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/945216$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>309,310,780,784,789,790,2056,25139,27924,54919</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/945216$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Johnston, W.E.</creatorcontrib><creatorcontrib>Jackson, K.R.</creatorcontrib><creatorcontrib>Talwar, S.</creatorcontrib><title>Overview of security considerations for computational and data grids</title><title>Proceedings 10th IEEE International Symposium on High Performance Distributed Computing</title><addtitle>HPDC</addtitle><description>Large-scale science and engineering is frequently done through the interaction of collaborating groups, heterogeneous computing resources, information systems, and instruments, all of which are geographically and organizationally dispersed. The overall motivation for "Grids" is to enable the routine interactions of these resources to enhance this type of large-scale science and engineering, and thus substantially increase the computing and data handling capabilities available to science and engineering projects. However, even if this environment works in every other way, it will not be viable if it is constantly disrupted by hackers and their kin. Distributed applications are potentially more vulnerable than conventional scientific problem solving environments because there are substantially more targets to attack in order to impact a single application. Much of the overall security of Grids is inherited from the security of the underlying systems. There are, however, some security considerations at the Grid level that are independent of the underlying systems, and we focus on this latter aspect.</description><subject>Collaboration</subject><subject>Computer hacking</subject><subject>Data engineering</subject><subject>Data handling</subject><subject>Data security</subject><subject>Grid computing</subject><subject>Information security</subject><subject>Information systems</subject><subject>Instruments</subject><subject>Large-scale systems</subject><issn>1082-8907</issn><isbn>0769512968</isbn><isbn>9780769512969</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2001</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><sourceid>RIE</sourceid><recordid>eNqFkL1PwzAQxS0BEqV0R0ye2FJ854_EI2qBIlUqA8yRk1yQUdoUOynqf49F2bnlTk8_Pb13jN2AmAMIe796XS7mKATMrdII5oxdidxYDWhNcc4mIArMCivySzaL8VOkUVpZNBO23BwoHDx9877lkeox-OHI634XfUPBDT5dvO1Dkrb7cfgVXMfdruGNGxz_CL6J1-yidV2k2d-esvenx7fFKltvnl8WD-vMo1RD1ipyzmhFlQLMUzREg7oQTkvRONItWYkW6soqMKpFqAXUqgJVFNKCyeWU3Z1896H_GikO5dbHmrrO7agfYykTlGqrf0HMhbTJMIG3J9ATUbkPfuvCsTx9Uf4AUAJkwg</recordid><startdate>20010101</startdate><enddate>20010101</enddate><creator>Johnston, W.E.</creator><creator>Jackson, K.R.</creator><creator>Talwar, S.</creator><general>IEEE</general><scope>6IE</scope><scope>6IL</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIL</scope><scope>7SC</scope><scope>8FD</scope><scope>JQ2</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope></search><sort><creationdate>20010101</creationdate><title>Overview of security considerations for computational and data grids</title><author>Johnston, W.E. ; Jackson, K.R. ; Talwar, S.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-i234t-f4eaa654eb41279682262580a530dae5fe93291cb94164f21c01c4b1488391673</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2001</creationdate><topic>Collaboration</topic><topic>Computer hacking</topic><topic>Data engineering</topic><topic>Data handling</topic><topic>Data security</topic><topic>Grid computing</topic><topic>Information security</topic><topic>Information systems</topic><topic>Instruments</topic><topic>Large-scale systems</topic><toplevel>online_resources</toplevel><creatorcontrib>Johnston, W.E.</creatorcontrib><creatorcontrib>Jackson, K.R.</creatorcontrib><creatorcontrib>Talwar, S.</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE Electronic Library (IEL)</collection><collection>IEEE Proceedings Order Plans (POP All) 1998-Present</collection><collection>Computer and Information Systems Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Johnston, W.E.</au><au>Jackson, K.R.</au><au>Talwar, S.</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>Overview of security considerations for computational and data grids</atitle><btitle>Proceedings 10th IEEE International Symposium on High Performance Distributed Computing</btitle><stitle>HPDC</stitle><date>2001-01-01</date><risdate>2001</risdate><spage>439</spage><epage>440</epage><pages>439-440</pages><issn>1082-8907</issn><isbn>0769512968</isbn><isbn>9780769512969</isbn><abstract>Large-scale science and engineering is frequently done through the interaction of collaborating groups, heterogeneous computing resources, information systems, and instruments, all of which are geographically and organizationally dispersed. The overall motivation for "Grids" is to enable the routine interactions of these resources to enhance this type of large-scale science and engineering, and thus substantially increase the computing and data handling capabilities available to science and engineering projects. However, even if this environment works in every other way, it will not be viable if it is constantly disrupted by hackers and their kin. Distributed applications are potentially more vulnerable than conventional scientific problem solving environments because there are substantially more targets to attack in order to impact a single application. Much of the overall security of Grids is inherited from the security of the underlying systems. There are, however, some security considerations at the Grid level that are independent of the underlying systems, and we focus on this latter aspect.</abstract><pub>IEEE</pub><doi>10.1109/HPDC.2001.945216</doi><tpages>2</tpages></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | ISSN: 1082-8907 |
ispartof | Proceedings 10th IEEE International Symposium on High Performance Distributed Computing, 2001, p.439-440 |
issn | 1082-8907 |
language | eng |
recordid | cdi_ieee_primary_945216 |
source | IEEE Electronic Library (IEL) Conference Proceedings |
subjects | Collaboration Computer hacking Data engineering Data handling Data security Grid computing Information security Information systems Instruments Large-scale systems |
title | Overview of security considerations for computational and data grids |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-11T23%3A23%3A00IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_6IE&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=Overview%20of%20security%20considerations%20for%20computational%20and%20data%20grids&rft.btitle=Proceedings%2010th%20IEEE%20International%20Symposium%20on%20High%20Performance%20Distributed%20Computing&rft.au=Johnston,%20W.E.&rft.date=2001-01-01&rft.spage=439&rft.epage=440&rft.pages=439-440&rft.issn=1082-8907&rft.isbn=0769512968&rft.isbn_list=9780769512969&rft_id=info:doi/10.1109/HPDC.2001.945216&rft_dat=%3Cproquest_6IE%3E31676954%3C/proquest_6IE%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=27039673&rft_id=info:pmid/&rft_ieee_id=945216&rfr_iscdi=true |