Enhancing HPC security with a user-based firewall

A Prout, W Arcand, D Bestor, B Bergeron… - 2016 IEEE High …, 2016 - ieeexplore.ieee.org
High Performance Computing (HPC) systems traditionally allow their users unrestricted use
of their internal network. While this network is normally controlled enough to guarantee …

[PDF][PDF] Optimizing tunneled grid connectivity across firewalls

J Tan, D Abramson, C Enticott - Proceedings of the Seventh …, 2009 - researchgate.net
Grids today generally assume that concurrent network connections are possible among
many processors attached to high-capacity networks. However, inter-network boundaries …

Autonomic computing: implementing the vision

A Ganek - International Workshop on Active Middleware Services, 2003 - computer.org
Computational grids are now mainstream facilities for e-research worldwide. While
enterprise grids exist within organizations, national grids have become common, usually …

Adapting grid applications to safety using fault-tolerant methods: Design, implementation and evaluations

X Shi, JL Pazat, E Rodriguez, H **, H Jiang - Future Generation Computer …, 2010 - Elsevier
Grid applications have been prone to encountering problems such as failures or malicious
attacks during execution in recent years, due to their distributed and large-scale features …

Authentication of remote host via closed ports

JB Jennings, K Kekessie - US Patent 8,826,014, 2014 - Google Patents
The present invention addresses the deficiencies of the art in respect to authentication and
provides a novel and non obvious method, system and apparatus for authenticating a client …

REMUS: a rerouting and multiplexing system for Grid connectivity across firewalls

J Tan, D Abramson, C Enticott - Journal of Grid Computing, 2009 - Springer
The Grid provides unique opportunities for high-performance computing through distributed
applications that execute over multiple remote resources. Participating institutions can form …

TCP-AuthN: TCP inline authentication to enhance network security in Grid environments

J Wiebelitz, C Kunz, S Piger… - 2009 Eighth International …, 2009 - ieeexplore.ieee.org
To secure communication in Grids many efforts have been made regarding authentication
and authorization. Due to some application requirements it is up to now recommended to …

Secure service-oriented grid computing with public virtual worker nodes

M Schmidt, N Fallenbeck, M Smith… - 2009 35th Euromicro …, 2009 - ieeexplore.ieee.org
Cloud computing uses virtualization technologies to offer a non-shared use rental of
computer resources with publicly accessible worker nodes. However, unlike grid computing …

Method of unblocking external computer systems in a computer network infrastructure, distributed computer network having such a computer network infrastructure as …

HJ Claes, A Hosfeld - US Patent 10,313,305, 2019 - Google Patents
METHOD OF UNBLOCKING EXTERNAL complicated or even impossible, because the
external com COMPUTER SYSTEMS IN A COMPUTER puter system may be secured per se …

Transparent identity-based firewall transition for eScience

J Wiebelitz, S Piger, C Kunz… - 2009 5th IEEE …, 2009 - ieeexplore.ieee.org
As new concepts for eSciene like grid computing and cloud computing tend to leave the
research phase and develop towards production quality, the security eventually moves into …