Security in grid computing: A review and synthesis

E Cody, R Sharman, RH Rao, S Upadhyaya - Decision Support Systems, 2008 - Elsevier
This paper provides an extensive survey of the different methods of addressing security
issues in the grid computing environment, and specifically contributes to the research …

Restriction of program process capabilities

S Cooper, N Lane-Smith, J Osborne - US Patent 8,272,048, 2012 - Google Patents
This document describes systems and methods for restricting program process capabilities.
In some implementations, the capabilities are restricted by limiting the rights or privileges …

Explaining the adoption of grid computing: An integrated institutional theory and organizational capability approach

CM Messerschmidt, O Hinz - The Journal of Strategic Information Systems, 2013 - Elsevier
Grid computing can meet computational demands and offers a promising resource utilization
approach. However, little research details the drivers of and obstacles to adoption of this …

A self-organizing flock of condors

AR Butt, R Zhang, YC Hu - Proceedings of the 2003 ACM/IEEE …, 2003 - dl.acm.org
Condor provides high throughput computing by leveraging idle-cycles on off-the-shelf
desktop machines. It also supports flocking, a mechanism for sharing resources among …

Virtual computing infrastructures for nanoelectronics simulation

AB Fortes, J Figueiredo… - Proceedings of the …, 2005 - ieeexplore.ieee.org
The operational principles, components, and organization of a Grid-computing infrastructure
called In-VIGO (standing for In Virtual Information Grid Organizations) are described. In …

Distributed file system support for virtual machines in grid computing

M Zhao, J Zhang, R Figueiredo - Proceedings. 13th IEEE …, 2004 - ieeexplore.ieee.org
This paper presents a data management solution which allows fast virtual machine (VM)
instantiation and efficient run-time execution to support VMs as execution environments in …

The design and evaluation of accountable grid computing system

W Lee, A Squicciarini, E Bertino - 2009 29th IEEE International …, 2009 - ieeexplore.ieee.org
Accountability is an important aspect of any computer system. It assures that every action
executed in the system can be traced back to some entity. Accountability is even more …

Distributed file system virtualization techniques supporting on-demand virtual machine environments for grid computing

M Zhao, J Zhang, RJ Figueiredo - Cluster Computing, 2006 - Springer
This paper presents a data management solution which allows fast Virtual Machine (VM)
instantiation and efficient run-time execution to support VMs as execution environments in …

Deploying Virtual Machines as Sandboxes for the Grid.

S Santhanam, P Elango, AC Arpaci-Dusseau, M Livny - WORLDS, 2005 - usenix.org
The ability to securely run arbitrary untrusted code on a wide variety of execution platforms is
a challenging problem in the Grid community. One way to achieve this is to run the code …

Svgrid: a secure virtual environment for untrusted grid applications

X Zhao, K Borders, A Prakash - … of the 3rd international workshop on …, 2005 - dl.acm.org
Most grid security researches focus on user authentication and secure communication, the
protection of grid computers is left to the underlying operating system. Unfortunately, most …