Proceedings of the 2008 C3S2E conference
Autonomic specification of self-protection for distributed MARF with ASSL
C3S2E '09 Proceedings of the 2nd Canadian Conference on Computer Science and Software Engineering
Choosing best algorithm combinations for speech processing tasks in machine learning using MARF
Canadian AI'08 Proceedings of the Canadian Society for computational studies of intelligence, 21st conference on Advances in artificial intelligence
Simple dynamic key management in SQL randomization
NTMS'09 Proceedings of the 3rd international conference on New technologies, mobility and security
Evolution of MARF and its NLP framework
Proceedings of the Third C* Conference on Computer Science and Software Engineering
Transactions on Computational Science XV
Hi-index | 0.00 |
This work highlights and takes aim at the most critical security aspects required for two different types of distributed systems for scientific computation. It covers two open-source systems written in Java: a demand-driven system - General Intensional Programming System (GIPSY) and a pipelined system - Distributed Modular Audio Recognition Framework (DMARF), which are the distributed scientific computational engines used as case studies with respect to the security aspects. More specific goals include data/demand integrity, data/demand origin authentication, confidentiality, high availability, and malicious code detection. We address some of the goals to a degree, some with the Java Data Security Framework (JDSF) as a work-in- progress.