A security architecture for computational grids
CCS '98 Proceedings of the 5th ACM conference on Computer and communications security
In VINI veritas: realistic and controlled network experimentation
Proceedings of the 2006 conference on Applications, technologies, architectures, and protocols for computer communications
A batch scheduler with high level components
CCGRID '05 Proceedings of the Fifth IEEE International Symposium on Cluster Computing and the Grid (CCGrid'05) - Volume 2 - Volume 02
ISORC '07 Proceedings of the 10th IEEE International Symposium on Object and Component-Oriented Real-Time Distributed Computing
Towards virtual networks for virtual machine grid computing
VM'04 Proceedings of the 3rd conference on Virtual Machine Research And Technology Symposium - Volume 3
Flexible and Efficient Workflow Deployment of Data-Intensive Applications On Grids With MOTEUR
International Journal of High Performance Computing Applications
Accountable internet protocol (aip)
Proceedings of the ACM SIGCOMM 2008 conference on Data communication
Performance evaluation of grid-enabled registration algorithms using bronze-standards
MICCAI'06 Proceedings of the 9th international conference on Medical Image Computing and Computer-Assisted Intervention - Volume Part II
VIOLIN: virtual internetworking on overlay infrastructure
ISPA'04 Proceedings of the Second international conference on Parallel and Distributed Processing and Applications
Private virtual cluster: infrastructure and protocol for instant grids
Euro-Par'06 Proceedings of the 12th international conference on Parallel Processing
Specifying and provisioning virtual infrastructures with HIPerNET
International Journal of Network Management
Parallel arithmetic encryption for high-bandwidth communications on multicore/GPGPU platforms
Proceedings of the 4th International Workshop on Parallel and Symbolic Computation
Joint Elastic Cloud and Virtual Network Framework for Application Performance-cost Optimization
Journal of Grid Computing
Hi-index | 0.00 |
With the expansion and the convergence of computing and communication, the dynamic provisioning of customized processing and networking infrastructures as well as resource virtualization are appealing concepts and technologies. Therefore, new models and tools are needed to allow users to create, trust and exploit such on-demand virtual infrastructures within wide area distributed environments. This paper proposes to combine network and system virtualization with cryptographic identification and SPKI/HIP principles to help the user communities to build and share their own resource reservoirs. These ideas are implemented in the HIPerNet framework enabling the creation and the management of customized confined execution environments in a large scale context. Based on the example of biomedical applications, the paper focuses on the security model of the HIPerNet system and develops the key aspects of our distributed security approach. Then the paper discusses and illustrates how HIPerNet solutions fulfill the security requirements of applications through different scenarios.