Rootkits: Subverting the Windows Kernel
Rootkits: Subverting the Windows Kernel
Security Issues in On-Demand Grid and Cluster Computing
CCGRID '06 Proceedings of the Sixth IEEE International Symposium on Cluster Computing and the Grid
Clusters and security: distributed security for distributed systems
CCGRID '05 Proceedings of the Fifth IEEE International Symposium on Cluster Computing and the Grid - Volume 01
Hi-index | 0.01 |
Cluster system can be considered as a solution when high performance system is deployed because cluster system can provide the high performance, mass storage, scalability and so on with relative low cost in comparison with super computer system. For the trusted service against various malicious attacks, the trusted operational environment is very critical in order to guarantee that their services are not compromised and then secure. This can be done by providing the integrity with cluster system. Since most of cluster system consists of many nodes, the user interface is needed for the efficient and convenient management. This paper introduces the management interface for cluster system integrity. The management interface manages the booting status of each cluster node and the integrity of software to be provisioned. Management interface consists of management agent that interacts with each node to request and receive management information and Web-based GUI interface for cluster manager. The manager can manage the integrity of cluster system conveniently and efficiently in a consistent way with this interface.