IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Security in GRID Computing

Security in GRID Computing
View Sample PDF
Author(s): Eric Garcia (University of Franche-Comté, France)
Copyright: 2007
Pages: 11
Source title: Advances in Enterprise Information Technology Security
Source Author(s)/Editor(s): Djamel Khadraoui (Public Research Centre Henri Tudor, Luxembourg )and Francine Herrmann (University Paul Vertaine-Metz, France)
DOI: 10.4018/978-1-59904-090-5.ch002

Purchase

View Security in GRID Computing on the publisher's website for pricing and purchasing information.

Abstract

GRID computing implies sharing heterogeneous resources, located in different places belonging to different administrative domains over a heterogeneous network. There is a great similarity between GRID security and classical network security. Moreover, additional requirements specific to GRID environments exist. We present these security requirements and we detail various secured middleware systems. Finally, we give some examples of companies using such systems.

Related Content

Margee Hume, Paul Johnston. © 2017. 19 pages.
Jessy Nair, D. Bhanu Sree Reddy. © 2017. 27 pages.
Joseph R. Muscatello, Diane H. Parente, Matthew Swinarski. © 2017. 19 pages.
Klaus Wölfel. © 2017. 33 pages.
Rui Pedro Marques. © 2017. 21 pages.
Ebru E. Saygili, Arikan Tarik Saygili. © 2017. 17 pages.
Aparna Raman, D. P. Goyal. © 2017. 41 pages.
Body Bottom