Abstract
Security management is a major issue in grid computing systems. One approach to provide security is to implement techniques such as encryption and access control on all grid elements. The overhead generated by such an approach may however limit the advantages of grid computing systems; particularly, when the network experiences different types of variations. This paper examines the integration of the notion of adaptive grid service along with security management and accounting. It also provides a fault tolerance technique to build grid systems that are intrusion tolerant.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Casanova, W., Cirne, H., Dail, M., Faerman, S., Figueira, J., Hayes, G., Obertelli, J., Schopf, G., Shao, S., Smallen, N., Spring, A., Su, A., Zagorodnov, D.: Adaptive computing on the Grid using AppleS. IEEE Transactions on parallel and distributed systems 14(4), 369–382 (2003)
Song, S., Hwang, K.: Dynamic Grid security with trust integration and optimized resource allocation. In: Int. Symp. On High-performance distributed computing, Honolulu, June 4-6 (2004)
Butt, A., Adabala, S., Kapadia, N., Figueiredo, R., Fortes, J.: Fine-grain access control for securing shared resources in computational Grids. In: 2002 Proc. Int. Parallel and distributed processing symposium (IPDPS 2002), April 2002, pp. 159–165 (2002)
Azzedin, F., Maheswaran, M.: Towards trusted-aware resource management in Grid computing systems. In: Proc. 2nd IEEE/ACM Int. Symp. on cluster computing and the Grid (2002)
Czajkowski, K., Foster, I., Kesselman, C.: Resource co-allocation in computational Grids. In: Proc. 8th IEEE Int. Symp. on high-performance distributed computing (HPDC-8), pp. 219–228 (1999)
Gefen, D., Rao, V.S., Tractinsky, N.: The conceptualization of trust, risk, and their relationships in e-commerce. In: Proc. 36th Hawaii Int. Conf. on System science (HICSS 2003) (2003)
Foster, I., Kesselman, C., Tuecke, S.: The anatomy of the Grid: Enabling scalable virtual organizations. Int J. Supercomputer applications (2001)
Abdelkader, M., Boudriga, N.: Intrusion Tolerant GRID in Ad-Hoc Networks. In: 12th IEEE International Conference on Electronics, Circuits and Systems, ICECS 2005, Tunis, December 11-14 (2005)
Liu, R., Lloyd, E.L.: A Distributed Protocol For Adaptive Link Scheduling in Ad-hoc Networks. In: Proc. of IASTED Int. Conf. on Wireless and Optical Comm (WOC 2001) (2001)
Tewari, H., O’Mahony, D.: Multiparty Micropayments for Ad Hoc Networks. In: IEEE Wireless Communications and Networking Conference, WCNC 2003 (2003)
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 2008 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Abdelkader, M., Boudriga, N., Obaidat, M.S. (2008). SAGA: An Adaptive Infrastructure for Secure Available GRID on Ad-Hoc Networks. In: Filipe, J., Obaidat, M.S. (eds) E-Business and Telecommunication Networks. ICETE 2006. Communications in Computer and Information Science, vol 9. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-70760-8_2
Download citation
DOI: https://doi.org/10.1007/978-3-540-70760-8_2
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-70759-2
Online ISBN: 978-3-540-70760-8
eBook Packages: Computer ScienceComputer Science (R0)