Deceptive Detection and Security Reinforcement in Grid Computing.
Jianhua YuYue LuoXueli WangPublished in: INCoS (2013)
Keyphrases
- grid computing
- distributed computing
- load balancing
- computing resources
- grid environment
- resource management
- grid systems
- peer to peer
- resource sharing
- high performance computing
- data intensive
- computing environments
- data grids
- computational grids
- service oriented computing
- grid enabled
- scheduling strategy
- computing paradigm
- reinforcement learning
- security issues
- information security
- heterogeneous computing
- grid services
- access control
- grid technology
- transparent access
- utility computing
- grid infrastructure
- resource utilization
- distributed environment
- quality of service
- distributed systems
- digital libraries