Login / Signup
Flexible and Secure Access to Computing Clusters.
Jan Meizner
Maciej Malawski
Marian Bubak
Published in:
Comput. Sci. (2010)
Keyphrases
</>
password authentication
clustering algorithm
data points
access control
lightweight
hierarchical clustering
database
data sets
data clustering
overlapping clusters
self organizing maps
cluster analysis
key management
unauthorized access
secure information sharing