A two-phase scheduling strategy for real-time applications with security requirements on heterogeneous clusters.
Xiaomin ZhuPeizhong LuPublished in: Comput. Electr. Eng. (2009)
Keyphrases
- security requirements
- scheduling strategy
- real time
- timing constraints
- security analysis
- security properties
- scheduling algorithm
- security policies
- smart card
- security mechanisms
- information security
- access control
- real time systems
- round robin
- grid computing
- software architecture
- development lifecycle
- quality of service
- security protocols
- relational databases
- artificial intelligence
- databases