Integrating Security Requirements into Scheduling for Real-Time Applications in Grid Computing.
Andrew H. SungXiao QinTao XiePublished in: GCA (2005)
Keyphrases
- grid computing
- security requirements
- timing constraints
- real time
- scheduling strategy
- computational grids
- grid environment
- distributed computing
- resource utilization
- real time systems
- utility computing
- real time database systems
- load balancing
- heterogeneous computing
- resource management
- security analysis
- security policies
- scheduling algorithm
- smart card
- information security
- access control
- security properties
- software architecture
- resource sharing
- peer to peer
- resource allocation
- round robin
- security mechanisms
- low cost
- concurrency control
- computing environments
- databases
- distributed systems
- service oriented
- cloud computing
- web services
- quality of service