Keyphrases
- security threats
- security issues
- grid environment
- security mechanisms
- scheduling problem
- grid computing
- data driven
- scheduling algorithm
- resource constraints
- information security
- data mining applications
- round robin
- security requirements
- real time database systems
- flexible manufacturing systems
- access control
- data grids
- security problems
- computational grids
- security systems
- rfid tags
- resource utilization
- data mining
- resource management
- information sharing
- resource allocation
- intrusion detection
- information systems