Security Issues in Distributed Computing System Models
暂无分享,去创建一个
[1] Mingwen Shao,et al. Analysis on Grid Security Patterns Based on PKI , 2012 .
[2] Sheila Anand,et al. A survey on Security Issues of Reputation Management Systems for Peer-to-Peer Networks , 2012, Comput. Sci. Rev..
[3] Miguel Vargas-Lombardo,et al. Security Threats in Volunteer Computing Environments Using the Berkeley Open Infrastructure for Network Computing (BOINC) , 2012 .
[4] Meenakshi Gupta,et al. Security Requirements For Increasing Reliability In Grid Computing , 2013 .
[5] M. M. A. Hashem,et al. A Newer User Authentication, File encryption and Distributed Server Based Cloud Computing Security Architecture , 2013, ArXiv.
[6] Rajkumar Buyya,et al. Decentralization in Distributed Systems: Challenges, Technologies, and Opportunities , 2012 .
[7] N. Kshetri. Privacy and security issues in cloud computing: The role of institutions and institutional evolution , 2013 .
[8] V. Sankaranarayanan,et al. Secure Selection of Multiple Resources Based on Virtual Private Network for Computational Grids , 2011 .
[9] Ei Ei Mon,et al. The privacy-aware access control system using attribute-and role-based access control in private cloud , 2011, 2011 4th IEEE International Conference on Broadband Network and Multimedia Technology.
[10] Manoj Kumar,et al. Analysis of Different Security Issues and Attacks in Distributed System A-Review , 2013 .
[11] Eduardo B. Fernández,et al. An analysis of security issues for cloud computing , 2013, Journal of Internet Services and Applications.
[12] Yang Xiao,et al. A survey of accountability in computer networks and distributed systems , 2016, Secur. Commun. Networks.
[13] Geert Deconinck,et al. Analyzing well-known countermeasures against distributed denial of service attacks , 2012, Comput. Commun..
[14] Abhijit Belapurkar,et al. Distributed Systems Security: Issues, Processes and Solutions , 2009 .
[15] Aphrodite Tsalgatidou,et al. Taxonomy of attacks and defense mechanisms in P2P reputation systems - Lessons for reputation system designers , 2012, Comput. Sci. Rev..
[16] Alberto Montresor,et al. Security and privacy issues in P2P streaming systems: A survey , 2011, Peer-to-Peer Netw. Appl..
[17] Rolf Drechsler,et al. Enhanced Formal Verification Flow for Circuits Integrating Debugging and Coverage Analysis , 2013, Electron. Commun. Eur. Assoc. Softw. Sci. Technol..
[18] Rashmi Bhatia,et al. Grid Computing and Security Issues , 2013 .
[19] Junsheng Zhang,et al. Data Security and Privacy in Cloud Computing , 2014 .
[20] James Li,et al. A Survey of Peer-to-Peer Network Security Issues , 2008 .
[21] Ali Mili,et al. A cybersecurity model in cloud computing environments , 2013, J. King Saud Univ. Comput. Inf. Sci..
[22] Mazleena Salleh,et al. A Taxonomy and Survey of Distributed Computing Systems , 2015 .
[23] A. Kazemi,et al. Review of Grid Computing Security and Present a New Authentication Method for Improving Security , 2014 .
[24] Zhifeng Xiao,et al. Security and Privacy in Cloud Computing , 2013, IEEE Communications Surveys & Tutorials.
[25] Athanasios V. Vasilakos,et al. Security in cloud computing: Opportunities and challenges , 2015, Inf. Sci..
[26] A. Bendahmane,et al. Grid computing security mechanisms: State-of-the-art , 2009, 2009 International Conference on Multimedia Computing and Systems.
[27] Daan Broeder,et al. A data infrastructure reference model with applications: towards realization of a ScienceTube vision with a data replication service , 2013, Journal of Internet Services and Applications.
[28] Ting Yu,et al. Towards secure dataflow processing in open distributed systems , 2009, STC '09.
[29] Muttukrishnan Rajarajan,et al. A survey on security issues and solutions at different layers of Cloud computing , 2012, The Journal of Supercomputing.
[30] S. A. Edalatpanah,et al. Comparison of Cloud and Grid Computing , 2014 .
[31] Sara Jeza Alotaibi,et al. Using Fingerprint Recognition in a New Security Model for Accessing Distributed Systems , 2011 .
[32] Anoopa Arya,et al. Grid Computing: An Introduction , 2013 .
[33] Xiao Qin,et al. Security-Aware Resource Allocation for Real-Time Parallel Jobs on Homogeneous and Heterogeneous Clusters , 2008, IEEE Transactions on Parallel and Distributed Systems.
[34] Soumya Mathew,et al. Securing Cloud from Attacks based on Intrusion Detection System , 2012 .
[35] Mário M. Freire,et al. Security issues in cloud environments: a survey , 2014, International Journal of Information Security.
[36] Geoff Holmes,et al. Security and Data Accountability in Distributed Systems: A Provenance Survey , 2013, 2013 IEEE 10th International Conference on High Performance Computing and Communications & 2013 IEEE International Conference on Embedded and Ubiquitous Computing.
[37] Alptekin Küpçü,et al. Single password authentication , 2013, Comput. Networks.
[38] Anirban Chakrabarti. Taxonomy of Grid Security Issues , 2007 .
[39] Sugata Sanyal,et al. Secure Authentication of Cloud Data Mining API , 2013, ArXiv.
[40] Abdul Ghafoor Abbasi,et al. Cloud Based Secure and Privacy Enhanced Authentication & Authorization Protocol , 2013, KES.
[41] Mohamed Firdhous. Implementation of Security in Distributed Systems - A Comparative Study , 2012, ArXiv.
[42] K. G. Srinivasa,et al. Guide to High Performance Distributed Computing , 2015, Computer Communications and Networks.
[43] Hristo Koshutanski,et al. A Survey on Distributed Access Control Systems for Web Business Processes , 2009, Int. J. Netw. Secur..
[44] Guillaume Pierre,et al. Challenges in very large distributed systems , 2011, Journal of Internet Services and Applications.
[45] Saurabh Maheshwari,et al. Security Issues in Grid Computing , 2014 .
[46] Martin Gilje Jaatun,et al. Beyond lightning: A survey on security challenges in cloud computing , 2013, Comput. Electr. Eng..
[47] Samee Ullah Khan,et al. > REPLACE THIS LINE WITH YOUR PAPER IDENTIFICATION NUMBER (DOUBLE-CLICK HERE TO EDIT) < 1 , 2008 .
[48] Saman Taghavi Zargar,et al. A Survey of Defense Mechanisms Against Distributed Denial of Service (DDoS) Flooding Attacks , 2013, IEEE Communications Surveys & Tutorials.
[49] Amr Farouk,et al. Authentication mechanisms in grid computing environment: Comparative study , 2012, 2012 International Conference on Engineering and Technology (ICET).
[50] Rayford B. Vaughn,et al. Cluster Security Research Involving the Modeling of Network Exploitations Using Exploitation Graphs , 2006 .
[51] V. Kavitha,et al. A survey on security issues in service delivery models of cloud computing , 2011, J. Netw. Comput. Appl..
[52] Ben Y. Zhao,et al. Securing Structured Overlays against Identity Attacks , 2009, IEEE Transactions on Parallel and Distributed Systems.
[53] Dimitrios Zissis,et al. Addressing cloud computing security issues , 2012, Future Gener. Comput. Syst..
[54] Siani Pearson,et al. Toward Accountability in the Cloud , 2011, IEEE Internet Computing.
[55] H. Raghav Rao,et al. Security in grid computing: A review and synthesis , 2008, Decis. Support Syst..
[56] Rajesh Kumar Tiwari,et al. Addressing Security Challenges in Cloud Computing , 2013, ArXiv.
[57] M. Kannan,et al. A Study on System Virtualization Techniques , 2014 .
[58] Eduardo Gómez-Sánchez,et al. Cloud computing and education: A state-of-the-art survey , 2015, Comput. Educ..
[59] Heinrich Theodor Vierhaus,et al. Design and Test Technology for Dependable Systems-on-Chip , 2010 .
[60] Jaspher W. Kathrine,et al. Cloud Security Mechanisms for Data Protection: A Survey , 2014, MUE 2014.
[61] Sudhansu Ranjan Lenka,et al. Enhancing Data Security in Cloud Computing Using RSA Encryption and MD5 Algorithm , 2014 .
[62] Rini Mahajan,et al. Cloud Computing Issues , 2005 .
[63] Naidila Sadashiv,et al. Cluster, grid and cloud computing: A detailed comparison , 2011, 2011 6th International Conference on Computer Science & Education (ICCSE).
[64] Garima Gupta,et al. A Survey on Cloud Security Issues and Techniques , 2014, RCIS 2014.
[65] Yi Ding,et al. Network security for virtual machine in cloud computing , 2010, 5th International Conference on Computer Sciences and Convergence Information Technology.