Towards a Security Model to Bridge Internet Desktop Grids and Service Grids

Author(s):  
Gabriel Caillat ◽  
Oleg Lodygensky ◽  
Etienne Urbah ◽  
Gilles Fedak ◽  
Haiwu He
2008 ◽  
Vol 18 (03) ◽  
pp. 433-445 ◽  
Author(s):  
ZOLTAN BALATON ◽  
ZOLTAN FARKAS ◽  
GABOR GOMBAS ◽  
PETER KACSUK ◽  
ROBERTO LOVAS ◽  
...  

Service grids and desktop grids are both promoted by their supportive communities as great solutions for solving the available compute power problem and helping to balance loads across network systems. Little work, however, has been undertaken to blend these two technologies together. In this paper we introduce a new EU project, that is building technological bridges to facilitate service and desktop grid interoperability. We provide a taxonomy and background into service grids, such as EGEE and desktop grids or volunteer computing platforms, such as BOINC and XtremWeb. We then describe our approach for identifying translation technologies between service and desktop grids. The individual themes discuss the actual bridging technologies employed and the distributed data issues surrounding deployment.


Author(s):  
Gilles Fedak ◽  
Haiwu He ◽  
Oleg Lodygensky ◽  
Zoltan Balaton ◽  
Zoltan Farkas ◽  
...  
Keyword(s):  

Author(s):  
Curtis G. Northcutt

The recent proliferation of embedded cyber components in modern physical systems [1] has generated a variety of new security risks which threaten not only cyberspace, but our physical environment as well. Whereas earlier security threats resided primarily in cyberspace, the increasing marriage of digital technology with mechanical systems in cyber-physical systems (CPS), suggests the need for more advanced generalized CPS security measures. To address this problem, in this paper we consider the first step toward an improved security model: detecting the security attack. Using logical truth tables, we have developed a generalized algorithm for intrusion detection in CPS for systems which can be defined over discrete set of valued states. Additionally, a robustness algorithm is given which determines the level of security of a discrete-valued CPS against varying combinations of multiple signal alterations. These algorithms, when coupled with encryption keys which disallow multiple signal alteration, provide for a generalized security methodology for both cyber-security and cyber-physical systems.


2020 ◽  
Vol 46 (7) ◽  
pp. 443-453
Author(s):  
P. N. Devyanin ◽  
A. V. Khoroshilov ◽  
V. V. Kuliamin ◽  
A. K. Petrenko ◽  
I. V. Shchepetkov

2021 ◽  
Author(s):  
Thilo Krachenfels ◽  
Fatemeh Ganji ◽  
Amir Moradi ◽  
Shahin Tajik ◽  
Jean-Pierre Seifert
Keyword(s):  

Sign in / Sign up

Export Citation Format

Share Document