2011
DOI: 10.1002/nem.765
|View full text |Cite
|
Sign up to set email alerts
|

An architecture and a dynamic scheduling algorithm of grid for providing security for real‐time data‐intensive applications

Abstract: SUMMARYReal-time data-intensive applications with security concerns are arising in many disciplines of science and engineering. Scheduling algorithms play an important role in the design of real-time data-intensive applications. However, conventional real-time scheduling algorithms are inappropriate to fulfill the security requirements of real-time data-intensive applications. In this paper we have proposed a security-attentive dynamic real-time scheduling algorithm named SARDIG for scheduling real-time data-i… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2012
2012
2023
2023

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 10 publications
(6 citation statements)
references
References 13 publications
0
5
0
Order By: Relevance
“…The performance of the proposed method is compared with three well-known scheduling methods of the grid environment, namely Earlier Deadline First (EDF) [29] algorithms, Security-Aware scheduling strategy for Real-time applications on Clusters (SAREC) [30] and the Security of Real-Time Data-Intensive Applications on Grids (SARDIG) [31]. Table 2 shows the simulation results of the completeness ratio for the four algorithms.…”
Section: Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…The performance of the proposed method is compared with three well-known scheduling methods of the grid environment, namely Earlier Deadline First (EDF) [29] algorithms, Security-Aware scheduling strategy for Real-time applications on Clusters (SAREC) [30] and the Security of Real-Time Data-Intensive Applications on Grids (SARDIG) [31]. Table 2 shows the simulation results of the completeness ratio for the four algorithms.…”
Section: Resultsmentioning
confidence: 99%
“…Security-aware scheduling strategy for real-time applications on clusters (SAREC) [30], proposes a security-aware scheduling strategy, or which integrates security requirements into scheduling for real-time applications by employing our security overhead model. Scheduling real-time data-intensive applications (SARDIG) is a security-attentive dynamic real-time scheduling algorithm architecture and a dynamic grid scheduling algorithm for providing security for real-time data-intensive applications [31]. It proposes a grid architecture, which describes the scheduling framework of real-time data-intensive applications.…”
Section: Background Surveymentioning
confidence: 99%
“…SAML (Security Assertion Markup Language) is used to provide authentication, attributes, and authorization information. XACML (eXtensible Access Control Markup Language) is used to define access control polices in XML [16]. XML key management specification (XKMS) is a protocol proposed as a standard maintained by the W3C.…”
Section: Security Suitementioning
confidence: 99%
“…Table III shows the consideration of standards or algorithms for the main three services like privacy, integrity and integrity with authentication. For detail and ground of this type of consideration the reader can be found in the papers [9][10][11]. To secure text type data, Diffie-Hellman key exchange scheme or digital certificates can be used to solve key management problem.…”
Section: Big Data Recommendermentioning
confidence: 99%
“…SAML (Security Assertion markup Language) is used to provide authentication, attribute and authorization information. XACML (eXtensible Access Control Markup Language) is used to define access control polices in XML [10]. XML key management specification (XKMS) is a protocol proposed as a standard maintained by the W3C.…”
Section: Big Data Recommendermentioning
confidence: 99%