2008 International Symposium on Parallel and Distributed Computing 2008
DOI: 10.1109/ispdc.2008.52
|View full text |Cite
|
Sign up to set email alerts
|

Towards Security Hardening of Scientific Demand-Driven and Pipelined Distributed Computing Systems

Abstract: This work highlights and takes aim at the most critical security aspects required for two different types of distributed systems for scientific computation. It covers two open-source systems written in Java: a demand-driven system -General Intensional Programming System (GIPSY) and a pipelined system -Distributed Modular Audio Recognition Framework (DMARF), which are the distributed scientific computational engines used as case studies with respect to the security aspects. More specific goals include data/dema… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
13
0

Year Published

2008
2008
2012
2012

Publication Types

Select...
5
3

Relationship

5
3

Authors

Journals

citations
Cited by 17 publications
(13 citation statements)
references
References 13 publications
0
13
0
Order By: Relevance
“…Some scripting aspects of MARF applications are also formally proposed in Mokhov (2008f). Additionally, another frontier of the MARF's use in security is explored in Mokhov (2008e); Mokhov, Huynh, Li & Rassai (2007) as well as the digital forensics aspects that are discussed for various needs of forensic file type analysis, conversion of the MARF's internal data structures as MARFL expressions into the Forensic Lucid language for follow up forensic analysis, self-forensic analysis of MARF, and writer identification of hand-written digitized documents described in Mokhov (2008b); Mokhov & Debbabi (2008); Mokhov et al (2009); Mokhov & Vassev (2009c). Furthermore, we have a use case and applicability of MARF's algorithms for various multimedia tasks, e.g.…”
Section: Our Approach and Accomplishmentsmentioning
confidence: 99%
“…Some scripting aspects of MARF applications are also formally proposed in Mokhov (2008f). Additionally, another frontier of the MARF's use in security is explored in Mokhov (2008e); Mokhov, Huynh, Li & Rassai (2007) as well as the digital forensics aspects that are discussed for various needs of forensic file type analysis, conversion of the MARF's internal data structures as MARFL expressions into the Forensic Lucid language for follow up forensic analysis, self-forensic analysis of MARF, and writer identification of hand-written digitized documents described in Mokhov (2008b); Mokhov & Debbabi (2008); Mokhov et al (2009); Mokhov & Vassev (2009c). Furthermore, we have a use case and applicability of MARF's algorithms for various multimedia tasks, e.g.…”
Section: Our Approach and Accomplishmentsmentioning
confidence: 99%
“…This will insure the data origin authentication (the data are coming from a legitimate source) and will protect against spoofing of the data with distorted voice recordings or incorrect processed data at the later stages of the pipeline. Thus, we ensure the trustworthiness of the distributed data being processed [5].…”
Section: Applications Of Dmarfmentioning
confidence: 99%
“…Hence, as depicted by Figure 8, we expect the DMARF stage to verify whether a specific proxy certificate is valid and to return TRUE or FALSE. DMARF does that through the Java Data Security Framework (JDSF) [9,11,5].…”
Section: Figure 8: Ae Stage Me Managed Elementmentioning
confidence: 99%
“…Therefore, as-is, the distributed security aspect here solely relies on the underlying communication protocols (the bottom line is Java RMI [45]). There were proposals on how to harden GIPSY security-wise [46], but there were no any means to aid a forensic investigation of security incidents with DMS or GIPSY as a whole, if they happened to occur.…”
Section: General Intensional Programming System (Gipsy)mentioning
confidence: 99%