Information Security in Distributed Computing Systems. A Review

作者: E. B. Dudin , I. A. Zhlyabinkova , E. G. Zakharova , Yu. G. Smetanin

DOI: 10.3103/S0005105509040049

关键词: Distributed computingDistributed algorithmCloud computing securityDistributed System Security ArchitectureComputer scienceCSIv2Computer securityGlobal information systemSecurity information and event managementComputer security modelAutonomic computing

摘要: The solution of large-dimension information-computing tasks with the use globally distributed computing environments requires that special attention be paid to problem information security. This is urgent for both an information-computer system itself and its constituent subsystems users.

参考文章(10)
Alexander Grusho, Nick Grebnev, Elena Timonina, Covert channel invisibility theorem Communications in computer and information science. ,vol. 374, pp. 187- 196 ,(2007) , 10.1007/978-3-540-73986-9_16
Roberto Zicari, Stefano Ceri, Richard Thomas Snodgrass, Carlo Zaniolo, Christos Faloutsos, V. S. Subrahmanian, Advanced Database Systems ,(1997)
Mark Needleman, The Internet Engineering Task Force Serials Review. ,vol. 26, pp. 69- 72 ,(2000) , 10.1016/S0098-7913(99)00073-8
Peter J Denning, None, Computing is a natural science Communications of The ACM. ,vol. 50, pp. 13- 18 ,(2007) , 10.1145/1272516.1272529
Charles E. Jacobs, Adam Finkelstein, David H. Salesin, Fast multiresolution image querying Proceedings of the 22nd annual conference on Computer graphics and interactive techniques - SIGGRAPH '95. pp. 277- 286 ,(1995) , 10.1145/218380.218454
Juwei Lu, K.N. Plataniotis, A.N. Venetsanopoulos, Face recognition using LDA-based algorithms IEEE Transactions on Neural Networks. ,vol. 14, pp. 195- 200 ,(2003) , 10.1109/TNN.2002.806647
A.M. Martinez, A.C. Kak, PCA versus LDA IEEE Transactions on Pattern Analysis and Machine Intelligence. ,vol. 23, pp. 228- 233 ,(2001) , 10.1109/34.908974
Risto Miikkulainen, Jake Ryan, Meng-Jang Lin, Intrusion Detection with Neural Networks neural information processing systems. ,vol. 10, pp. 943- 949 ,(1997)
Ian Foster, Carl Kesselman, Gene Tsudik, Steven Tuecke, A security architecture for computational grids computer and communications security. pp. 83- 92 ,(1998) , 10.1145/288090.288111
Stefan Peuser, Olaf Zimmermann, Mark Tomlinson, Perspectives on web services ,(2003)