Loading...
Please wait, while we are loading the content...
Similar Documents
IPIP Application Layer Transport Layer Network Layer Device driversDevice drivers Figure 1 : Relative Location of Secur ity M echanisms in the Protocol Stack
| Content Provider | Semantic Scholar |
|---|---|
| Author | Al-Muhtadi, Jalal Feng, Wu-Chun Fisk, Mike |
| Copyright Year | 2001 |
| Abstract | Virtual supercomputing, (i.e., high-performance grid computing), is poised to revolutionize the way we think about and use computing. However, the security of the links interconnecting the nodes within such an environment will be its Achilles heel, particularly when secure communication is required to tunnel through heterogeneous domains. In this paper we examine existing security mechanisms, show their inadequacy, and design a comprehensive cybersecurity infrastructure that meets the security requirements of virtual supercomputing. |
| File Format | PDF HTM / HTML |
| Alternate Webpage(s) | http://www.cs.vt.edu/~feng/pubs/papers/muhtadi-lasci2001-virtual.pdf |
| Alternate Webpage(s) | http://www.cyberdudez.com/iris-lacsi.pdf |
| Alternate Webpage(s) | http://public.lanl.gov/mfisk/papers/iris-lacsi.pdf |
| Alternate Webpage(s) | http://synergy.cs.vt.edu/pubs/papers/muhtadi-lasci2001-virtual.pdf |
| Alternate Webpage(s) | http://people.cs.vt.edu/~feng/pubs/papers/muhtadi-lasci2001-virtual.pdf |
| Language | English |
| Access Restriction | Open |
| Content Type | Text |
| Resource Type | Article |