{"title":"A novel shared key for security in grid computing","authors":"V. Nandakumar","doi":"10.1109/ICSSS.2014.7006190","DOIUrl":null,"url":null,"abstract":"Current use of high-speed networks has brought a change in computing methods. Technologies enabling cooperative use of varied resources as a single powerful computer for solving large scale problems have evolved into grid computing. It is involving available computer based resources. Complexity of computation in the modern era has culminated in crossing organizational boundaries to get the desired manipulation of data through grid computing. Security in this new availability of resources on demand with an easy access in grid computing is a definite need. Researchers have developed various solutions and there are several examples of Grid computing, since it a promising trend. This paper proposes a different dimension to security in the grid with freedom in one-one access.","PeriodicalId":354879,"journal":{"name":"2014 International Conference on Smart Structures and Systems (ICSSS)","volume":"2001 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2014 International Conference on Smart Structures and Systems (ICSSS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICSSS.2014.7006190","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
Current use of high-speed networks has brought a change in computing methods. Technologies enabling cooperative use of varied resources as a single powerful computer for solving large scale problems have evolved into grid computing. It is involving available computer based resources. Complexity of computation in the modern era has culminated in crossing organizational boundaries to get the desired manipulation of data through grid computing. Security in this new availability of resources on demand with an easy access in grid computing is a definite need. Researchers have developed various solutions and there are several examples of Grid computing, since it a promising trend. This paper proposes a different dimension to security in the grid with freedom in one-one access.