{"title":"一种新的网格计算安全共享密钥","authors":"V. Nandakumar","doi":"10.1109/ICSSS.2014.7006190","DOIUrl":null,"url":null,"abstract":"Current use of high-speed networks has brought a change in computing methods. Technologies enabling cooperative use of varied resources as a single powerful computer for solving large scale problems have evolved into grid computing. It is involving available computer based resources. Complexity of computation in the modern era has culminated in crossing organizational boundaries to get the desired manipulation of data through grid computing. Security in this new availability of resources on demand with an easy access in grid computing is a definite need. Researchers have developed various solutions and there are several examples of Grid computing, since it a promising trend. This paper proposes a different dimension to security in the grid with freedom in one-one access.","PeriodicalId":354879,"journal":{"name":"2014 International Conference on Smart Structures and Systems (ICSSS)","volume":"2001 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"A novel shared key for security in grid computing\",\"authors\":\"V. Nandakumar\",\"doi\":\"10.1109/ICSSS.2014.7006190\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Current use of high-speed networks has brought a change in computing methods. Technologies enabling cooperative use of varied resources as a single powerful computer for solving large scale problems have evolved into grid computing. It is involving available computer based resources. Complexity of computation in the modern era has culminated in crossing organizational boundaries to get the desired manipulation of data through grid computing. Security in this new availability of resources on demand with an easy access in grid computing is a definite need. Researchers have developed various solutions and there are several examples of Grid computing, since it a promising trend. This paper proposes a different dimension to security in the grid with freedom in one-one access.\",\"PeriodicalId\":354879,\"journal\":{\"name\":\"2014 International Conference on Smart Structures and Systems (ICSSS)\",\"volume\":\"2001 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2014-10-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2014 International Conference on Smart Structures and Systems (ICSSS)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICSSS.2014.7006190\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2014 International Conference on Smart Structures and Systems (ICSSS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICSSS.2014.7006190","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Current use of high-speed networks has brought a change in computing methods. Technologies enabling cooperative use of varied resources as a single powerful computer for solving large scale problems have evolved into grid computing. It is involving available computer based resources. Complexity of computation in the modern era has culminated in crossing organizational boundaries to get the desired manipulation of data through grid computing. Security in this new availability of resources on demand with an easy access in grid computing is a definite need. Researchers have developed various solutions and there are several examples of Grid computing, since it a promising trend. This paper proposes a different dimension to security in the grid with freedom in one-one access.