Ir al contenido

Documat


Security in process migration systems

  • Autores: Javier Echaiz, Jorge Raúl Ardenghi
  • Localización: Journal of Computer Science and Technology, ISSN-e 1666-6038, Vol. 5, Nº. 4, 2005 (Ejemplar dedicado a: Sixteenth Issue), págs. 305-311
  • Idioma: inglés
  • Enlaces
  • Resumen
    • A loosely coupled distributed system is composed by nodes, usually heterogenous, connected by a network. These systems have enormous aggregate computing potential. However most of this potential is not realized unless the underlying software is able to implement the concept of single system image (SSI) on the physically distributed system. This way the resources belonging to a node could be accessed transparently from any other node. This paper discusses the issues of a process migration protocol as an essential component of a distributed system and its extension to the grid computing paradigm. The security issues are specially considered.

  • Referencias bibliográficas
    • References [1] S. J. Mullender, C. van Rossum, A. S. Tanenbaum, R. van Renesse, and H. van Stavern, Amoeba: a distributed operating system...
    • [2] F. Douglis and J. Ousterhout, “Transparent Process Migration: Design Alternatives and the Sprite Implementation,” Software Practice &...
    • [3] Amnon Barak and Oren La’adan, “The MOSIX multicomputer operating system for high performance cluster computing,” Future Generation Computer...
    • [4] D. Thain, T. Tannenbaum, and M. Livny, “Distributed computing in practice: The condor experience,” 2004.
    • [5] Javier Echaiz and Jorge Ardenghi, “Single System Image: Pilar de los Sistemas de Clustering,” V Workshop de Investigadores en Ciencias...
    • [6] Inc. Sun Microsystems, “RFC 1094: NFS: Network File System Protocol specification,” Mar. 1989.
    • [7] James H. Morris, Mahadev Satyanarayanan, Conner Conner, John H. Howard, David S. Rosenthal, and F. Donelson Smith, “Andrew: A distributed...
    • [8] Peter Smith and Norman C. Hutchinson, “Heterogeneous Process Migration: The Tui System,” Tech. Rep. TR-96-04, Department of Computer Science,...
    • [9] Derek L. Eager, Edward D. Lazowska, and John Zahorjan, “The Limited Performance Benefits of Migrating Active Processes for Load Sharing,”...
    • [10] John K. Ousterhout, “Scheduling Techniques for Concurrent Systems,” in Third International Conference on Distributed Computing Systems,...
    • [11] Ken Shirriff, “Building Distributed Process Management on an Object-Oriented Framework,” in Proceedings of the USENIX Annual Technical...
    • [12] Javier Echaiz, “Migración de Procesos en Sistemas Heterogéneos,” Magister en Ciencias de la Computación, Universidad Nacional del Sur,...
    • [13] B. Clifford Neuman, J. G. Steiner, and J. I. Schiller, “Kerberos: An authentication service for open network systems,” in Winter 1988...
    • [14] J. Kohl and C. Neuman, “RFC 1510: The Kerberos Network Authentication Service (V5),” Sept. 1993.
    • [15] Frans Kaashoek, “Self-certifying File System,” Dec. 2000.
    • [16] Declan Patrick O’shanahan, “CryptosFS: Fast cryptographic secure NFS,” Nov. 2000.
    • [17] Burton S. Kaliski Jr., “IEEE P1363: A Standard for RSA, Diffie-Hellman, and Elliptic-Curve Cryptography (Abstract),” in Security Protocols...
    • [18] T. Mark A. Lomas, Ed., Security Protocols, International Workshop, Cambridge, United Kingdom, April 10-12, 1996, Proceedings, vol. 1189...
    • [19] J. Lee, “A survey on IPSec Key Management Protocols,” 1997.
    • [20] Dejan S. Milojiciˇ c, Fred Douglis, Yves Pain-daveine, Richard Wheeler, and Songnian Zhou, “Process migration,” ACM Computing Surveys,...
    • [21] Javier Echaiz and Jorge Ardenghi, “Carga Compartida en Sistemas Distribuidos Heterogeneos,” ´ V Workshop de Investigadores en Ciencias...
    • [22] Geoffrey Fox and Dennis Gannon, “Grid computing: Computational grids,” Computing in Science and Engineering, vol. 3, no. 4, pp. 74–86,...
    • [23] Ewa Deelman and Carl Kesselman, “Grid computing,” Scientific Programming, vol. 10, no. 2, pp. 101–102, 2002.
    • [24] And Domenico Laforenza, Mark Baker, and Rajkumar Buyya, “Grids and grid technologies for wide-area distributed computing,” July 2002.
    • [25] Mary Thompson, “Security implications of typical grid computing scenarios,” Dec. 2000.

Fundación Dialnet

Mi Documat

Opciones de artículo

Opciones de compartir

Opciones de entorno