CFP last date
22 April 2024
Reseach Article

Network Security: Goals, Services and Mechanisms in Grid Computing Environments

Published on None 2011 by Ajay Kumar, Dr. Seema Bawa
2nd National Conference on Computing, Communication and Sensor Network
Foundation of Computer Science USA
CCSN - Number 3
None 2011
Authors: Ajay Kumar, Dr. Seema Bawa
178cb569-3220-4b50-9375-21afc7e6983b

Ajay Kumar, Dr. Seema Bawa . Network Security: Goals, Services and Mechanisms in Grid Computing Environments. 2nd National Conference on Computing, Communication and Sensor Network. CCSN, 3 (None 2011), 1-4.

@article{
author = { Ajay Kumar, Dr. Seema Bawa },
title = { Network Security: Goals, Services and Mechanisms in Grid Computing Environments },
journal = { 2nd National Conference on Computing, Communication and Sensor Network },
issue_date = { None 2011 },
volume = { CCSN },
number = { 3 },
month = { None },
year = { 2011 },
issn = 0975-8887,
pages = { 1-4 },
numpages = 4,
url = { /specialissues/ccsn/number3/4180-ccsn017/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Special Issue Article
%1 2nd National Conference on Computing, Communication and Sensor Network
%A Ajay Kumar
%A Dr. Seema Bawa
%T Network Security: Goals, Services and Mechanisms in Grid Computing Environments
%J 2nd National Conference on Computing, Communication and Sensor Network
%@ 0975-8887
%V CCSN
%N 3
%P 1-4
%D 2011
%I International Journal of Computer Applications
Abstract

Grid computing is widely regarded as a technology of immense potential in both industry and academia. The evaluation pattern of grid technologies is very similar to the growth and evolution of Internet technologies that was witnessed in the early 1990s. Similar to the Internet, the initial Grid computing technologies were also developed mostly in the universities and research labs to solve unique research problems and to collaborate between different researchers across the world. As an issue, security is perhaps the most important and needs close understanding as Grid computing offers unique security challenges. In this research paper we look network security goals and services. Also, we identify the some security mechanisms.

References
  1. McNab, Chris, Ed., "Network security assessment", 2004, 005.8,323268
  2. Dr. Ion PETRE, Department of IT, Åbo Akademi University, http://www.abo.fi/~ipetre/
  3. Markus Jocobsson, Moti yung, "Applied Cryptography and Network Security", 2004.
  4. Stallings, william, "Network security essentials: applications and standards", 2002, 658.478, 293400
  5. Bode, Hendrik W, "Network analysis and feedback amplifier design", 1956, 621.3421, 17942
  6. Weinberg, Louis, "Network analysis and synthesis", 1962, 621.3815, ECD763
  7. Anderson, Brian D.O.; Vongpanitlerd, Sumeth, "Network analysis and synthesis : a modern systems theory approach", 1973, 621.3815, ECD181
  8. Zobrist, George W., "Network computer analysis", 1969, 621.38172, ECD159
  9. Kulshreshtha, Alok; Singh, Prashant Kumar; Choudhary, Sachin Kumar, "Network management through mobile agent", 2001, 621.38072, ECDB43
  10. Kou, Weidong, "Network security and standards", 1994, 621.3891, ECD1008
  11. Mathur, Anoorag; Lal, Dhananjay; Narula, Puneet, "Network security and TCP performance enhancement in mobile environment", 1999, 621.38072, ECDB75
  12. McNab, Chris, Ed., "Network security assessment", 2004, 005.8,323268
  13. Stallings, william, "Network security essentials: applications and standards", 2002, 658.478, 293400
  14. Durr, Michael, "Networking ibm pcs", 1993, ECD732G
  15. Neil Roiter, “Midmarket Security: Risk and Responses” April 2011.
Index Terms

Computer Science
Information Sciences

Keywords

Network Security Grid Security Services Authentication Cryptography Access Control