Call for Papers - Ongoing round of submission, notification and publication.
    
  
Home    |    Login or Register    |    Contact CSC
By Title/Keywords/Abstract   By Author
Browse CSC-OpenAccess Library.
  • HOME
  • LIST OF JOURNALS
  • AUTHORS
  • EDITORS & REVIEWERS
  • LIBRARIANS & BOOK SELLERS
  • PARTNERSHIP & COLLABORATION
Home   >   CSC-OpenAccess Library   >    Manuscript Information
Full Text Available
(no registration required)

(373.45KB)


-- CSC-OpenAccess Policy
-- Creative Commons Attribution NonCommercial 4.0 International License
>> COMPLETE LIST OF JOURNALS

EXPLORE PUBLICATIONS BY COUNTRIES

EUROPE
MIDDLE EAST
ASIA
AFRICA
.............................
United States of America
United Kingdom
Canada
Australia
Italy
France
Brazil
Germany
Malaysia
Turkey
China
Taiwan
Japan
Saudi Arabia
Jordan
Egypt
United Arab Emirates
India
Nigeria
Modified Approach For Securing Real Time Application On Clusters.
Abhishek Songra, Rama Shankar Yadav, Sarsij Tripathi
Pages - 32 - 44     |    Revised - 15-06-2007     |    Published - 30-06-2007
Published in International Journal of Security (IJS)
Volume - 1   Issue - 1    |    Publication Date - June 2007  Table of Contents
MORE INFORMATION
References   |   Cited By (1)   |   Abstracting & Indexing
KEYWORDS
Real time System, Scheduling, Security Services, Clusters
ABSTRACT
In today arena security critical real time applications running over clusters are growing very rapidly. As an application running on clusters demand both timeliness and security thus, an efficient scheduling algorithm is needed that have better performance in terms of both number of task accepted and security value received. This paper modifies the security aware scheduling approach [5] by utilizing the concept of task criticality and adaptive threshold value. Also, this paper discus the system architecture used, mathematical model, lemmas and modified scheduling approach. Further, simulation studies have been carried out in MATLAB (module for Real-time) to measure the performance of modified approach. The modified approach is applicable over wide range of application differing in there requirement and have better performance.
CITED BY (1)  
1 Adnan, A., Cazan, A., Safa, M., Lung, A. W. M., & Williams, G. (2009). Evaluation of potential manufacturing suppliers using analytical hierarchy process and cluster analysis for benchmarking. International Journal of Security, 3(3), 36.
ABSTRACTING & INDEXING
1 Google Scholar 
2 ScientificCommons 
3 Academic Index 
4 CiteSeerX 
5 refSeek 
6 iSEEK 
7 Socol@r  
8 ResearchGATE 
9 Bielefeld Academic Search Engine (BASE) 
10 Scribd 
11 WorldCat 
12 SlideShare 
13 PDFCAST 
14 PdfSR 
REFERENCES
A J.Hong, X. Tan and D. Towsley: performance analysis of minimum laxity and earliest deadline scheduling in a real time system. IEEE Transactions on Computers, Volume 38, Issue 12, Dec. 1989, Page(s):1736 - 1744.
Dessouly, Alaa Amin and Reda Ammar and Ayman El: Scheduling Real Time Parallel Structures on Cluster Computing with Possible Processor Failure. IEEE 9th International Symposium on Computers and Communications, Volume 1, 28 June-1 July 2004, Page(s):62 – 67.
Ferrari, Adam et al. A flexible security system for Metacomputing Environments www.cs.virginia.edu/papers/hpcn99.pdf 1999.
Foster, Ian, Nicholas Karonis: Managing Security in High Performance Distributed Computations. Journal of Cluster Computing Volume 1, Issue 1 pages 95-107, publisher Springer Netherlands 1998.
Gagne, T.Shepard and M: A Pre-Run-Time Scheduling Algorithm for Hard Real Time Systems. Transactions on Software Engineering, IEEE Volume 17, Issue 7, July 1991, Page(s):669 - 677.
Genesis, M. H. A.M. Goscinski and J. Silock: The operating system managing parallelism and providing single system image on cluster. LNCS volume 2790/2004, publisher Springer Berlin / Heidelberg.
Ian Foster, Carl Kesselman, Gene Tsudik, Steven Tuecke : A security architecture for computational grids: Proceedings of the 5th ACM conference on Computer and communications security CCS 1998.
J.Deepkumara, H.M. Heys and R.venkatesan: Performance Comparison of Message Authentication Code for Internet protocol Security. www.engr.mun.ca/~howard/PAPERS/necec_2003b.pdf 2003.
Kavi, Wenming Li and Krishna: A Non Preemptive Scheduling Algorithm for Soft Real Time Systems. Computers & Electrical Engineering, Volume 33, Issue 1, January 2007, Pages 12-29.
M. L. Dertouzos and A. K Mok : Multi-Processor Online Scheduling of Hard Real- Time Tasks: IEEE Transactions on Software Engineering, Vol. 15, No. 12, December 1989 , pp. 1497-1506.
Makan Pourzandi, Ibrahim Haddad, Charles Levert, MiroslawZakrzewski: A New Architecture for Secure Carrier- Class Clusters. IEEE International Conference on Cluster Computing, 23-26 Sept. 2002, Page(s):494 – 497.
Manhee Lee, Eun Jung Kim, Ki Hwan Yum: An overview of security issues in cluster interconnects. Sixth IEEE International Symposium on Cluster Computing and the Grid Workshops, 2006. Volume 2, 16-19 May, Page(s):9 pp.
Martel, K. Jeffay and C. U: On Non-Preemptive Scheduling of periodic and Sporadic Tasks: Proceedings of the 12th IEEE Real-Time Systems Symposium, San Antonio, Texas, December 1991, IEEE Computer Society Press, pp. 129- 139.
Neil F. Johnson, Sushil Jajodia, “Steganalysis of Images Created Using Current Steganography Software”, Lecture Notes in Computer Science, vol 1525, 1998, Springer-Verlag.
O.Elkeelany, M.matalgah, K.Sheikh: Performance Analysis of IPSEC Protocol: Encryption & Authentication. International conference on Communication IEEE 2002. Volume 2, page(s):1164-1168.
Parnas, J.Xu and D.L.: Scheduling Processes with Release Times, Deadlines, Precedence and Exclusion Relations. Transactions on Software Engineering, IEEE Volume 16, Issue 3, March 1990, Page(s):360 - 369
Qin, Tao Xie and Xiao: Scheduling Security Critical Real Time Applications on Clusters. IEEE transactions on computers, Vol. 55, no 7, pp. 864-879 July 2006.
R. David, S. Son and R. Mukkamala: Supporting Security Requirements in Multilevel Real Time Database. IEEE Symposium on Security and Privacy, 8-10 May1995, Page(s):199 – 210,.
R. Mukkamala and S. Son: A Secure Concurrency Control Protocol for Real-Time Database: IFIP Workshop on Database Security. 1995.
S.H. Son, C. Chaney, C. and N. Thomlinson: Partial Security policy to Support Timeliness in Secure Real Time Databases. IEEE Symposium on Security and Privacy, 3-6 May 1998, Page(s):136 – 147.
Savarese, T. Sterling and D : A parallel workstation for scientific computation. Proceedings of the 24th International Conference on Parallel Processing, August 14-18, 1995, Urbana-Champain, Illinois, USA. Volume I: Architecture.
SHILOH, O. t. Amnon BARAK: Scalable cluster computing with MOSIX for LINUX. In Proceedings of 5th Annual Linux Expo, pages 95--100, May 1999.
X. Zhang, Y. Qu, and L. Xiao.: Improving Distributed Workload Performance by Sharing both CPU and Memory Resources. 20th International Conference on Distributed Computing Systems, IEEE. 10-13 April 2000, Page(s):233 – 241.
MANUSCRIPT AUTHORS
Mr. Abhishek Songra
- India
Mr. Rama Shankar Yadav
- India
rsy@mnnit.ac.in
Mr. Sarsij Tripathi
- India


CREATE AUTHOR ACCOUNT
 
LAUNCH YOUR SPECIAL ISSUE
View all special issues >>
 
PUBLICATION VIDEOS
 
You can contact us anytime since we have 24 x 7 support.
Join Us|List of Journals|
    
Copyrights © 2025 Computer Science Journals (CSC Journals). All rights reserved. Privacy Policy | Terms of Conditions