Cardiff University | Prifysgol Caerdydd ORCA
Online Research @ Cardiff 
WelshClear Cookie - decide language by browser settings

Securing the virtual organization - Part 1: Requirements from Grid computing

Rana, Omer Farooq and Hilton, Jeremy Charles 2006. Securing the virtual organization - Part 1: Requirements from Grid computing. Network Security 2006 (4) , pp. 7-10. 10.1016/S1353-4858(06)70355-5

Full text not available from this repository.


As Grid computing moves from research/academic laboratories to commercial organizations, security is always listed as a key concern. Security remains one of the fundamental barriers to adoption of Grid computing in a wider commercial context. It is not always obvious however exactly what security concerns are most significant. Some of the issues raised can be related to restrictions on intellectual property, while others relate to specific constraints imposed by organisational structures. In other instances, some commercial institutions relate issues of security to trust and competence. This two-part article investigates such issues, along with a classification of security issues within Grid computing. Based on this survey, issues in managing security in collaborative applications deployed over Grid computing infrastructure are presented here in Part 1. Part 2, which will appear in the next issue of Network Security, describes the application of security in the construction industry and the associated security management service architecture.

Item Type: Article
Date Type: Publication
Status: Published
Schools: Computer Science & Informatics
Subjects: Q Science > QA Mathematics > QA75 Electronic computers. Computer science
Publisher: Elsevier
ISSN: 1353-4858
Last Modified: 04 Jun 2017 04:37

Citation Data

Cited 3 times in Scopus. View in Scopus. Powered By Scopus® Data

Actions (repository staff only)

Edit Item Edit Item