You are previewing International Journal of Grid and High Performance Computing (IJGHPC) Volume 6, Issue 2.
O'Reilly logo
International Journal of Grid and High Performance Computing (IJGHPC) Volume 6, Issue 2

Book Description

The International Journal of Grid and High Performance Computing (IJGHPC) examines current, state-of-the art research on all aspects of grid and cloud evolution, middleware, standards, API, economy, education, services, algorithms, collaboration, impact, instrumentation, security, portals, trends, challenges, models, work flow management, wireless systems, and high performance computing. This journal will be instrumental in the improvement and development of theory and practice in grid and cloud computing.

This issue contains the following articles:

  • Semantic-Based Access Control for Data Resources in Open Grid Services Architecture: Data Access and Integration (OGSA-DAI)
  • A Migration Approach for Fault Tolerance in Cloud Computing
  • Cryptographic Cloud Computing Environment as a More Trusted Communication Environment
  • Green Energy Model for Grid Resource Allocation: A Graph Theoretic Approach
  • An Efficient CGM-Based Parallel Algorithm Solving the Matrix Chain Ordering Problem

Table of Contents

  1. Cover
  2. Masthead
  3. Call For Articles
  4. Semantic-Based Access Control for Data Resources in Open Grid Services Architecture - Data Access and Integration (OGSA-DAI)
    1. ABSTRACT
    2. 1. INTRODUCTION
    3. 2. BACKGROUND
    4. 3. RELATED WORK IN SEMANTIC ACCESS CONTROL
    5. 4. SEMANTIC-BASED ACCESS CONTROL USING SHIBBOLETH, XACML AND ONTOLOGY
    6. 5. IMPLEMENTATION DETAILS
    7. 6. PERFORMANCE ANALYSIS
    8. 7. CONCLUSION AND FUTURE WORK
    9. ACKNOWLEDGMENT
    10. REFERENCES
  5. A Migration Approach for Fault Tolerance in Cloud Computing
    1. ABSTRACT
    2. INTRODUCTION
    3. RELATED WORK
    4. OUR PROPOSED APPROACH
    5. SIMULATION AND RESULT
    6. CONCLUSION AND FUTURE WORK
    7. REFERENCES
  6. Cryptographic Cloud Computing Environment as a More Trusted Communication Environment
    1. ABSTRACT
    2. INTRODUCTION
    3. CC ARCHITECTURE AND SECURITY IMPLICATIONS
    4. CC CRYPTOGRAPHY PRECAUTIONS
    5. DATA LEAKAGE
    6. CLOUD DATA ENCRYPTION BASED QUANTUM
    7. CUSTOMER IDENTIFICATION
    8. CC ATTACKS
    9. DENIAL-OF-SERVICE (DoS)
    10. SIDE-CHANNEL
    11. AUTHENTICATION ATTACK
    12. MAN-IN-THE-MIDDLE
    13. CLOUD ENCRYPTION MODELS
    14. CIPHER CLOUD
    15. CRYPTOGRAPHIC CLOUD STORAGE
    16. PROPOSED MODEL
    17. CCCE MAIN BUILDING MODULES
    18. ENTERPRISE CONTROL
    19. QKD
    20. OPEN CLOUD PHASE
    21. AN ILLUSTRATIVE EXAMPLE (ON-LINE MODE)
    22. ANALYSIS OF CCCE MODEL
    23. SECURITY MANAGEMENT
    24. AES AND QKD INTEGRATION
    25. CONCLUSION
    26. REFERENCES
  7. Green Energy Model for Grid Resource Allocation:
    1. ABSTRACT
    2. INTRODUCTION
    3. RELATED WORK
    4. THE PROBLEM
    5. THE PROPOSED MODEL
    6. PERFORMANCE EVALUATION
    7. CONCLUSION
    8. REFERENCES
  8. An Efficient CGM-Based Parallel Algorithm Solving the Matrix Chain Ordering Problem
    1. ABSTRACT
    2. 1. INTRODUCTION
    3. 2. RELATED WORK
    4. 3. MCOP AND OCPT PROBLEMS AND YAO’S SEQUENTIAL SOLUTION
    5. 4. AN IMPLEMENTATION OF YAO’S ALGORITHM
    6. 5. A CGM ALGORITHM BASED ON YAO’S SEQUENTIAL ALGORITHM
    7. 6. CONCLUSION
    8. ACKNOWLEDGMENT
    9. REFERENCES
  9. Call For Articles