The main contribution of this paper is to investigate issues in using Mandatory Access Controls (MACs), namely those provided by SELinux, to secure application-level data. Particular emphasis is placed on health-care records located on the grid. The paper disccuses the importance of a trusted computing base in providing application security. It de- scribes a secure three-tiered architecture, incorporating trusted hardware, SELinux, and application security mechanisms that are appropriate for securing sensitive application data
Grid computing allows users to share multiple heterogeneous resources, such as computing power, stor...
Abstract—Despite the wide adoption by the scientific community, grid technologies have not been give...
Grid computing is an emergent computing innovation which offers endless access to computing infrastr...
The subject of this paper is data protection by means access control. It compares the difference bet...
International audienceHPC clusters are costly resources, hence nowadays these structures tend to be ...
Health Information Systems (HIS) make extensive use of Information and Communication Technologies (I...
Commercial operating systems have recently introduced mandatory access controls (MAC) that can be us...
Grid computing is an emergent computing innovation which offers endless access to computing infrastr...
International audienceThis paper presents μgrid, a light weight middleware for grid applications, an...
The day-to-day operations of corporations and government agencies rely on inter-operating software a...
E-Science Grid infrastructures are established on the collaboration of multiple and possibly otherwi...
Abstract. Applications typically rely on the operating system to en-force access control policies su...
The malicious host problem is challenging in distributed systems such as grids and clouds. Rival org...
The abundance of large commercial and scientific data stores have driven the need for Petascale comp...
Traditional user-oriented access control models such as Mandatory Access Control (MAC) and Discretio...
Grid computing allows users to share multiple heterogeneous resources, such as computing power, stor...
Abstract—Despite the wide adoption by the scientific community, grid technologies have not been give...
Grid computing is an emergent computing innovation which offers endless access to computing infrastr...
The subject of this paper is data protection by means access control. It compares the difference bet...
International audienceHPC clusters are costly resources, hence nowadays these structures tend to be ...
Health Information Systems (HIS) make extensive use of Information and Communication Technologies (I...
Commercial operating systems have recently introduced mandatory access controls (MAC) that can be us...
Grid computing is an emergent computing innovation which offers endless access to computing infrastr...
International audienceThis paper presents μgrid, a light weight middleware for grid applications, an...
The day-to-day operations of corporations and government agencies rely on inter-operating software a...
E-Science Grid infrastructures are established on the collaboration of multiple and possibly otherwi...
Abstract. Applications typically rely on the operating system to en-force access control policies su...
The malicious host problem is challenging in distributed systems such as grids and clouds. Rival org...
The abundance of large commercial and scientific data stores have driven the need for Petascale comp...
Traditional user-oriented access control models such as Mandatory Access Control (MAC) and Discretio...
Grid computing allows users to share multiple heterogeneous resources, such as computing power, stor...
Abstract—Despite the wide adoption by the scientific community, grid technologies have not been give...
Grid computing is an emergent computing innovation which offers endless access to computing infrastr...