International audienceThe protection of High Performance Computing architectures is still an open research problem. Generally, current solutions only feature confinement using sandboxing but none address the problematic of information flow control. This is why a better integration of mandatory access control mechanisms is needed in the HPC environment. In this paper, we propose a global architecture to protect a whole cluster. This architecture uses the specific cluster technologies in order not to reduce the operating system performances. The protection of the cluster relies on three levels of protection and the use of two kinds of reference monitors. SELinux is installed on the computing nodes and deals with direct information flows. PIGA...
This thesis deals with two major issues in the computer security field. The first is enhancing the s...
Scientific institutions and laboratories have incorporated and maintain a significant amount of comp...
Abstract — The complexity of today's distributed computing environment is such that the presenc...
International audienceModern operating systems continue to be the victims of attacks and information...
International audienceProtecting a HPC cluster against real world cyber threats is a critical task, ...
International audienceHPC clusters are costly resources, hence nowadays these structures tend to be ...
International audienceThe security of shared High Performance Com- puting clusters is still an open ...
International audienceProtecting a shared High Performance Computing cluster is still an open resear...
International audienceMandatory Access Control is really poorly supported by Cloud environments. Our...
International audienceAssessing the impact of Mandatory Access Control (MAC) integration on the Linu...
High Performance Computing facilities that use cluster computing to provide computational services t...
In today’s world, the use of computers and net-works is growing and the vision of a single infrastru...
International audienceThe number of large-scale clusters is rising. They are included into Grids or ...
The main contribution of this paper is to investigate issues in using Mandatory Access Controls (MAC...
Securing the HPC infrastructure is an important task. The level of awareness regarding the importanc...
This thesis deals with two major issues in the computer security field. The first is enhancing the s...
Scientific institutions and laboratories have incorporated and maintain a significant amount of comp...
Abstract — The complexity of today's distributed computing environment is such that the presenc...
International audienceModern operating systems continue to be the victims of attacks and information...
International audienceProtecting a HPC cluster against real world cyber threats is a critical task, ...
International audienceHPC clusters are costly resources, hence nowadays these structures tend to be ...
International audienceThe security of shared High Performance Com- puting clusters is still an open ...
International audienceProtecting a shared High Performance Computing cluster is still an open resear...
International audienceMandatory Access Control is really poorly supported by Cloud environments. Our...
International audienceAssessing the impact of Mandatory Access Control (MAC) integration on the Linu...
High Performance Computing facilities that use cluster computing to provide computational services t...
In today’s world, the use of computers and net-works is growing and the vision of a single infrastru...
International audienceThe number of large-scale clusters is rising. They are included into Grids or ...
The main contribution of this paper is to investigate issues in using Mandatory Access Controls (MAC...
Securing the HPC infrastructure is an important task. The level of awareness regarding the importanc...
This thesis deals with two major issues in the computer security field. The first is enhancing the s...
Scientific institutions and laboratories have incorporated and maintain a significant amount of comp...
Abstract — The complexity of today's distributed computing environment is such that the presenc...