Chronological Overview 
 Type-Hierarchical Overview 
Formal Methods in Computing
(Most of the papers antecedent to 1995
are not included in the list)
FRAMES  NO FRAME 

security:jsa:07 (Article)
Author(s) Marco Aldinucci and Marco Danelutto
Title« Securing skeletal systems with limited performance penalty: the Muskel experience »
JournalJournal of Systems Architecture
Volume54
Number9
Page(s)868-876
Year2008
URLhttp://calvados.di.unipi.it/storage/paper_files/2008_security_JSA.pdf
Abstract
Algorithmic skeletons have been exploited to implement several parallel programming environments, targeting workstation clusters as well as workstation networks and computational grids. When targeting non-dedicated clusters, workstation networks and grids, security has to be taken adequately into account in order to guarantee both code and data confidentiality and integrity. However, introducing security is usually an expensive activity, both in terms of the effort required to managed security mechanisms and in terms of the time spent performing security related activities at run time.We discuss the cost of security introduction as well as how some features typical of skeleton technology can be exploited to improve the efficiency code and data securing in a typical skeleton based parallel programming environment and we evaluate the performance cost of security mechanisms implemented exploiting state of the art tools. In particular, we take into account the cost of security introduction in muskel, a Java based skeletal system exploiting macro data flow implementation technology. We consider the adoption of mechanisms that allow securing all the communications involving remote, unreliable nodes and we evaluate the cost of such mechanisms. Also, we consider the implications on the computational grains needed to scale secure and insecure skeletal computations.

BibTeX code

@article{security:jsa:07,
  volume = {54},
  number = {9},
  month = sep,
  author = {Marco Aldinucci and Marco Danelutto},
  url = {http://calvados.di.unipi.it/storage/paper_files/2008_security_JSA.pdf},
  abstract = {Algorithmic skeletons have been exploited to implement several
              parallel programming environments, targeting workstation clusters
              as well as workstation networks and computational grids. When
              targeting non-dedicated clusters, workstation networks and grids,
              security has to be taken adequately into account in order to
              guarantee both code and data confidentiality and integrity.
              However, introducing security is usually an expensive activity,
              both in terms of the effort required to managed security
              mechanisms and in terms of the time spent performing security
              related activities at run time.We discuss the cost of security
              introduction as well as how some features typical of skeleton
              technology can be exploited to improve the efficiency code and
              data securing in a typical skeleton based parallel programming
              environment and we evaluate the performance cost of security
              mechanisms implemented exploiting state of the art tools. In
              particular, we take into account the cost of security introduction
              in muskel, a Java based skeletal system exploiting macro data flow
              implementation technology. We consider the adoption of mechanisms
              that allow securing all the communications involving remote,
              unreliable nodes and we evaluate the cost of such mechanisms.
              Also, we consider the implications on the computational grains
              needed to scale secure and insecure skeletal computations.},
  title = {Securing skeletal systems with limited performance penalty: the
           {Muskel} experience},
  publisher = {Elsevier},
  journal = {Journal of Systems Architecture},
  pages = {868-876},
  year = {2008},
}


 Chronological Overview 
 Type-Hierarchical Overview 
Formal Methods in Computing
(Most of the papers antecedent to 1995
are not included in the list)
FRAMES  NO FRAME 

This document was generated by bib2html 3.3.
(Modified by Luca Paolini, under the GNU General Public License)

Valid HTML 4.01!