DocumentCode :
3625712
Title :
Protecting Non-dedicated Cluster Environments by Marking Processes with Stigmata
Author :
Martin Kacer;Pavel Tvrdik
Author_Institution :
Dept. of Computer Science and Engineering, Czech Technical University in Prague, Prague, Czech Republic. Email: xkacer@fel.cvut.cz
fYear :
2006
Firstpage :
107
Lastpage :
112
Abstract :
This paper proposes mechanisms for the protection of high-performance systems that are built of non-dedicated workstations. Such workstations may potentially be under control of malicious users that may gain complete control over the processes running there. The protection is achieved by a careful assignment of processes to computing nodes. If a process runs on a workstation with limited credibility, it receives a "stigma " that prevents it to access sensitive data. If it later attempts such an access, a process rollback is used to repeat the execution on a more trusted node. By implementing these mechanisms, it is possible to utilize idle computing resources without exposing sensitive data to untrusted persons.
Keywords :
"Protection","Workstations","Security","Computer networks","Computer science","Process control","High performance computing","Hardware","Kernel","Linux"
Publisher :
ieee
Conference_Titel :
Advanced Computing and Communications, 2006. ADCOM 2006. International Conference on
Print_ISBN :
1-4244-0715-X
Type :
conf
DOI :
10.1109/ADCOM.2006.4289865
Filename :
4289865
Link To Document :
بازگشت