By Topic

E-Science Workshops, 2009 5th IEEE International Conference on

Date 9-11 Dec. 2009

Filter Results

Displaying Results 1 - 25 of 51
  • [CD label]

    Publication Year: 2009 , Page(s): 1
    Save to Project icon | Request Permissions | PDF file iconPDF (298 KB)  
    Freely Available from IEEE
  • Welcome

    Publication Year: 2009 , Page(s): 1
    Save to Project icon | Request Permissions | PDF file iconPDF (444 KB)  
    Freely Available from IEEE
  • Hub page

    Publication Year: 2009 , Page(s): 1
    Save to Project icon | Request Permissions | PDF file iconPDF (180 KB)  
    Freely Available from IEEE
  • Workshop list

    Publication Year: 2009 , Page(s): 1
    Save to Project icon | Request Permissions | PDF file iconPDF (36 KB)  
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2009 , Page(s): 1 - 7
    Save to Project icon | Request Permissions | PDF file iconPDF (74 KB)  
    Freely Available from IEEE
  • Author index

    Publication Year: 2009 , Page(s): 1 - 3
    Save to Project icon | Request Permissions | PDF file iconPDF (53 KB)  
    Freely Available from IEEE
  • Detailed author index

    Publication Year: 2009 , Page(s): 1 - 26
    Save to Project icon | Request Permissions | PDF file iconPDF (89 KB)  
    Freely Available from IEEE
  • The end of indexes

    Publication Year: 2009 , Page(s): 1
    Save to Project icon | Request Permissions | PDF file iconPDF (59 KB)  
    Freely Available from IEEE
  • [PDF Reader FAQ and support]

    Publication Year: 2009 , Page(s): 1
    Save to Project icon | Request Permissions | PDF file iconPDF (148 KB)  
    Freely Available from IEEE
  • [PDF Reader FAQ and support]

    Publication Year: 2009 , Page(s): 1 - 4
    Save to Project icon | Request Permissions | PDF file iconPDF (497 KB)  
    Freely Available from IEEE
  • Security in e-Science

    Publication Year: 2009 , Page(s): 1 - 2
    Save to Project icon | Request Permissions | PDF file iconPDF (89 KB) |  | HTML iconHTML  
    Freely Available from IEEE
  • Transparent identity-based firewall transition for eScience

    Publication Year: 2009 , Page(s): 3 - 10
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (322 KB) |  | HTML iconHTML  

    As new concepts for eSciene like grid computing and cloud computing tend to leave the research phase and develop towards production quality, the security eventually moves into focus. Up to now research in the security area concentrates on authentication and authorization on the resources themselves, but to enhance network security more generally, access control must be pushed back to the entry poi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Design and implementation of a Grid proxy auditing infrastructure

    Publication Year: 2009 , Page(s): 11 - 18
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (934 KB) |  | HTML iconHTML  

    Single sign-on and delegation of rights are key requirements for modern grid infrastructures. These requirements are usually facilitated by X.509 und private-key infrastructures (PKI) and proxy certificates. Proxy certificates, however, can be obtained and abused by a malicious third party. There is currently no method for end users to detect such abuse. We have designed a solution that enables a ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Audited credential delegation: A sensible approach to grid authentication

    Publication Year: 2009 , Page(s): 19 - 30
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (236 KB) |  | HTML iconHTML  

    If the authentication process in a computational grid environment is difficult for end-users, they will either be unable to use the system at all, or, in their attempts to circumvent the aspects of the authentication process which they find ¿difficult¿, they will probably increase the likelihood of a security compromise of the system. In this paper we examine a proposed authentication architectu... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Cloud-based services and applications

    Publication Year: 2009 , Page(s): 31 - 32
    Save to Project icon | Request Permissions | PDF file iconPDF (90 KB) |  | HTML iconHTML  
    Freely Available from IEEE
  • Building a private cloud with Eucalyptus

    Publication Year: 2009 , Page(s): 33 - 38
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (339 KB) |  | HTML iconHTML  

    Scientists very often have specific requirements regarding the IT services to support their research and very often standardized offerings of their service providers do not fit. At KIT we aim to build a private cloud to offer flexible infrastructure services that can easily be utilized and managed by end users according to their needs. With Eucalyptus, an open source solution exists that is fully ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Remote Interaction and scheduling aspects of cloud based streams

    Publication Year: 2009 , Page(s): 39 - 47
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (549 KB) |  | HTML iconHTML  

    This paper reports on a project concerned with various aspects of stream processing based on distributed components. In earlier work, we have explored dynamic reconfiguration, distributed management and a Web services interface for remote deployment and control of cloud-based streams. Here, we look at aspects of remote interaction between a ProActive distributed active object system and the Univer... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Towards Executable Acceptable Use Policies (execAUPs) for email clouds

    Publication Year: 2009 , Page(s): 48 - 51
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (819 KB) |  | HTML iconHTML  

    In this paper, we discuss the potential use of cloud computing for hosting and analysis of email. In particular, we are working towards the development of executable acceptable use policies (execAUPs) that assist organizations in preventing certain kinds of detrimental employee activities. We consider requirements for execAUPs, and outline initial efforts in using Microsoft's Azure as an environme... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Scientific lineage and object-based storage systems

    Publication Year: 2009 , Page(s): 52 - 58
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (399 KB) |  | HTML iconHTML  

    The lineage of scientific data refers to the linkage of a data set with the input and algorithms used to generate it. The input data, the algorithms, and the output data can be represented by nodes in a lineage graph; the child node (the output data) is connected by uni-directional arcs to the parent nodes (the inputs and the algorithm). Lineage graphs provide reproducibility as well as navigation... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Scientific workflow applications on Amazon EC2

    Publication Year: 2009 , Page(s): 59 - 66
    Cited by:  Papers (43)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (1634 KB) |  | HTML iconHTML  

    The proliferation of commercial cloud computing providers has generated significant interest in the scientific computing community. Much recent research has attempted to determine the benefits and drawbacks of cloud computing for scientific applications. Although clouds have many attractive features, such as virtualization, on-demand provisioning, and ¿pay as you go¿ usage-based pricing, it is n... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Towards job-specific service level agreements in the cloud

    Publication Year: 2009 , Page(s): 67 - 70
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (200 KB) |  | HTML iconHTML  

    To attract more users to commercially available computing, services have to specify clearly the charges, duties, liabilities and penalties in service level agreements (SLAs). In this paper, we build on our existing work in SLAs by making easy measurements for a specific application run within a commercial cloud. An outcome of this work is that certain application may run better than in a grid or H... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Supporting cloud computing with the virtual block store system

    Publication Year: 2009 , Page(s): 71 - 78
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (3444 KB) |  | HTML iconHTML  

    The fast development of cloud computing systems stimulates the needs for a standalone block storage system to provide persistent block storage services to virtual machines maintained by clouds. This paper presents the Virtual Block Store (VBS) System, a standalone block storage system built on the basis of LVM, iSCSI, and Xen hypervisor, which can provide basic block storage services such as volum... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Computational e-Science

    Publication Year: 2009 , Page(s): 79
    Save to Project icon | Request Permissions | PDF file iconPDF (83 KB) |  | HTML iconHTML  
    Freely Available from IEEE
  • Nonparametric multivariate anomaly analysis in support of HPC resilience

    Publication Year: 2009 , Page(s): 80 - 85
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (678 KB) |  | HTML iconHTML  

    Large-scale computing systems provide great potential for scientific exploration. However, the complexity that accompanies these enormous machines raises challenges for both, users and operators. The effective use of such systems is often hampered by failures encountered when running applications on systems containing tens-of-thousands of nodes and hundreds-of-thousands of compute cores capable of... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A middleware independent Grid workflow builder for scientific applications

    Publication Year: 2009 , Page(s): 86 - 91
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (1252 KB) |  | HTML iconHTML  

    Grid workflow authoring tools are typically specific to particular workflow engines built into grid middleware, or are application specific and are designed to interact with specific software implementations. g-Eclipse is a middleware independent grid workbench that aims to provide a unified abstraction of the grid and includes a grid workflow builder to allow users to author and deploy workflows ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.