Securing skeletal systems with limited performance penalty: The muskel experience

Algorithmic skeletons have been exploited to implement several parallel programming environments, targeting workstation clusters as well as workstation networks and computational grids. When targeting non-dedicated clusters, workstation networks and grids, security has to be taken adequately into ac...

Celý popis

Uloženo v:
Podrobná bibliografie
Vydáno v:Journal of systems architecture Ročník 54; číslo 9; s. 868 - 876
Hlavní autoři: Aldinucci, Marco, Danelutto, Marco
Médium: Journal Article
Jazyk:angličtina
Vydáno: Amsterdam Elsevier B.V 01.09.2008
Elsevier Sequoia S.A
Témata:
ISSN:1383-7621, 1873-6165
On-line přístup:Získat plný text
Tagy: Přidat tag
Žádné tagy, Buďte první, kdo vytvoří štítek k tomuto záznamu!
Abstract Algorithmic skeletons have been exploited to implement several parallel programming environments, targeting workstation clusters as well as workstation networks and computational grids. When targeting non-dedicated clusters, workstation networks and grids, security has to be taken adequately into account in order to guarantee both code and data confidentiality and integrity. However, introducing security is usually an expensive activity, both in terms of the effort required to managed security mechanisms and in terms of the time spent performing security related activities at run time. We discuss the cost of security introduction as well as how some features typical of skeleton technology can be exploited to improve the efficiency code and data securing in a typical skeleton based parallel programming environment and we evaluate the performance cost of security mechanisms implemented exploiting state of the art tools. In particular, we take into account the cost of security introduction in muskel, a Java based skeletal system exploiting macro data flow implementation technology. We consider the adoption of mechanisms that allow securing all the communications involving remote, unreliable nodes and we evaluate the cost of such mechanisms. Also, we consider the implications on the computational grains needed to scale secure and insecure skeletal computations.
AbstractList Algorithmic skeletons have been exploited to implement several parallel programming environments, targeting workstation clusters as well as workstation networks and computational grids. When targeting non-dedicated clusters, workstation networks and grids, security has to be taken adequately into account in order to guarantee both code and data confidentiality and integrity. However, introducing security is usually an expensive activity, both in terms of the effort required to managed security mechanisms and in terms of the time spent performing security related activities at run time. We discuss the cost of security introduction as well as how some features typical of skeleton technology can be exploited to improve the efficiency code and data securing in a typical skeleton based parallel programming environment and we evaluate the performance cost of security mechanisms implemented exploiting state of the art tools. In particular, we take into account the cost of security introduction in muskel, a Java based skeletal system exploiting macro data flow implementation technology. We consider the adoption of mechanisms that allow securing all the communications involving remote, unreliable nodes and we evaluate the cost of such mechanisms. Also, we consider the implications on the computational grains needed to scale secure and insecure skeletal computations. [PUBLICATION ABSTRACT]
Algorithmic skeletons have been exploited to implement several parallel programming environments, targeting workstation clusters as well as workstation networks and computational grids. When targeting non-dedicated clusters, workstation networks and grids, security has to be taken adequately into account in order to guarantee both code and data confidentiality and integrity. However, introducing security is usually an expensive activity, both in terms of the effort required to managed security mechanisms and in terms of the time spent performing security related activities at run time. We discuss the cost of security introduction as well as how some features typical of skeleton technology can be exploited to improve the efficiency code and data securing in a typical skeleton based parallel programming environment and we evaluate the performance cost of security mechanisms implemented exploiting state of the art tools. In particular, we take into account the cost of security introduction in muskel, a Java based skeletal system exploiting macro data flow implementation technology. We consider the adoption of mechanisms that allow securing all the communications involving remote, unreliable nodes and we evaluate the cost of such mechanisms. Also, we consider the implications on the computational grains needed to scale secure and insecure skeletal computations.
Author Danelutto, Marco
Aldinucci, Marco
Author_xml – sequence: 1
  givenname: Marco
  surname: Aldinucci
  fullname: Aldinucci, Marco
  email: aldinuc@di.unipi.it
– sequence: 2
  givenname: Marco
  surname: Danelutto
  fullname: Danelutto, Marco
  email: marcod@di.unipi.it
BookMark eNqFkEtPwzAQhC1UJErhH3CIuCf4kThJD0io4iVVQohythxnTR3yKLYL9N_jEk4c4DQr7Xyj3TlGk37oAaEzghOCCb9oErdz0qqEYlwkmCZBDtCUFDmLOeHZJMysYHHOKTlCx841GOMsI3SKHp9Aba3pXyL3Ci142UYhy0Pnog_j11FrOuOhjjZg9WA72SsIcy9bv5tHqzVE3XYPRvAZHAbC-gQdatk6OP3RGXq-uV4t7uLlw-394moZK8aYjwnTNeU41VkKZaExZJozpmRdUpyVDCpcUVXmtE61lmVekXB8XeVckhoY1xmbofMxd2OHty04L5pha8NlTlBSFAVPCxJM89Gk7OCcBS2U8dKbofdWmlYQLPYNikaMDYp9gwJTESTA6S94Y00n7e4_7HLEIHz_bsAKp76bqY0F5UU9mL8DvgCFRpCY
CitedBy_id crossref_primary_10_1002_spe_1026
Cites_doi 10.1002/cpe.4330070305
10.1016/j.istr.2004.11.001
10.1016/S0167-739X(02)00172-3
10.1016/S0167-8191(02)00189-8
10.1007/0-387-23352-0_10
10.1109/HPDC.2003.1210015
10.1016/j.parco.2003.12.002
10.1109/EMPDP.2005.35
10.1109/PDP.2008.46
10.1109/SCC.2004.1358017
10.1016/S0167-8191(02)00188-6
10.1109/MC.2003.1160055
10.1109/MM.2005.75
ContentType Journal Article
Copyright 2008 Elsevier B.V.
Copyright Elsevier Sequoia S.A. Sep 2008
Copyright_xml – notice: 2008 Elsevier B.V.
– notice: Copyright Elsevier Sequoia S.A. Sep 2008
DBID AAYXX
CITATION
7SC
8FD
JQ2
L7M
L~C
L~D
DOI 10.1016/j.sysarc.2008.02.008
DatabaseName CrossRef
Computer and Information Systems Abstracts
Technology Research Database
ProQuest Computer Science Collection
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts – Academic
Computer and Information Systems Abstracts Professional
DatabaseTitle CrossRef
Computer and Information Systems Abstracts
Technology Research Database
Computer and Information Systems Abstracts – Academic
Advanced Technologies Database with Aerospace
ProQuest Computer Science Collection
Computer and Information Systems Abstracts Professional
DatabaseTitleList Computer and Information Systems Abstracts

DeliveryMethod fulltext_linktorsrc
Discipline Computer Science
EISSN 1873-6165
EndPage 876
ExternalDocumentID 1565748031
10_1016_j_sysarc_2008_02_008
S1383762108000374
Genre Feature
GroupedDBID --K
--M
-~X
.DC
.~1
0R~
1B1
1~.
1~5
29L
4.4
457
4G.
5GY
5VS
7-5
71M
8P~
AACTN
AAEDT
AAEDW
AAIAV
AAIKJ
AAKOC
AALRI
AAOAW
AAQFI
AAQXK
AAXUO
AAYFN
ABBOA
ABFNM
ABFRF
ABJNI
ABMAC
ABXDB
ABYKQ
ACDAQ
ACGFO
ACGFS
ACNNM
ACRLP
ACZNC
ADBBV
ADEZE
ADJOM
ADMUD
ADTZH
AEBSH
AECPX
AEFWE
AEKER
AENEX
AFKWA
AFTJW
AGHFR
AGUBO
AGYEJ
AHJVU
AHZHX
AIALX
AIEXJ
AIKHN
AITUG
AJBFU
AJOXV
ALMA_UNASSIGNED_HOLDINGS
AMFUW
AMRAJ
AOUOD
ASPBG
AVWKF
AXJTR
AZFZN
BJAXD
BKOJK
BKOMP
BLXMC
CS3
DU5
EBS
EFJIC
EFLBG
EJD
EO8
EO9
EP2
EP3
FDB
FEDTE
FGOYB
FIRID
FNPLU
FYGXN
G-Q
GBLVA
GBOLZ
HVGLF
HZ~
IHE
J1W
JJJVA
KOM
M41
MO0
MS~
N9A
O-L
O9-
OAUVE
OZT
P-8
P-9
P2P
PC.
PQQKQ
Q38
R2-
RIG
ROL
RPZ
RXW
SBC
SDF
SDG
SDP
SES
SEW
SPC
SPCBC
SST
SSV
SSZ
T5K
TAE
TN5
U5U
UHS
~G-
9DU
AATTM
AAXKI
AAYWO
AAYXX
ABWVN
ACLOT
ACRPL
ACVFH
ADCNI
ADNMO
AEIPS
AEUPX
AFJKZ
AFPUW
AGQPQ
AIGII
AIIUN
AKBMS
AKRWK
AKYEP
ANKPU
APXCP
CITATION
EFKBS
~HD
7SC
8FD
JQ2
L7M
L~C
L~D
ID FETCH-LOGICAL-c333t-13fd2604f54e98f0e5f633cad920593eb0b2c972d4ffa97b1762db76a1de36f53
ISICitedReferencesCount 3
ISICitedReferencesURI http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000259128800005&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
ISSN 1383-7621
IngestDate Sun Nov 09 08:08:39 EST 2025
Sat Nov 29 01:35:51 EST 2025
Tue Nov 18 22:35:39 EST 2025
Fri Feb 23 02:28:00 EST 2024
IsPeerReviewed true
IsScholarly true
Issue 9
Keywords Parallelism
Skeletons
Scalability
Security
Language English
License https://www.elsevier.com/tdm/userlicense/1.0
LinkModel OpenURL
MergedId FETCHMERGED-LOGICAL-c333t-13fd2604f54e98f0e5f633cad920593eb0b2c972d4ffa97b1762db76a1de36f53
Notes SourceType-Scholarly Journals-1
ObjectType-Feature-1
content type line 14
PQID 218886481
PQPubID 9850
PageCount 9
ParticipantIDs proquest_journals_218886481
crossref_citationtrail_10_1016_j_sysarc_2008_02_008
crossref_primary_10_1016_j_sysarc_2008_02_008
elsevier_sciencedirect_doi_10_1016_j_sysarc_2008_02_008
PublicationCentury 2000
PublicationDate 2008-09-01
PublicationDateYYYYMMDD 2008-09-01
PublicationDate_xml – month: 09
  year: 2008
  text: 2008-09-01
  day: 01
PublicationDecade 2000
PublicationPlace Amsterdam
PublicationPlace_xml – name: Amsterdam
PublicationTitle Journal of systems architecture
PublicationYear 2008
Publisher Elsevier B.V
Elsevier Sequoia S.A
Publisher_xml – name: Elsevier B.V
– name: Elsevier Sequoia S.A
References H. Kuchen, A skeleton library, in: B. Monien, R. Feldman (Eds.), Proceedings of the Eighth International Euro-Par 2002 Parallel Processing, vol. 2400 of LNCS, Springer, Paderborn, Germany, 2002, pp. 620–629.
CoreGRID NoE deliverable series, Institute on Trust and Security, Deliverable D.IA.03 – Survey Material on Trust and Security, 2005. Available at
M. Danelutto, QoS in parallel programming through application managers, in: Proceedings of the International Euromicro PDP: Parallel Distributed and Network-based Processing, IEEE, Lugano, Switzerland, 2005, pp. 282–289.
Cole (bib2) 1989
CoreGRID web site, 2007.
M. Aldinucci, M. Danelutto, The cost of security in skeletal systems, in: P. D’Ambra, M.R. Guarracino (Eds.), Proceedings of the International Euromicro PDP 2007: Parallel Distributed and Network-based Processing, IEEE, Napoli, Italia, 2007, pp. 213–220.
A. Benoit, M. Cole, S. Gilmore, J. Hillston, Using eskel to implement the multiple baseline stereo application, in: G.R. Joubert, W.E. Nagel, F.J. Peters, O. Plata, P. Tirado, E. Zapata (Eds.), Parallel Computing: Current & Future Issues of High-End Computing, Proceedings of the PARCO 2005, vol. 33 of NIC, Research Centre Jülich, Germany, 2005, pp. 673–680.
Serot, Ginhac (bib10) 2002; 28
Bacci, Danelutto, Orlando, Pelagatti, Vanneschi (bib3) 1995; 7
ProActive home page, 2007.
Aldinucci, Petrocelli, Pistoletti, Torquati, Vanneschi, Veraldi, Zoccolo (bib5) 2005; vol. 3648 of LNCS
M. Alt, J. Dünnweber, J. Müller, S. Gorlatch, HOCs: higher-order components for grids, in: Component Models and Systems for Grid Applications, CoreGRID, Springer, 2005, pp. 157–166.
Beecroft, Addison, Hewson, McLaren, Roweth, Petrini, Nieplocha (bib25) 2005; 25
J. Dünnweber, S. Gorlatch, HOC-SA: a grid service architecture for higher-order components, in: IEEE International Conference on Services Computing, Shanghai, China, IEEE, 2004, pp. 288–294.
Vanneschi (bib4) 2002; 28
MPI forum home page, 2007.
A. Benoit, M. Cole, S. Gilmore, J. Hillston, Flexible skeletal programming with eSkel, in: J.C. Cunha, P.D. Medeiros (Eds.), Proceedings of the 11th International Euro-Par 2005 Parallel Processing, vol. 3648 of LNCS, Springer, Lisboa, Portugal, 2005, pp. 761–770.
Aldinucci, Danelutto, Teti (bib13) 2003; 19
Cole (bib6) 2004; 30
Next Generation GRIDs Expert Group, NGG3, Future for European Grids: GRIDs and Service Oriented Knowledge Utilities, Vision and Research Directions 2010 and Beyond, 2006.
.
M. Danelutto, P. Dazzi, Joint structured/non-structured parallelism exploitation through data flow, in: V. Alexandrov, D. van Albada, P.M.A. Sloot, J. Dongarra (Eds.), Proceedings of the ICCS: International Conference on Computational Science, Workshop on Practical Aspects of High-level Parallel Programming, LNCS, Springer, Reading, UK, 2006.
Kephart, Chess (bib23) 2003; 36
Globus web site, 2007.
V. Welch, F. Siebenlist, I. Foster, J. Bresnahan, K. Czajkowski, J. Gawor, C. Kesselman, S. Meder, L. Pearlman, S. Tuecke, Security for grid services, in: Proceedings of the 12th International Symposium on High Performance Distributed Computing (HPDC), IEEE, Los Alamitos, CA, USA, 2003, pp. 48–57.
Geuer-Pollmann, Claessens (bib17) 2005; 10
M. Aldinucci, S. Campa, M. Danelutto, P. Dazzi, P. Kilpatrick, D. Laforenza, N. Tonellotto, Behavioural skeletons for component autonomic management on grids, in: CoreGRID Workshop on Grid Programming Model, Grid and P2P Systems Architecture, Grid Systems, Tools and Environments, Heraklion, Creete, Greece, 2007.
10.1016/j.sysarc.2008.02.008_bib15
Cole (10.1016/j.sysarc.2008.02.008_bib6) 2004; 30
10.1016/j.sysarc.2008.02.008_bib14
10.1016/j.sysarc.2008.02.008_bib12
Aldinucci (10.1016/j.sysarc.2008.02.008_bib13) 2003; 19
10.1016/j.sysarc.2008.02.008_bib19
10.1016/j.sysarc.2008.02.008_bib18
Vanneschi (10.1016/j.sysarc.2008.02.008_bib4) 2002; 28
10.1016/j.sysarc.2008.02.008_bib16
10.1016/j.sysarc.2008.02.008_bib11
Bacci (10.1016/j.sysarc.2008.02.008_bib3) 1995; 7
Kephart (10.1016/j.sysarc.2008.02.008_bib23) 2003; 36
10.1016/j.sysarc.2008.02.008_bib26
Geuer-Pollmann (10.1016/j.sysarc.2008.02.008_bib17) 2005; 10
10.1016/j.sysarc.2008.02.008_bib24
Serot (10.1016/j.sysarc.2008.02.008_bib10) 2002; 28
Beecroft (10.1016/j.sysarc.2008.02.008_bib25) 2005; 25
10.1016/j.sysarc.2008.02.008_bib22
10.1016/j.sysarc.2008.02.008_bib9
10.1016/j.sysarc.2008.02.008_bib21
10.1016/j.sysarc.2008.02.008_bib8
10.1016/j.sysarc.2008.02.008_bib20
10.1016/j.sysarc.2008.02.008_bib7
10.1016/j.sysarc.2008.02.008_bib1
Cole (10.1016/j.sysarc.2008.02.008_bib2) 1989
Aldinucci (10.1016/j.sysarc.2008.02.008_bib5) 2005; vol. 3648 of LNCS
References_xml – year: 1989
  ident: bib2
  article-title: Algorithmic skeletons: structured management of parallel computations
  publication-title: Research Monographs in Parallel and Distributed Computing
– reference: CoreGRID web site, 2007.
– reference: J. Dünnweber, S. Gorlatch, HOC-SA: a grid service architecture for higher-order components, in: IEEE International Conference on Services Computing, Shanghai, China, IEEE, 2004, pp. 288–294.
– volume: 28
  start-page: 1685
  year: 2002
  end-page: 1708
  ident: bib10
  article-title: Skeletons for parallel image processing: an overview of the SKiPPER project
  publication-title: Parallel Computing
– reference: M. Alt, J. Dünnweber, J. Müller, S. Gorlatch, HOCs: higher-order components for grids, in: Component Models and Systems for Grid Applications, CoreGRID, Springer, 2005, pp. 157–166.
– volume: 28
  start-page: 1709
  year: 2002
  end-page: 1732
  ident: bib4
  article-title: The programming model of ASSIST, an environment for parallel and distributed portable applications
  publication-title: Parallel Computing
– reference: Next Generation GRIDs Expert Group, NGG3, Future for European Grids: GRIDs and Service Oriented Knowledge Utilities, Vision and Research Directions 2010 and Beyond, 2006.
– reference: CoreGRID NoE deliverable series, Institute on Trust and Security, Deliverable D.IA.03 – Survey Material on Trust and Security, 2005. Available at:
– reference: ProActive home page, 2007.
– volume: 19
  start-page: 611
  year: 2003
  end-page: 626
  ident: bib13
  article-title: An advanced environment supporting structured parallel programming in Java
  publication-title: Future Generation Computer Systems
– reference: A. Benoit, M. Cole, S. Gilmore, J. Hillston, Flexible skeletal programming with eSkel, in: J.C. Cunha, P.D. Medeiros (Eds.), Proceedings of the 11th International Euro-Par 2005 Parallel Processing, vol. 3648 of LNCS, Springer, Lisboa, Portugal, 2005, pp. 761–770.
– reference: M. Danelutto, QoS in parallel programming through application managers, in: Proceedings of the International Euromicro PDP: Parallel Distributed and Network-based Processing, IEEE, Lugano, Switzerland, 2005, pp. 282–289.
– volume: vol. 3648 of LNCS
  start-page: 771
  year: 2005
  end-page: 781
  ident: bib5
  article-title: Dynamic reconfiguration of grid-aware applications in ASSIST
  publication-title: Proceedings of 11th International Euro-Par 2005 Parallel Processing
– volume: 7
  start-page: 225
  year: 1995
  end-page: 255
  ident: bib3
  article-title: P
  publication-title: Concurrency Practice and Experience
– reference: MPI forum home page, 2007.
– reference: V. Welch, F. Siebenlist, I. Foster, J. Bresnahan, K. Czajkowski, J. Gawor, C. Kesselman, S. Meder, L. Pearlman, S. Tuecke, Security for grid services, in: Proceedings of the 12th International Symposium on High Performance Distributed Computing (HPDC), IEEE, Los Alamitos, CA, USA, 2003, pp. 48–57.
– volume: 36
  start-page: 41
  year: 2003
  end-page: 50
  ident: bib23
  article-title: The vision of autonomic computing
  publication-title: IEEE Computer
– reference: Globus web site, 2007.
– reference: M. Danelutto, P. Dazzi, Joint structured/non-structured parallelism exploitation through data flow, in: V. Alexandrov, D. van Albada, P.M.A. Sloot, J. Dongarra (Eds.), Proceedings of the ICCS: International Conference on Computational Science, Workshop on Practical Aspects of High-level Parallel Programming, LNCS, Springer, Reading, UK, 2006.
– volume: 30
  start-page: 389
  year: 2004
  end-page: 406
  ident: bib6
  article-title: Bringing skeletons out of the closet: a pragmatic manifesto for skeletal parallel programming
  publication-title: Parallel Computing
– reference: A. Benoit, M. Cole, S. Gilmore, J. Hillston, Using eskel to implement the multiple baseline stereo application, in: G.R. Joubert, W.E. Nagel, F.J. Peters, O. Plata, P. Tirado, E. Zapata (Eds.), Parallel Computing: Current & Future Issues of High-End Computing, Proceedings of the PARCO 2005, vol. 33 of NIC, Research Centre Jülich, Germany, 2005, pp. 673–680.
– reference: H. Kuchen, A skeleton library, in: B. Monien, R. Feldman (Eds.), Proceedings of the Eighth International Euro-Par 2002 Parallel Processing, vol. 2400 of LNCS, Springer, Paderborn, Germany, 2002, pp. 620–629.
– volume: 10
  start-page: 15
  year: 2005
  end-page: 24
  ident: bib17
  article-title: Web services and web service security standards
  publication-title: Information Security Technical Report
– reference: M. Aldinucci, S. Campa, M. Danelutto, P. Dazzi, P. Kilpatrick, D. Laforenza, N. Tonellotto, Behavioural skeletons for component autonomic management on grids, in: CoreGRID Workshop on Grid Programming Model, Grid and P2P Systems Architecture, Grid Systems, Tools and Environments, Heraklion, Creete, Greece, 2007.
– volume: 25
  start-page: 34
  year: 2005
  end-page: 47
  ident: bib25
  article-title: QsNet
  publication-title: IEEE Micro
– reference: M. Aldinucci, M. Danelutto, The cost of security in skeletal systems, in: P. D’Ambra, M.R. Guarracino (Eds.), Proceedings of the International Euromicro PDP 2007: Parallel Distributed and Network-based Processing, IEEE, Napoli, Italia, 2007, pp. 213–220.
– reference: .
– volume: 7
  start-page: 225
  issue: 3
  year: 1995
  ident: 10.1016/j.sysarc.2008.02.008_bib3
  article-title: P3L: a structured high level programming language and its structured support
  publication-title: Concurrency Practice and Experience
  doi: 10.1002/cpe.4330070305
– volume: 10
  start-page: 15
  issue: 1
  year: 2005
  ident: 10.1016/j.sysarc.2008.02.008_bib17
  article-title: Web services and web service security standards
  publication-title: Information Security Technical Report
  doi: 10.1016/j.istr.2004.11.001
– volume: 19
  start-page: 611
  issue: 5
  year: 2003
  ident: 10.1016/j.sysarc.2008.02.008_bib13
  article-title: An advanced environment supporting structured parallel programming in Java
  publication-title: Future Generation Computer Systems
  doi: 10.1016/S0167-739X(02)00172-3
– volume: 28
  start-page: 1685
  issue: 12
  year: 2002
  ident: 10.1016/j.sysarc.2008.02.008_bib10
  article-title: Skeletons for parallel image processing: an overview of the SKiPPER project
  publication-title: Parallel Computing
  doi: 10.1016/S0167-8191(02)00189-8
– ident: 10.1016/j.sysarc.2008.02.008_bib16
  doi: 10.1007/0-387-23352-0_10
– ident: 10.1016/j.sysarc.2008.02.008_bib18
  doi: 10.1109/HPDC.2003.1210015
– ident: 10.1016/j.sysarc.2008.02.008_bib24
– ident: 10.1016/j.sysarc.2008.02.008_bib22
– ident: 10.1016/j.sysarc.2008.02.008_bib20
– ident: 10.1016/j.sysarc.2008.02.008_bib8
– volume: 30
  start-page: 389
  issue: 3
  year: 2004
  ident: 10.1016/j.sysarc.2008.02.008_bib6
  article-title: Bringing skeletons out of the closet: a pragmatic manifesto for skeletal parallel programming
  publication-title: Parallel Computing
  doi: 10.1016/j.parco.2003.12.002
– ident: 10.1016/j.sysarc.2008.02.008_bib11
  doi: 10.1109/EMPDP.2005.35
– ident: 10.1016/j.sysarc.2008.02.008_bib21
– ident: 10.1016/j.sysarc.2008.02.008_bib19
– ident: 10.1016/j.sysarc.2008.02.008_bib26
  doi: 10.1109/PDP.2008.46
– ident: 10.1016/j.sysarc.2008.02.008_bib15
  doi: 10.1109/SCC.2004.1358017
– year: 1989
  ident: 10.1016/j.sysarc.2008.02.008_bib2
  article-title: Algorithmic skeletons: structured management of parallel computations
– volume: 28
  start-page: 1709
  issue: 12
  year: 2002
  ident: 10.1016/j.sysarc.2008.02.008_bib4
  article-title: The programming model of ASSIST, an environment for parallel and distributed portable applications
  publication-title: Parallel Computing
  doi: 10.1016/S0167-8191(02)00188-6
– volume: 36
  start-page: 41
  issue: 1
  year: 2003
  ident: 10.1016/j.sysarc.2008.02.008_bib23
  article-title: The vision of autonomic computing
  publication-title: IEEE Computer
  doi: 10.1109/MC.2003.1160055
– ident: 10.1016/j.sysarc.2008.02.008_bib7
– ident: 10.1016/j.sysarc.2008.02.008_bib9
– ident: 10.1016/j.sysarc.2008.02.008_bib14
– volume: vol. 3648 of LNCS
  start-page: 771
  year: 2005
  ident: 10.1016/j.sysarc.2008.02.008_bib5
  article-title: Dynamic reconfiguration of grid-aware applications in ASSIST
– volume: 25
  start-page: 34
  issue: 4
  year: 2005
  ident: 10.1016/j.sysarc.2008.02.008_bib25
  article-title: QsNetII: defining high-performance network design
  publication-title: IEEE Micro
  doi: 10.1109/MM.2005.75
– ident: 10.1016/j.sysarc.2008.02.008_bib1
– ident: 10.1016/j.sysarc.2008.02.008_bib12
SSID ssj0005512
Score 1.7796937
Snippet Algorithmic skeletons have been exploited to implement several parallel programming environments, targeting workstation clusters as well as workstation...
SourceID proquest
crossref
elsevier
SourceType Aggregation Database
Enrichment Source
Index Database
Publisher
StartPage 868
SubjectTerms Algorithms
Cybersecurity
Distributed processing
Parallelism
Performance evaluation
Scalability
Security
Skeletons
Studies
Work stations
Title Securing skeletal systems with limited performance penalty: The muskel experience
URI https://dx.doi.org/10.1016/j.sysarc.2008.02.008
https://www.proquest.com/docview/218886481
Volume 54
WOSCitedRecordID wos000259128800005&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVESC
  databaseName: Elsevier SD Freedom Collection Journals 2021
  customDbUrl:
  eissn: 1873-6165
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0005512
  issn: 1383-7621
  databaseCode: AIEXJ
  dateStart: 19960101
  isFulltext: true
  titleUrlDefault: https://www.sciencedirect.com
  providerName: Elsevier
link http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV3Nb9MwFLdKx4ELjC8xBpMPiMuUqYmd2N6tQp02NBXQOqk3K05s1K2k3dpO29_BP8xzbSeBCgYHLklkx1bs98uzn98XQu-MKg2I0iJSINBGNCsU8MFcRymH5TvmQifUJZtgwyEfj8XnTud78IW5mbKq4re3Yv5fSQ1lQGzrOvsP5K47hQJ4BqLDFcgO178ivD9B_7q_uIQlxfo6umjN3o9t6jyabLzi2mNgrqHX5V2wwPi2sk198H8dULG5gw39tpURNYCsUmtVFBPvEFTMmjPxSsP41-mbWjXh5IHXplX-OCy4xJzpq9Vsku-fHfRbnBRE3wg4rXtfuzLOCMiqLjlEYL8uhrSHmWjxUu7y7WzweHfccHEAg4Rv9OawNuwqb9a0oMcffpJH56encjQYj36udRKQVfpSDozt_fwqsqnIrMre52V5gLYSlgreRVv9k8H4Y2M5lDolehhh8Mhcmw1uftXvdjy_rP3rDc1oGz32dMR9h6CnqKOrZ-hJyPKBPdN_jr4EQOEAKOwJjy2gsAcUbgEKe0AdYoATdnDCDZxeoPOjwejDceQTcUQFIWQZxcSUIPdSk1ItuOnp1GSEFHkpEpsRUqueSgrBkpIakwumYpiVUrEsj0tNMpOSl6hbzSr9CuFM0IQZShhIsrSnhGJ5miqTm5gwQlO2g0iYLFn4KPU2WcpUBnPEC-mm2CdQTSTcdlBUt5q7KC33vM8CHaTfabodpASQ3dNyN5BN-p9-IYGpcZ5RHr_-Y-0uetT8Rm9Qd3m90m_Rw-JmOVlc73mU_QB34apM
linkProvider Elsevier
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Securing+skeletal+systems+with+limited+performance+penalty%3A+The+muskel+experience&rft.jtitle=Journal+of+systems+architecture&rft.au=Aldinucci%2C+Marco&rft.au=Danelutto%2C+Marco&rft.date=2008-09-01&rft.pub=Elsevier+Sequoia+S.A&rft.issn=1383-7621&rft.eissn=1873-6165&rft.volume=54&rft.issue=9&rft.spage=868&rft_id=info:doi/10.1016%2Fj.sysarc.2008.02.008&rft.externalDBID=NO_FULL_TEXT&rft.externalDocID=1565748031
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1383-7621&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1383-7621&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1383-7621&client=summon