Securing skeletal systems with limited performance penalty: The muskel experience
Algorithmic skeletons have been exploited to implement several parallel programming environments, targeting workstation clusters as well as workstation networks and computational grids. When targeting non-dedicated clusters, workstation networks and grids, security has to be taken adequately into ac...
Uloženo v:
| Vydáno v: | Journal of systems architecture Ročník 54; číslo 9; s. 868 - 876 |
|---|---|
| Hlavní autoři: | , |
| Médium: | Journal Article |
| Jazyk: | angličtina |
| Vydáno: |
Amsterdam
Elsevier B.V
01.09.2008
Elsevier Sequoia S.A |
| Témata: | |
| ISSN: | 1383-7621, 1873-6165 |
| On-line přístup: | Získat plný text |
| Tagy: |
Přidat tag
Žádné tagy, Buďte první, kdo vytvoří štítek k tomuto záznamu!
|
| Abstract | Algorithmic skeletons have been exploited to implement several parallel programming environments, targeting workstation clusters as well as workstation networks and computational grids. When targeting non-dedicated clusters, workstation networks and grids, security has to be taken adequately into account in order to guarantee both code and data confidentiality and integrity. However, introducing security is usually an expensive activity, both in terms of the effort required to managed security mechanisms and in terms of the time spent performing security related activities at run time.
We discuss the cost of security introduction as well as how some features typical of skeleton technology can be exploited to improve the efficiency code and data securing in a typical skeleton based parallel programming environment and we evaluate the performance cost of security mechanisms implemented exploiting state of the art tools. In particular, we take into account the cost of security introduction in
muskel, a Java based skeletal system exploiting macro data flow implementation technology. We consider the adoption of mechanisms that allow securing all the communications involving remote, unreliable nodes and we evaluate the cost of such mechanisms. Also, we consider the implications on the computational grains needed to scale secure and insecure skeletal computations. |
|---|---|
| AbstractList | Algorithmic skeletons have been exploited to implement several parallel programming environments, targeting workstation clusters as well as workstation networks and computational grids. When targeting non-dedicated clusters, workstation networks and grids, security has to be taken adequately into account in order to guarantee both code and data confidentiality and integrity. However, introducing security is usually an expensive activity, both in terms of the effort required to managed security mechanisms and in terms of the time spent performing security related activities at run time. We discuss the cost of security introduction as well as how some features typical of skeleton technology can be exploited to improve the efficiency code and data securing in a typical skeleton based parallel programming environment and we evaluate the performance cost of security mechanisms implemented exploiting state of the art tools. In particular, we take into account the cost of security introduction in muskel, a Java based skeletal system exploiting macro data flow implementation technology. We consider the adoption of mechanisms that allow securing all the communications involving remote, unreliable nodes and we evaluate the cost of such mechanisms. Also, we consider the implications on the computational grains needed to scale secure and insecure skeletal computations. [PUBLICATION ABSTRACT] Algorithmic skeletons have been exploited to implement several parallel programming environments, targeting workstation clusters as well as workstation networks and computational grids. When targeting non-dedicated clusters, workstation networks and grids, security has to be taken adequately into account in order to guarantee both code and data confidentiality and integrity. However, introducing security is usually an expensive activity, both in terms of the effort required to managed security mechanisms and in terms of the time spent performing security related activities at run time. We discuss the cost of security introduction as well as how some features typical of skeleton technology can be exploited to improve the efficiency code and data securing in a typical skeleton based parallel programming environment and we evaluate the performance cost of security mechanisms implemented exploiting state of the art tools. In particular, we take into account the cost of security introduction in muskel, a Java based skeletal system exploiting macro data flow implementation technology. We consider the adoption of mechanisms that allow securing all the communications involving remote, unreliable nodes and we evaluate the cost of such mechanisms. Also, we consider the implications on the computational grains needed to scale secure and insecure skeletal computations. |
| Author | Danelutto, Marco Aldinucci, Marco |
| Author_xml | – sequence: 1 givenname: Marco surname: Aldinucci fullname: Aldinucci, Marco email: aldinuc@di.unipi.it – sequence: 2 givenname: Marco surname: Danelutto fullname: Danelutto, Marco email: marcod@di.unipi.it |
| BookMark | eNqFkEtPwzAQhC1UJErhH3CIuCf4kThJD0io4iVVQohythxnTR3yKLYL9N_jEk4c4DQr7Xyj3TlGk37oAaEzghOCCb9oErdz0qqEYlwkmCZBDtCUFDmLOeHZJMysYHHOKTlCx841GOMsI3SKHp9Aba3pXyL3Ci142UYhy0Pnog_j11FrOuOhjjZg9WA72SsIcy9bv5tHqzVE3XYPRvAZHAbC-gQdatk6OP3RGXq-uV4t7uLlw-394moZK8aYjwnTNeU41VkKZaExZJozpmRdUpyVDCpcUVXmtE61lmVekXB8XeVckhoY1xmbofMxd2OHty04L5pha8NlTlBSFAVPCxJM89Gk7OCcBS2U8dKbofdWmlYQLPYNikaMDYp9gwJTESTA6S94Y00n7e4_7HLEIHz_bsAKp76bqY0F5UU9mL8DvgCFRpCY |
| CitedBy_id | crossref_primary_10_1002_spe_1026 |
| Cites_doi | 10.1002/cpe.4330070305 10.1016/j.istr.2004.11.001 10.1016/S0167-739X(02)00172-3 10.1016/S0167-8191(02)00189-8 10.1007/0-387-23352-0_10 10.1109/HPDC.2003.1210015 10.1016/j.parco.2003.12.002 10.1109/EMPDP.2005.35 10.1109/PDP.2008.46 10.1109/SCC.2004.1358017 10.1016/S0167-8191(02)00188-6 10.1109/MC.2003.1160055 10.1109/MM.2005.75 |
| ContentType | Journal Article |
| Copyright | 2008 Elsevier B.V. Copyright Elsevier Sequoia S.A. Sep 2008 |
| Copyright_xml | – notice: 2008 Elsevier B.V. – notice: Copyright Elsevier Sequoia S.A. Sep 2008 |
| DBID | AAYXX CITATION 7SC 8FD JQ2 L7M L~C L~D |
| DOI | 10.1016/j.sysarc.2008.02.008 |
| DatabaseName | CrossRef Computer and Information Systems Abstracts Technology Research Database ProQuest Computer Science Collection Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Academic Computer and Information Systems Abstracts Professional |
| DatabaseTitle | CrossRef Computer and Information Systems Abstracts Technology Research Database Computer and Information Systems Abstracts – Academic Advanced Technologies Database with Aerospace ProQuest Computer Science Collection Computer and Information Systems Abstracts Professional |
| DatabaseTitleList | Computer and Information Systems Abstracts |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Computer Science |
| EISSN | 1873-6165 |
| EndPage | 876 |
| ExternalDocumentID | 1565748031 10_1016_j_sysarc_2008_02_008 S1383762108000374 |
| Genre | Feature |
| GroupedDBID | --K --M -~X .DC .~1 0R~ 1B1 1~. 1~5 29L 4.4 457 4G. 5GY 5VS 7-5 71M 8P~ AACTN AAEDT AAEDW AAIAV AAIKJ AAKOC AALRI AAOAW AAQFI AAQXK AAXUO AAYFN ABBOA ABFNM ABFRF ABJNI ABMAC ABXDB ABYKQ ACDAQ ACGFO ACGFS ACNNM ACRLP ACZNC ADBBV ADEZE ADJOM ADMUD ADTZH AEBSH AECPX AEFWE AEKER AENEX AFKWA AFTJW AGHFR AGUBO AGYEJ AHJVU AHZHX AIALX AIEXJ AIKHN AITUG AJBFU AJOXV ALMA_UNASSIGNED_HOLDINGS AMFUW AMRAJ AOUOD ASPBG AVWKF AXJTR AZFZN BJAXD BKOJK BKOMP BLXMC CS3 DU5 EBS EFJIC EFLBG EJD EO8 EO9 EP2 EP3 FDB FEDTE FGOYB FIRID FNPLU FYGXN G-Q GBLVA GBOLZ HVGLF HZ~ IHE J1W JJJVA KOM M41 MO0 MS~ N9A O-L O9- OAUVE OZT P-8 P-9 P2P PC. PQQKQ Q38 R2- RIG ROL RPZ RXW SBC SDF SDG SDP SES SEW SPC SPCBC SST SSV SSZ T5K TAE TN5 U5U UHS ~G- 9DU AATTM AAXKI AAYWO AAYXX ABWVN ACLOT ACRPL ACVFH ADCNI ADNMO AEIPS AEUPX AFJKZ AFPUW AGQPQ AIGII AIIUN AKBMS AKRWK AKYEP ANKPU APXCP CITATION EFKBS ~HD 7SC 8FD JQ2 L7M L~C L~D |
| ID | FETCH-LOGICAL-c333t-13fd2604f54e98f0e5f633cad920593eb0b2c972d4ffa97b1762db76a1de36f53 |
| ISICitedReferencesCount | 3 |
| ISICitedReferencesURI | http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000259128800005&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| ISSN | 1383-7621 |
| IngestDate | Sun Nov 09 08:08:39 EST 2025 Sat Nov 29 01:35:51 EST 2025 Tue Nov 18 22:35:39 EST 2025 Fri Feb 23 02:28:00 EST 2024 |
| IsPeerReviewed | true |
| IsScholarly | true |
| Issue | 9 |
| Keywords | Parallelism Skeletons Scalability Security |
| Language | English |
| License | https://www.elsevier.com/tdm/userlicense/1.0 |
| LinkModel | OpenURL |
| MergedId | FETCHMERGED-LOGICAL-c333t-13fd2604f54e98f0e5f633cad920593eb0b2c972d4ffa97b1762db76a1de36f53 |
| Notes | SourceType-Scholarly Journals-1 ObjectType-Feature-1 content type line 14 |
| PQID | 218886481 |
| PQPubID | 9850 |
| PageCount | 9 |
| ParticipantIDs | proquest_journals_218886481 crossref_citationtrail_10_1016_j_sysarc_2008_02_008 crossref_primary_10_1016_j_sysarc_2008_02_008 elsevier_sciencedirect_doi_10_1016_j_sysarc_2008_02_008 |
| PublicationCentury | 2000 |
| PublicationDate | 2008-09-01 |
| PublicationDateYYYYMMDD | 2008-09-01 |
| PublicationDate_xml | – month: 09 year: 2008 text: 2008-09-01 day: 01 |
| PublicationDecade | 2000 |
| PublicationPlace | Amsterdam |
| PublicationPlace_xml | – name: Amsterdam |
| PublicationTitle | Journal of systems architecture |
| PublicationYear | 2008 |
| Publisher | Elsevier B.V Elsevier Sequoia S.A |
| Publisher_xml | – name: Elsevier B.V – name: Elsevier Sequoia S.A |
| References | H. Kuchen, A skeleton library, in: B. Monien, R. Feldman (Eds.), Proceedings of the Eighth International Euro-Par 2002 Parallel Processing, vol. 2400 of LNCS, Springer, Paderborn, Germany, 2002, pp. 620–629. CoreGRID NoE deliverable series, Institute on Trust and Security, Deliverable D.IA.03 – Survey Material on Trust and Security, 2005. Available at M. Danelutto, QoS in parallel programming through application managers, in: Proceedings of the International Euromicro PDP: Parallel Distributed and Network-based Processing, IEEE, Lugano, Switzerland, 2005, pp. 282–289. Cole (bib2) 1989 CoreGRID web site, 2007. M. Aldinucci, M. Danelutto, The cost of security in skeletal systems, in: P. D’Ambra, M.R. Guarracino (Eds.), Proceedings of the International Euromicro PDP 2007: Parallel Distributed and Network-based Processing, IEEE, Napoli, Italia, 2007, pp. 213–220. A. Benoit, M. Cole, S. Gilmore, J. Hillston, Using eskel to implement the multiple baseline stereo application, in: G.R. Joubert, W.E. Nagel, F.J. Peters, O. Plata, P. Tirado, E. Zapata (Eds.), Parallel Computing: Current & Future Issues of High-End Computing, Proceedings of the PARCO 2005, vol. 33 of NIC, Research Centre Jülich, Germany, 2005, pp. 673–680. Serot, Ginhac (bib10) 2002; 28 Bacci, Danelutto, Orlando, Pelagatti, Vanneschi (bib3) 1995; 7 ProActive home page, 2007. Aldinucci, Petrocelli, Pistoletti, Torquati, Vanneschi, Veraldi, Zoccolo (bib5) 2005; vol. 3648 of LNCS M. Alt, J. Dünnweber, J. Müller, S. Gorlatch, HOCs: higher-order components for grids, in: Component Models and Systems for Grid Applications, CoreGRID, Springer, 2005, pp. 157–166. Beecroft, Addison, Hewson, McLaren, Roweth, Petrini, Nieplocha (bib25) 2005; 25 J. Dünnweber, S. Gorlatch, HOC-SA: a grid service architecture for higher-order components, in: IEEE International Conference on Services Computing, Shanghai, China, IEEE, 2004, pp. 288–294. Vanneschi (bib4) 2002; 28 MPI forum home page, 2007. A. Benoit, M. Cole, S. Gilmore, J. Hillston, Flexible skeletal programming with eSkel, in: J.C. Cunha, P.D. Medeiros (Eds.), Proceedings of the 11th International Euro-Par 2005 Parallel Processing, vol. 3648 of LNCS, Springer, Lisboa, Portugal, 2005, pp. 761–770. Aldinucci, Danelutto, Teti (bib13) 2003; 19 Cole (bib6) 2004; 30 Next Generation GRIDs Expert Group, NGG3, Future for European Grids: GRIDs and Service Oriented Knowledge Utilities, Vision and Research Directions 2010 and Beyond, 2006. . M. Danelutto, P. Dazzi, Joint structured/non-structured parallelism exploitation through data flow, in: V. Alexandrov, D. van Albada, P.M.A. Sloot, J. Dongarra (Eds.), Proceedings of the ICCS: International Conference on Computational Science, Workshop on Practical Aspects of High-level Parallel Programming, LNCS, Springer, Reading, UK, 2006. Kephart, Chess (bib23) 2003; 36 Globus web site, 2007. V. Welch, F. Siebenlist, I. Foster, J. Bresnahan, K. Czajkowski, J. Gawor, C. Kesselman, S. Meder, L. Pearlman, S. Tuecke, Security for grid services, in: Proceedings of the 12th International Symposium on High Performance Distributed Computing (HPDC), IEEE, Los Alamitos, CA, USA, 2003, pp. 48–57. Geuer-Pollmann, Claessens (bib17) 2005; 10 M. Aldinucci, S. Campa, M. Danelutto, P. Dazzi, P. Kilpatrick, D. Laforenza, N. Tonellotto, Behavioural skeletons for component autonomic management on grids, in: CoreGRID Workshop on Grid Programming Model, Grid and P2P Systems Architecture, Grid Systems, Tools and Environments, Heraklion, Creete, Greece, 2007. 10.1016/j.sysarc.2008.02.008_bib15 Cole (10.1016/j.sysarc.2008.02.008_bib6) 2004; 30 10.1016/j.sysarc.2008.02.008_bib14 10.1016/j.sysarc.2008.02.008_bib12 Aldinucci (10.1016/j.sysarc.2008.02.008_bib13) 2003; 19 10.1016/j.sysarc.2008.02.008_bib19 10.1016/j.sysarc.2008.02.008_bib18 Vanneschi (10.1016/j.sysarc.2008.02.008_bib4) 2002; 28 10.1016/j.sysarc.2008.02.008_bib16 10.1016/j.sysarc.2008.02.008_bib11 Bacci (10.1016/j.sysarc.2008.02.008_bib3) 1995; 7 Kephart (10.1016/j.sysarc.2008.02.008_bib23) 2003; 36 10.1016/j.sysarc.2008.02.008_bib26 Geuer-Pollmann (10.1016/j.sysarc.2008.02.008_bib17) 2005; 10 10.1016/j.sysarc.2008.02.008_bib24 Serot (10.1016/j.sysarc.2008.02.008_bib10) 2002; 28 Beecroft (10.1016/j.sysarc.2008.02.008_bib25) 2005; 25 10.1016/j.sysarc.2008.02.008_bib22 10.1016/j.sysarc.2008.02.008_bib9 10.1016/j.sysarc.2008.02.008_bib21 10.1016/j.sysarc.2008.02.008_bib8 10.1016/j.sysarc.2008.02.008_bib20 10.1016/j.sysarc.2008.02.008_bib7 10.1016/j.sysarc.2008.02.008_bib1 Cole (10.1016/j.sysarc.2008.02.008_bib2) 1989 Aldinucci (10.1016/j.sysarc.2008.02.008_bib5) 2005; vol. 3648 of LNCS |
| References_xml | – year: 1989 ident: bib2 article-title: Algorithmic skeletons: structured management of parallel computations publication-title: Research Monographs in Parallel and Distributed Computing – reference: CoreGRID web site, 2007. – reference: J. Dünnweber, S. Gorlatch, HOC-SA: a grid service architecture for higher-order components, in: IEEE International Conference on Services Computing, Shanghai, China, IEEE, 2004, pp. 288–294. – volume: 28 start-page: 1685 year: 2002 end-page: 1708 ident: bib10 article-title: Skeletons for parallel image processing: an overview of the SKiPPER project publication-title: Parallel Computing – reference: M. Alt, J. Dünnweber, J. Müller, S. Gorlatch, HOCs: higher-order components for grids, in: Component Models and Systems for Grid Applications, CoreGRID, Springer, 2005, pp. 157–166. – volume: 28 start-page: 1709 year: 2002 end-page: 1732 ident: bib4 article-title: The programming model of ASSIST, an environment for parallel and distributed portable applications publication-title: Parallel Computing – reference: Next Generation GRIDs Expert Group, NGG3, Future for European Grids: GRIDs and Service Oriented Knowledge Utilities, Vision and Research Directions 2010 and Beyond, 2006. – reference: CoreGRID NoE deliverable series, Institute on Trust and Security, Deliverable D.IA.03 – Survey Material on Trust and Security, 2005. Available at: – reference: ProActive home page, 2007. – volume: 19 start-page: 611 year: 2003 end-page: 626 ident: bib13 article-title: An advanced environment supporting structured parallel programming in Java publication-title: Future Generation Computer Systems – reference: A. Benoit, M. Cole, S. Gilmore, J. Hillston, Flexible skeletal programming with eSkel, in: J.C. Cunha, P.D. Medeiros (Eds.), Proceedings of the 11th International Euro-Par 2005 Parallel Processing, vol. 3648 of LNCS, Springer, Lisboa, Portugal, 2005, pp. 761–770. – reference: M. Danelutto, QoS in parallel programming through application managers, in: Proceedings of the International Euromicro PDP: Parallel Distributed and Network-based Processing, IEEE, Lugano, Switzerland, 2005, pp. 282–289. – volume: vol. 3648 of LNCS start-page: 771 year: 2005 end-page: 781 ident: bib5 article-title: Dynamic reconfiguration of grid-aware applications in ASSIST publication-title: Proceedings of 11th International Euro-Par 2005 Parallel Processing – volume: 7 start-page: 225 year: 1995 end-page: 255 ident: bib3 article-title: P publication-title: Concurrency Practice and Experience – reference: MPI forum home page, 2007. – reference: V. Welch, F. Siebenlist, I. Foster, J. Bresnahan, K. Czajkowski, J. Gawor, C. Kesselman, S. Meder, L. Pearlman, S. Tuecke, Security for grid services, in: Proceedings of the 12th International Symposium on High Performance Distributed Computing (HPDC), IEEE, Los Alamitos, CA, USA, 2003, pp. 48–57. – volume: 36 start-page: 41 year: 2003 end-page: 50 ident: bib23 article-title: The vision of autonomic computing publication-title: IEEE Computer – reference: Globus web site, 2007. – reference: M. Danelutto, P. Dazzi, Joint structured/non-structured parallelism exploitation through data flow, in: V. Alexandrov, D. van Albada, P.M.A. Sloot, J. Dongarra (Eds.), Proceedings of the ICCS: International Conference on Computational Science, Workshop on Practical Aspects of High-level Parallel Programming, LNCS, Springer, Reading, UK, 2006. – volume: 30 start-page: 389 year: 2004 end-page: 406 ident: bib6 article-title: Bringing skeletons out of the closet: a pragmatic manifesto for skeletal parallel programming publication-title: Parallel Computing – reference: A. Benoit, M. Cole, S. Gilmore, J. Hillston, Using eskel to implement the multiple baseline stereo application, in: G.R. Joubert, W.E. Nagel, F.J. Peters, O. Plata, P. Tirado, E. Zapata (Eds.), Parallel Computing: Current & Future Issues of High-End Computing, Proceedings of the PARCO 2005, vol. 33 of NIC, Research Centre Jülich, Germany, 2005, pp. 673–680. – reference: H. Kuchen, A skeleton library, in: B. Monien, R. Feldman (Eds.), Proceedings of the Eighth International Euro-Par 2002 Parallel Processing, vol. 2400 of LNCS, Springer, Paderborn, Germany, 2002, pp. 620–629. – volume: 10 start-page: 15 year: 2005 end-page: 24 ident: bib17 article-title: Web services and web service security standards publication-title: Information Security Technical Report – reference: M. Aldinucci, S. Campa, M. Danelutto, P. Dazzi, P. Kilpatrick, D. Laforenza, N. Tonellotto, Behavioural skeletons for component autonomic management on grids, in: CoreGRID Workshop on Grid Programming Model, Grid and P2P Systems Architecture, Grid Systems, Tools and Environments, Heraklion, Creete, Greece, 2007. – volume: 25 start-page: 34 year: 2005 end-page: 47 ident: bib25 article-title: QsNet publication-title: IEEE Micro – reference: M. Aldinucci, M. Danelutto, The cost of security in skeletal systems, in: P. D’Ambra, M.R. Guarracino (Eds.), Proceedings of the International Euromicro PDP 2007: Parallel Distributed and Network-based Processing, IEEE, Napoli, Italia, 2007, pp. 213–220. – reference: . – volume: 7 start-page: 225 issue: 3 year: 1995 ident: 10.1016/j.sysarc.2008.02.008_bib3 article-title: P3L: a structured high level programming language and its structured support publication-title: Concurrency Practice and Experience doi: 10.1002/cpe.4330070305 – volume: 10 start-page: 15 issue: 1 year: 2005 ident: 10.1016/j.sysarc.2008.02.008_bib17 article-title: Web services and web service security standards publication-title: Information Security Technical Report doi: 10.1016/j.istr.2004.11.001 – volume: 19 start-page: 611 issue: 5 year: 2003 ident: 10.1016/j.sysarc.2008.02.008_bib13 article-title: An advanced environment supporting structured parallel programming in Java publication-title: Future Generation Computer Systems doi: 10.1016/S0167-739X(02)00172-3 – volume: 28 start-page: 1685 issue: 12 year: 2002 ident: 10.1016/j.sysarc.2008.02.008_bib10 article-title: Skeletons for parallel image processing: an overview of the SKiPPER project publication-title: Parallel Computing doi: 10.1016/S0167-8191(02)00189-8 – ident: 10.1016/j.sysarc.2008.02.008_bib16 doi: 10.1007/0-387-23352-0_10 – ident: 10.1016/j.sysarc.2008.02.008_bib18 doi: 10.1109/HPDC.2003.1210015 – ident: 10.1016/j.sysarc.2008.02.008_bib24 – ident: 10.1016/j.sysarc.2008.02.008_bib22 – ident: 10.1016/j.sysarc.2008.02.008_bib20 – ident: 10.1016/j.sysarc.2008.02.008_bib8 – volume: 30 start-page: 389 issue: 3 year: 2004 ident: 10.1016/j.sysarc.2008.02.008_bib6 article-title: Bringing skeletons out of the closet: a pragmatic manifesto for skeletal parallel programming publication-title: Parallel Computing doi: 10.1016/j.parco.2003.12.002 – ident: 10.1016/j.sysarc.2008.02.008_bib11 doi: 10.1109/EMPDP.2005.35 – ident: 10.1016/j.sysarc.2008.02.008_bib21 – ident: 10.1016/j.sysarc.2008.02.008_bib19 – ident: 10.1016/j.sysarc.2008.02.008_bib26 doi: 10.1109/PDP.2008.46 – ident: 10.1016/j.sysarc.2008.02.008_bib15 doi: 10.1109/SCC.2004.1358017 – year: 1989 ident: 10.1016/j.sysarc.2008.02.008_bib2 article-title: Algorithmic skeletons: structured management of parallel computations – volume: 28 start-page: 1709 issue: 12 year: 2002 ident: 10.1016/j.sysarc.2008.02.008_bib4 article-title: The programming model of ASSIST, an environment for parallel and distributed portable applications publication-title: Parallel Computing doi: 10.1016/S0167-8191(02)00188-6 – volume: 36 start-page: 41 issue: 1 year: 2003 ident: 10.1016/j.sysarc.2008.02.008_bib23 article-title: The vision of autonomic computing publication-title: IEEE Computer doi: 10.1109/MC.2003.1160055 – ident: 10.1016/j.sysarc.2008.02.008_bib7 – ident: 10.1016/j.sysarc.2008.02.008_bib9 – ident: 10.1016/j.sysarc.2008.02.008_bib14 – volume: vol. 3648 of LNCS start-page: 771 year: 2005 ident: 10.1016/j.sysarc.2008.02.008_bib5 article-title: Dynamic reconfiguration of grid-aware applications in ASSIST – volume: 25 start-page: 34 issue: 4 year: 2005 ident: 10.1016/j.sysarc.2008.02.008_bib25 article-title: QsNetII: defining high-performance network design publication-title: IEEE Micro doi: 10.1109/MM.2005.75 – ident: 10.1016/j.sysarc.2008.02.008_bib1 – ident: 10.1016/j.sysarc.2008.02.008_bib12 |
| SSID | ssj0005512 |
| Score | 1.7796937 |
| Snippet | Algorithmic skeletons have been exploited to implement several parallel programming environments, targeting workstation clusters as well as workstation... |
| SourceID | proquest crossref elsevier |
| SourceType | Aggregation Database Enrichment Source Index Database Publisher |
| StartPage | 868 |
| SubjectTerms | Algorithms Cybersecurity Distributed processing Parallelism Performance evaluation Scalability Security Skeletons Studies Work stations |
| Title | Securing skeletal systems with limited performance penalty: The muskel experience |
| URI | https://dx.doi.org/10.1016/j.sysarc.2008.02.008 https://www.proquest.com/docview/218886481 |
| Volume | 54 |
| WOSCitedRecordID | wos000259128800005&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVESC databaseName: Elsevier SD Freedom Collection Journals 2021 customDbUrl: eissn: 1873-6165 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0005512 issn: 1383-7621 databaseCode: AIEXJ dateStart: 19960101 isFulltext: true titleUrlDefault: https://www.sciencedirect.com providerName: Elsevier |
| link | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV3Nb9MwFLdKx4ELjC8xBpMPiMuUqYmd2N6tQp02NBXQOqk3K05s1K2k3dpO29_BP8xzbSeBCgYHLklkx1bs98uzn98XQu-MKg2I0iJSINBGNCsU8MFcRymH5TvmQifUJZtgwyEfj8XnTud78IW5mbKq4re3Yv5fSQ1lQGzrOvsP5K47hQJ4BqLDFcgO178ivD9B_7q_uIQlxfo6umjN3o9t6jyabLzi2mNgrqHX5V2wwPi2sk198H8dULG5gw39tpURNYCsUmtVFBPvEFTMmjPxSsP41-mbWjXh5IHXplX-OCy4xJzpq9Vsku-fHfRbnBRE3wg4rXtfuzLOCMiqLjlEYL8uhrSHmWjxUu7y7WzweHfccHEAg4Rv9OawNuwqb9a0oMcffpJH56encjQYj36udRKQVfpSDozt_fwqsqnIrMre52V5gLYSlgreRVv9k8H4Y2M5lDolehhh8Mhcmw1uftXvdjy_rP3rDc1oGz32dMR9h6CnqKOrZ-hJyPKBPdN_jr4EQOEAKOwJjy2gsAcUbgEKe0AdYoATdnDCDZxeoPOjwejDceQTcUQFIWQZxcSUIPdSk1ItuOnp1GSEFHkpEpsRUqueSgrBkpIakwumYpiVUrEsj0tNMpOSl6hbzSr9CuFM0IQZShhIsrSnhGJ5miqTm5gwQlO2g0iYLFn4KPU2WcpUBnPEC-mm2CdQTSTcdlBUt5q7KC33vM8CHaTfabodpASQ3dNyN5BN-p9-IYGpcZ5RHr_-Y-0uetT8Rm9Qd3m90m_Rw-JmOVlc73mU_QB34apM |
| linkProvider | Elsevier |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Securing+skeletal+systems+with+limited+performance+penalty%3A+The+muskel+experience&rft.jtitle=Journal+of+systems+architecture&rft.au=Aldinucci%2C+Marco&rft.au=Danelutto%2C+Marco&rft.date=2008-09-01&rft.pub=Elsevier+Sequoia+S.A&rft.issn=1383-7621&rft.eissn=1873-6165&rft.volume=54&rft.issue=9&rft.spage=868&rft_id=info:doi/10.1016%2Fj.sysarc.2008.02.008&rft.externalDBID=NO_FULL_TEXT&rft.externalDocID=1565748031 |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1383-7621&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1383-7621&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1383-7621&client=summon |