Depending on the amount of data to process, file generation may take longer.

If it takes too long to generate, you can limit the data by, for example, reducing the range of years.


Download file Download BibTeX


Security Aspects in Resource Management Systems in Distributed Computing Environments


[ 1 ] Instytut Informatyki, Wydział Informatyki, Politechnika Poznańska | [ P ] employee

Scientific discipline (Law 2.0)

[2.3] Information and communication technology

Year of publication


Published in

Foundations of Computing and Decision Sciences

Journal year: 2017 | Journal volume: vol. 42 | Journal number: no. 4

Article type

scientific article

Publication language


  • security
  • reputation
  • distributed systems
  • resource management

EN In many distributed computing systems, aspects related to security are getting more and more relevant. Security is ubiquitous and could not be treated as a separated problem or a challenge. In our opinion it should be considered in the context of resource management in distributed computing environments like Grids and Clouds, e.g. scheduled computations can be much delayed because of cyber-attacks, inefficient infrastructure or users valuable and sensitive data can be stolen even in the process of correct computation. To prevent such cases there is a need to introduce new evaluation metrics for resource management that will represent the level of security of computing resources and more broadly distributed computing infrastructures. In our approach, we have introduced a new metric called reputation, which simply determines the level of reliability of computing resources from the security perspective and could be taken into account during scheduling procedures. The new reputation metric is based on various relevant parameters regarding cyber-attacks (also energy attacks), administrative activities such as security updates, bug fixes and security patches. Moreover, we have conducted various computational experiments within the Grid Scheduling Simulator environment (GSSIM) inspired by real application scenarios. Finally, our experimental studies of new resource management approaches taking into account critical security aspects are also discussed in this paper.

Date of online publication


Pages (from - to)

299 - 313




License type

CC BY-NC-ND (attribution - noncommercial - no derivatives)

Open Access Mode

publisher's website

Open Access Text Version

final published version

Date of Open Access to the publication

at the time of publication

Full text of article

Download file

Access level to full text


Ministry points / journal


Ministry points / journal in years 2017-2021


This website uses cookies to remember the authenticated session of the user. For more information, read about Cookies and Privacy Policy.