Secure application deployment in the Hierarchical Local Desktop Grid

  • Attila Csaba Marosi
  • Gábor Gombás
  • Zoltán Balaton


Mutual Authentication Application Developer Desktop Grid Master Side Application Registration 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. [1]
    Berkeley Open Infrastructure For Network Computing.
  2. [2]
    D. P. Anderson: BOINC: A System for Public-Resource Computing and Storage. 5th IEEE/ACM International Workshop on Grid Computing, November 8, 2004, Pittsburgh, USA.Google Scholar
  3. [3]
    SETI@home: Search for Extraterrestrial Intelligence at Home.
  4. [4]
    Peter Kacsuk, Norbert Podhorszki and Tamas Kiss. Scalable Desktop Grid System. Technical report, TR-0006, Institute on System Architecture, CoreGRID - Network of Excellence, May 2005.Google Scholar
  5. [5]
    Jakob Gregor Pedersen & Christian Ulrik Sottrup. Developing Distributed Computing Solutions Combining Grid Computing and Public Computing. Master’s thesis from University of Copenhagen, 2005.Google Scholar
  6. [6]
    SZTAKI Desktop Grid.
  7. [7]
  8. [8]
    Sun Microsystems, JXTA.
  9. [9], The fastest computer on earth.
  10. [10]
    Entropia, Inc.
  11. [11]
    I. Foster, The Grid: Blueprint For a New Computing Infrastructure, Morgan Kaufmann, Los Altos, CA, 1998.Google Scholar
  12. [12]
    I. Foster, C. Kesselman, S. Tuecke, The anatomy of the grid: Enabling scalable virtual organizations, Internat. J. Supercomput. Appl. 15 (3) (2001) 200-222.CrossRefGoogle Scholar
  13. [13]
    A. Grimshaw, W. Wulf, The legion vision of a worldwide virtual computer, Comm. ACM 40,1997,39-45.CrossRefGoogle Scholar
  14. [14]
    Foster, I., Kesselman, C., Tsudik, G. and Tuecke, S. A Security Architecture for Computational Grids. In ACM Conference on Computers and Security, 83-91.Google Scholar
  15. [15]
    Myers, D.S., and M. P. Cummings. Necessity is the mother of invention: a simple grid computing system using commodity tools. Journal of Parallel and Distributed Computing, Volume 63, Issue 5, May 2003, pp. 578-589.CrossRefGoogle Scholar
  16. [16]
    The GNU Privacy Guard.
  17. [17]
    Internet X.509 Public Key Infrastructure Certificate and CRL Profile.

Copyright information

© Springer Science+Business Media, LLC 2007

Authors and Affiliations

  • Attila Csaba Marosi
  • Gábor Gombás
  • Zoltán Balaton
    • 1
  1. 1.MTA SZTAKI Computer and Automation Research InstituteHungary

Personalised recommendations