WO2009041801A3 - Trusted node for grid computing - Google Patents
Trusted node for grid computing Download PDFInfo
- Publication number
- WO2009041801A3 WO2009041801A3 PCT/MY2008/000103 MY2008000103W WO2009041801A3 WO 2009041801 A3 WO2009041801 A3 WO 2009041801A3 MY 2008000103 W MY2008000103 W MY 2008000103W WO 2009041801 A3 WO2009041801 A3 WO 2009041801A3
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- task
- grid computing
- wrapped
- node
- tasks
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F15/00—Digital computers in general; Data processing equipment in general
- G06F15/16—Combinations of two or more digital computers each having at least an arithmetic unit, a program unit and a register, e.g. for a simultaneous processing of several programs
Abstract
There is disclosed a method and apparatus adapted for securing computing process running on a computing hardware node in a grid computing system through the formation of virtual trusted node. Grid computing breaks up a computational task into a smaller computation sub-tasks. These sub-tasks are distributed to many computers where once executed, the results are returned to a centralized node for compilation. Data integrity and security becomes are of paramount concern. The proposed invention solve such a concern by providing a method of creating a virtual trusted node in a grid computing system through the creation of wrapped-task (11, 21) by wrapping a software for the sub-tasks together with an operating system (12, 22), sending the wrapped-task to the computer (40) in the grid computing system and executing the wrapped- task by way of a virtual machine monitor (30) and a trusted platform module (41). The operating system is provided with only the minimum and necessary functions to execute the wrapped-task. A computer apparatus (40) for creating such virtual trusted node is also disclosed.
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
MYPI20071632 MY152190A (en) | 2007-09-27 | 2007-09-27 | Trusted node for grid computing |
MYPI20071632 | 2007-09-27 |
Publications (2)
Publication Number | Publication Date |
---|---|
WO2009041801A2 WO2009041801A2 (en) | 2009-04-02 |
WO2009041801A3 true WO2009041801A3 (en) | 2009-07-02 |
Family
ID=40512037
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/MY2008/000103 WO2009041801A2 (en) | 2007-09-27 | 2008-09-19 | Trusted node for grid computing |
Country Status (2)
Country | Link |
---|---|
MY (1) | MY152190A (en) |
WO (1) | WO2009041801A2 (en) |
Families Citing this family (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
GB2468169A (en) * | 2009-02-28 | 2010-09-01 | Geoffrey Mark Timothy Cross | A grid application implemented using a virtual machine. |
US8392922B2 (en) * | 2010-03-08 | 2013-03-05 | Microsoft Corporation | Marshaling results of nested tasks |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20030225822A1 (en) * | 2002-05-30 | 2003-12-04 | Microsoft Corporation | Unbounded computing space |
US20050138370A1 (en) * | 2003-12-23 | 2005-06-23 | Goud Gundrala D. | Method and system to support a trusted set of operational environments using emulated trusted hardware |
US7047425B2 (en) * | 2002-07-19 | 2006-05-16 | The Boeing Company | Scaleable muti-level security method in object oriented open network systems |
-
2007
- 2007-09-27 MY MYPI20071632 patent/MY152190A/en unknown
-
2008
- 2008-09-19 WO PCT/MY2008/000103 patent/WO2009041801A2/en active Application Filing
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20030225822A1 (en) * | 2002-05-30 | 2003-12-04 | Microsoft Corporation | Unbounded computing space |
US7047425B2 (en) * | 2002-07-19 | 2006-05-16 | The Boeing Company | Scaleable muti-level security method in object oriented open network systems |
US20050138370A1 (en) * | 2003-12-23 | 2005-06-23 | Goud Gundrala D. | Method and system to support a trusted set of operational environments using emulated trusted hardware |
Non-Patent Citations (1)
Title |
---|
"Proc. of the 6th IEEE International Symposium on Cluster Computing and the Grid", 2006, IEEE COMPUTER SOCIETY, article COOPER ET AL.: "Towards a secure, tamper-proof grid platform", pages: 373 - 380 * |
Also Published As
Publication number | Publication date |
---|---|
MY152190A (en) | 2014-08-29 |
WO2009041801A2 (en) | 2009-04-02 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11790101B2 (en) | Containerized build steps | |
US8281288B1 (en) | Integrated development environment with network-based compilation and sandboxed native machine-language capabilities | |
US8978028B2 (en) | Transactional multi-package installation | |
IN2014KN02671A (en) | ||
WO2017052947A1 (en) | Hardware-assisted software verification and secure execution | |
WO2012112833A3 (en) | System and method for application attestation | |
WO2009007967A3 (en) | System and method for application process automation over a computer network | |
TW200641607A (en) | Intrusion detection system | |
RU2005135472A (en) | COMPUTER SECURITY MANAGEMENT, FOR example, IN A VIRTUAL MACHINE OR A REAL OPERATING SYSTEM | |
WO2012105666A1 (en) | Creation of signatures for authenticating applications | |
ATE404932T1 (en) | SECURE LICENSE MANAGEMENT | |
WO2001097029A3 (en) | Method and apparatus for implementing an extended virtual machine | |
NO20091281L (en) | Virtualization for diversifying intervention resistance | |
DE502004002908D1 (en) | CONTROLLED EXECUTION OF A PROGRAM PROVIDED FOR A VIRTUAL MACHINE ON A PORTABLE DATA CARRIER | |
GB2506551A (en) | Unified,adaptive ras for hybrid systems | |
TWI456944B (en) | Management method and system using the same | |
CN102646066B (en) | Method and device for obtaining starting-up time | |
US7752138B1 (en) | Dynamic licensing in a distributed system | |
CN106951785B (en) | JAVA virtual machine and trust chain extension method thereof | |
WO2009041801A3 (en) | Trusted node for grid computing | |
CN106569907A (en) | System start-up file verifying and compiling method | |
Vetter et al. | Techniques for high-performance computational steering | |
CN111414625A (en) | Method and system for realizing computer trusted software stack supporting active trusted capability | |
GB2426088A (en) | Flexible monitoring and recovery of processes on data processing systems | |
Sokolsky et al. | Steering of real-time systems based on monitoring and checking |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 08833860 Country of ref document: EP Kind code of ref document: A2 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 08833860 Country of ref document: EP Kind code of ref document: A2 |