{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,19]],"date-time":"2025-03-19T16:48:55Z","timestamp":1742402935776,"version":"3.32.0"},"publisher-location":"Berlin, Heidelberg","reference-count":45,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540310242"},{"type":"electronic","value":"9783540316176"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1007\/11605300_11","type":"book-chapter","created":{"date-parts":[[2005,12,8]],"date-time":"2005-12-08T13:01:31Z","timestamp":1134046891000},"page":"219-237","source":"Crossref","is-referenced-by-count":31,"title":["Enhancing Security of Real-Time Applications on Grids Through Dynamic Scheduling"],"prefix":"10.1007","author":[{"given":"Tao","family":"Xie","sequence":"first","affiliation":[]},{"given":"Xiao","family":"Qin","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"11","key":"11_CR1","doi-asserted-by":"publisher","first-page":"1170","DOI":"10.1109\/12.895935","volume":"49","author":"T.F. Abdelzaher","year":"2000","unstructured":"Abdelzaher, T.F., Atkins, E.M., Shin, K.G.: QoS Negotiation in Real-Time Systems and Its Application to Automated Flight Control. IEEE Trans. Computers\u00a049(11), 1170\u20131183 (2000)","journal-title":"IEEE Trans. Computers"},{"key":"11_CR2","doi-asserted-by":"crossref","unstructured":"Ahmed, Q., Vrbsky, S.: Maintaining security in firm real-time database systems. In: Proc. 14th Ann. Computer Security Application Conf. (1998)","DOI":"10.1109\/CSAC.1998.738584"},{"key":"11_CR3","doi-asserted-by":"crossref","unstructured":"Azzedin, F., Maheswaran, M.: Towards trust-aware resource management in grid computing systems. In: Proc. 2nd IEEE\/ACM Int\u2019l. Symp. Cluster Computing and the Grid (May 2002)","DOI":"10.1109\/CCGRID.2002.1017189"},{"key":"11_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"298","DOI":"10.1007\/3-540-68697-5_23","volume-title":"Advances in Cryptology - CRYPTO \u201996","author":"A. Bosselaers","year":"1996","unstructured":"Bosselaers, A., Govaerts, R., Vandewalle, J.: Fast hashing on the Pentium. In: Koblitz, N. (ed.) CRYPTO 1996. LNCS, vol.\u00a01109, pp. 298\u2013312. Springer, Heidelberg (1996)"},{"key":"11_CR5","doi-asserted-by":"crossref","unstructured":"Braun, T.D.: A comparison study of static mapping heuristics for a class of meta-tasks on heterogeneous computing systems. In: Proc. Workshop on Heterogeneous Computing (1999)","DOI":"10.1109\/HCW.1999.765093"},{"key":"11_CR6","doi-asserted-by":"crossref","unstructured":"Caron, E., Chouhan, P.K., Desprez, F.: Deadline Scheduling with Priority for Client-Server Systems on the Grid. In: Proc. Int\u2019l. Workshop Grid Computing, November 2004, pp. 410\u2013414 (2004)","DOI":"10.1109\/GRID.2004.18"},{"key":"11_CR7","doi-asserted-by":"crossref","unstructured":"Connelly, K., Chien, A.A.: Breaking the barriers: high performance security for high performance computing. In: Proc. Workshop on New security paradigms, Virginia (September 2002)","DOI":"10.1145\/844102.844109"},{"key":"11_CR8","unstructured":"Deepakumara, J., Heys, H.M., Venkatesan, R.: Performance comparison of message authentication code (MAC) algorithms for Internet protocol security (IPSEC). In: Proc. New-foundland Electrical and Computer Engineering Conf., St. John\u2019s, Newfoundland (November 2003)"},{"key":"11_CR9","doi-asserted-by":"crossref","unstructured":"Elkeelany, O., et al.: Performance analysis of IPSec protocol: encryption and authentication. In: Proc. IEEE Int\u2019l. Conf. Communications, New York, NY, April-May 2002, pp. 1164\u20131168 (2002)","DOI":"10.1109\/ICC.2002.997033"},{"key":"11_CR10","doi-asserted-by":"crossref","unstructured":"Eltayeb, M., Dogan, A., Ozunger, F.: A data scheduling algorithm for autonomous distributed real-time applications in grid computing. In: Proc. Int\u2019l. Conf. Parallel Processing, August 2004, pp. 388\u2013395 (2004)","DOI":"10.1109\/ICPP.2004.1327947"},{"key":"11_CR11","doi-asserted-by":"crossref","unstructured":"Freund, R.F., et al.: Scheduling resources in multi-user, heterogeneous computing environments with SmartNet. In: Proc. Heterogeneous Computing Workshop, March 1998, pp. 184\u2013199 (1998)","DOI":"10.1109\/HCW.1998.666558"},{"issue":"2","key":"11_CR12","doi-asserted-by":"crossref","first-page":"462","DOI":"10.1145\/253262.253362","volume":"26","author":"Binto George","year":"1997","unstructured":"George, B., Haritsa, J.: Secure transaction processing in firm real-time database systems. In: Proc. ACM SIGMOD Conf. (May 1997)","journal-title":"ACM SIGMOD Record"},{"key":"11_CR13","doi-asserted-by":"crossref","unstructured":"Halang, W.A., et al.: Measuring the performance of real-time systems. Int\u2019l. Journal of Time-Critical Computing Systems, 59\u201368 (2000)","DOI":"10.1023\/A:1008102611034"},{"key":"11_CR14","doi-asserted-by":"crossref","unstructured":"Harbitter, A., Menasce, D.A.: The performance of public key enabled Kerberos authentication in mobile computing applications. In: Proc. ACM Conf. Computer and Comm. Security, pp. 78\u201385 (2001)","DOI":"10.1145\/501983.501995"},{"key":"11_CR15","doi-asserted-by":"crossref","unstructured":"Harchol-Balter, M., Downey, A.: Exploiting Process Lifetime Distributions for Load Balacing. ACM transaction on Computer Systems\u00a03(31) (1997)","DOI":"10.1145\/263326.263344"},{"key":"11_CR16","doi-asserted-by":"crossref","unstructured":"He, L., Jarvis, S.A., Spooner, D.P., Chen, X., Nudd, G.R.: Dynamic Scheduling of Parallel Jobs with QoS Demands in Muticluster and Grids. In: Proc. Int\u2019l. Workshop Grid Computing, November 2004, pp. 402\u2013409 (2004)","DOI":"10.1007\/978-3-540-30208-7_34"},{"issue":"3","key":"11_CR17","doi-asserted-by":"crossref","first-page":"644","DOI":"10.1109\/JPROC.2004.842776","volume":"93","author":"M. Humphrey","year":"2005","unstructured":"Humphrey, M., Thompson, M.R., Jackson, K.R.: Security for Grids. Proc. of the IEEE, 644\u2013652 (March 2005)","journal-title":"Proceedings of the IEEE"},{"key":"11_CR18","unstructured":"In, J.U., Avery, P., Cavanaugh, R., Ranka, S.: Policy based scheduling for simple quality of service in grid computing. In: Proc. Int\u2019l. Symp. Parallel and Distributed Processing, April 2004, pp. 23\u201332 (2004)"},{"key":"11_CR19","doi-asserted-by":"crossref","unstructured":"Irvine, C., Levin, T.: Towards a taxonomy and costing method for security services. In: Proc. 15th Annual Computer Security Applications Conference (1999)","DOI":"10.1109\/CSAC.1999.816026"},{"key":"11_CR20","first-page":"150","volume-title":"High-Performance Computing and Networking","author":"Jason Lee","year":"1999","unstructured":"Lee, J., Tierney, B., Johnston, W.: Data intensive distributed computing: a medical application example. In: Proc. High Performance Computing and Networking Conf. (April 1999)"},{"key":"11_CR21","doi-asserted-by":"crossref","unstructured":"Li, K.: Experimental performance evaluation of job scheduling and processor allocation algorithms for grid computing on metacomputers. In: Proc. Int\u2019l. Symp. Parallel and Distributed Processing (April 2004)","DOI":"10.1016\/j.jpdc.2005.05.015"},{"key":"11_CR22","doi-asserted-by":"crossref","unstructured":"Liden, S.: The Evolution of Flight Management Systems. In: Proc. IEEE\/AIAA 13th Digital Avionics Systems Conf., pp. 157\u2013169 (1995)","DOI":"10.1109\/DASC.1994.369487"},{"issue":"1","key":"11_CR23","doi-asserted-by":"publisher","first-page":"46","DOI":"10.1145\/321738.321743","volume":"20","author":"C.L. Liu","year":"1973","unstructured":"Liu, C.L., Layland, J.W.: Scheduling Algorithms for Multiprogramming in a Hard Real-Time Environment. Journal of the ACM\u00a020(1), 46\u201361 (1973)","journal-title":"Journal of the ACM"},{"key":"11_CR24","doi-asserted-by":"crossref","unstructured":"Maheswaran, M., Ali, S., Siegel, H.J., Hensgen, D., Freund, R.F.: Dynamicmatching and scheduling of a class of independent tasks onto heterogeneous computing systems. In: Proc. IEEE Heterogeneous Computing Workshop, April 1999, pp. 30\u201344 (1999)","DOI":"10.1109\/HCW.1999.765094"},{"key":"11_CR25","doi-asserted-by":"crossref","unstructured":"Nahum, E., O\u2019Malley, S., Orman, H., Schroeppel, R.: Towards High Performance Cryptographic Software. In: Proc. IEEE Workshop Architecture and Implementation of High Performance Communication Subsystems (August 1995)","DOI":"10.1109\/HPCS.1995.662009"},{"key":"11_CR26","doi-asserted-by":"crossref","unstructured":"Nilsson, J., Dahlgren, F.: Improving performance of load-store sequences for transaction processing workloads on multiprocessors. In: Proc. Int\u2019l. Conference on Parallel Processing, September 21-24, pp. 246\u2013255 (1999)","DOI":"10.1109\/ICPP.1999.797410"},{"key":"11_CR27","doi-asserted-by":"crossref","unstructured":"Qin, X., Jiang, H., Zhu, Y., Swanson, D.R.: Towards Load Balancing Support for I\/O-Intensive Parallel Jobs in a Cluster of Workstations. In: Proc. 5th IEEE Int\u2019l. Conf. on Cluster Computing, December 2003, pp. 100\u2013107 (2003)","DOI":"10.1109\/CLUSTR.2003.1253305"},{"key":"11_CR28","unstructured":"Qin, X., Jiang, H.: Improving Effective Bandwidth of Networks on Clusters using Load Balancing for Communication-Intensive Applications. In: Proc. 24th IEEE Int\u2019l. Performance, Computing, and Communications Conf., Phoenix, Arizona (April 2005)"},{"key":"11_CR29","unstructured":"Qin, X.: Improving Network Performance through Task Duplication for Parallel Applications on Clusters. In: Proc. 24th IEEE Int\u2019l. Performance, Computing, and Communications Conference, Phoenix, Arizona (April 2005)"},{"key":"11_CR30","unstructured":"Qin, X., Jiang, H., Swanson, D.R.: An Efficient Fault-tolerant Scheduling Algorithm for Real-time Tasks with Precedence Constraints in Heterogeneous Systems. In: Proc. 31st Int\u2019l. Conf. Parallel Processing, Computing, and Communications Conf., Phoenix, Arizona, April 2005, pp. 360\u2013368 (2005)"},{"key":"11_CR31","doi-asserted-by":"crossref","unstructured":"Qin, X., Jiang, H.: Dynamic, Reliability-driven Scheduling of Parallel Real-time Jobs in Heterogeneous Systems. In: Proc. 30th Int\u2019l. Conf. Parallel Processing, September 2001, pp. 113\u2013122 (2001)","DOI":"10.1109\/ICPP.2001.952053"},{"key":"11_CR32","doi-asserted-by":"crossref","unstructured":"Qin, X., Jiang, H.: Data Grids: Supporting Data-Intensive Applications in Wide Area Networks. In: High Performance Computing: Paradigm and Infrastructure (2004)","DOI":"10.1002\/0471732710.ch24"},{"key":"11_CR33","doi-asserted-by":"crossref","unstructured":"Ramamritham, K., Stankovic, J.A.: Dynamic task scheduling in distributed hard real-time system. IEEE Software\u00a01(3) (July 1984)","DOI":"10.1109\/MS.1984.234713"},{"key":"11_CR34","doi-asserted-by":"crossref","unstructured":"Schreur, J.: B737 Flight Management Computer Flight Plan Trajectory Computation and Analysis. In: Proc. Am. Control Conf., pp. 3419\u20133429 (1995)","DOI":"10.1109\/ACC.1995.532246"},{"key":"11_CR35","doi-asserted-by":"crossref","unstructured":"Son, S.H., Zimmerman, R., Hansson, J.: An adaptable security manager for real-time transactions. In: Proc. 12th Euromicro Conf. Real-Time Systems, June 2000, pp. 63\u201370 (2000)","DOI":"10.1109\/EMRTS.2000.853993"},{"issue":"6","key":"11_CR36","doi-asserted-by":"publisher","first-page":"865","DOI":"10.1109\/69.895799","volume":"12","author":"S.H. Son","year":"2000","unstructured":"Son, S.H., Mukkamala, R., David, R.: Integrating security and real-time requirements using covert channel capacity. IEEE Trans. Knowledge and Data Engineering\u00a012(6), 865\u2013879 (2000)","journal-title":"IEEE Trans. Knowledge and Data Engineering"},{"key":"11_CR37","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4615-5535-3","volume-title":"Deadline Scheduling for Real-Time Systems \u2013 EDF and Related Algorithms","author":"J.A. Stankovic","year":"1998","unstructured":"Stankovic, J.A., Spuri, M., Ramamritham, K., Buttazzo, G.C.: Deadline Scheduling for Real-Time Systems \u2013 EDF and Related Algorithms. Kluwer Academic Publishers, Dordrecht (1998)"},{"issue":"9","key":"11_CR38","doi-asserted-by":"publisher","first-page":"969","DOI":"10.1109\/71.879779","volume":"11","author":"M.D. Theys","year":"2000","unstructured":"Theys, M.D., Tan, M., Beck, N., Siegel, H.J., Jurczyk, M.: A mathematical model and scheduling heuristic for satisfying prioritized data requests in an oversubscribed communication networks. IEEE Trans. Parallel and Distributed Systems\u00a011(9), 969\u2013988 (2000)","journal-title":"IEEE Trans. Parallel and Distributed Systems"},{"key":"11_CR39","doi-asserted-by":"crossref","unstructured":"Thomadakis, M.E., Liu, J.C.: On the efficient scheduling of non-periodic tasks in hard real-time systems. In: Proc. 20th IEEE Real-Time Systems Symp., pp. 148\u2013151 (1999)","DOI":"10.1109\/REAL.1999.818836"},{"key":"11_CR40","doi-asserted-by":"crossref","unstructured":"Vazhkudai, S., Schopf, J.M., Foster, I.: Predicting the Performance of Wide Area Data Transfers. In: Proceedings of the 16th International Parallel and Distributed Processing Symposium (April 2002)","DOI":"10.1109\/IPDPS.2002.1015510"},{"key":"11_CR41","doi-asserted-by":"crossref","unstructured":"Wright, R., Shifflett, D.J., Irvine, C.E.: Security Architecture for a Virtual Heterogeneous Machine. In: Proc. 14th Ann. Computer Security Applications Conference (1998)","DOI":"10.1109\/CSAC.1998.738611"},{"key":"11_CR42","unstructured":"Wu, M., Sun, X.H.: Memory conscious task partition and scheduling in Grid Environments. In: Proc. Int\u2019l. Workshop Grid Computing, November 2004, pp. 138\u2013145 (2004)"},{"key":"11_CR43","unstructured":"Xie, T., Sung, A., Qin, X.: Dynamic Task Scheduling with Security Awareness in Real-Time Systems. In: Proc. Int\u2019l. Symp. Parallel and Distributed Processing, Denver (April 2005)"},{"key":"11_CR44","unstructured":"Xie, T., Qin, X., Sung, A.: SAREC: A Security-aware Scheduling Strategy for Real-Time Applications on Clusters. In: Proc. 34th Int\u2019l. Conf. Parallel Processing, Norway, pp. 5\u201312 (2005)"},{"key":"11_CR45","doi-asserted-by":"crossref","unstructured":"Xie, T., Qin, X.: A New Allocation Scheme for Parallel Applications with Deadline and Security Constraints on Clusters. In: The 2005 IEEE International Conference on Cluster Computing, Boston, USA, September 27-30 (2005)","DOI":"10.1109\/CLUSTR.2005.347057"}],"container-title":["Lecture Notes in Computer Science","Job Scheduling Strategies for Parallel Processing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11605300_11.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,6]],"date-time":"2025-01-06T10:04:35Z","timestamp":1736157875000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11605300_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"ISBN":["9783540310242","9783540316176"],"references-count":45,"URL":"https:\/\/doi.org\/10.1007\/11605300_11","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2005]]}}}