{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T05:30:28Z","timestamp":1725514228229},"publisher-location":"Berlin, Heidelberg","reference-count":23,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540681052"},{"type":"electronic","value":"9783540681113"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-68111-3_87","type":"book-chapter","created":{"date-parts":[[2008,5,28]],"date-time":"2008-05-28T16:27:12Z","timestamp":1211992032000},"page":"825-834","source":"Crossref","is-referenced-by-count":1,"title":["Towards Secure Data Management System for Grid Environment Based on the Cell Broadband Engine"],"prefix":"10.1007","author":[{"given":"Roman","family":"Wyrzykowski","sequence":"first","affiliation":[]},{"given":"Lukasz","family":"Kuczynski","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"5","key":"87_CR1","doi-asserted-by":"publisher","first-page":"749","DOI":"10.1016\/S0167-8191(02)00094-7","volume":"28","author":"B. Allcock","year":"2002","unstructured":"Allcock, B., et al.: Data Management and Transfer in High Performance Computational Grid Environments. Parallel Computing Journal\u00a028(5), 749\u2013771 (2002)","journal-title":"Parallel Computing Journal"},{"key":"87_CR2","volume-title":"Proc. First Int. Conf. on Availability, Reliability and Security (ARES 2006)","author":"C. Blanchet","year":"2006","unstructured":"Blanchet, C., Mollon, R., Deleage, G.: Building an Encrypted File System on the EGEE Grid: Application to Protein Sequence Analysis. In: Proc. First Int. Conf. on Availability, Reliability and Security (ARES 2006), IEEE Computer Society, Los Alamitos (2006)"},{"key":"87_CR3","unstructured":"Cell BE: Security SDK 3.0 Installation and User\u2019s Guide, \n                    \n                      http:\/\/www.ibm.com\/developerworks\/power\/cell"},{"key":"87_CR4","unstructured":"Costigan, S.: Accelerating SSL using the vector processors in IBM Cell Broadband Engine for Sony Playstation 3. In: SPEED:Software Performance Enhancement for Encryption and Decryption, Amsterdam, pp. 65\u201376 (2007)"},{"key":"87_CR5","unstructured":"ClusteriX Project Home Page, \n                    \n                      http:\/\/clusterix.pcz.pl"},{"key":"87_CR6","volume-title":"Cryptography for Developers","author":"T.S. Denis","year":"2007","unstructured":"Denis, T.S., Johnson, S.: Cryptography for Developers. Syngress Publishing, Rockland (2007)"},{"key":"87_CR7","unstructured":"FUSE: Filesystem in Userspace, \n                    \n                      http:\/\/fuse.sourceforge.net\/"},{"key":"87_CR8","unstructured":"GLOBUS Project Home Page, \n                    \n                      http:\/\/www.globus.org"},{"key":"87_CR9","doi-asserted-by":"publisher","first-page":"10","DOI":"10.1109\/MM.2006.41","volume":"2","author":"M. Gschwind","year":"2006","unstructured":"Gschwind, M., et al.: Synergistic Processing in Cell\u2019s Multicore Architecture. IEEE Micro.\u00a02, 10\u201324 (2006)","journal-title":"IEEE Micro."},{"key":"87_CR10","unstructured":"gSOAP Project Home Page, \n                    \n                      http:\/\/www.cs.fsu.edu\/~engelen\/soap.html"},{"key":"87_CR11","unstructured":"Karczewski, K., Kuczynski, L., Wyrzykowski, R.: Secure Data Transfer and Replication Mechanisms in Grid Environments. In: Proc. Cracow Grid Workshop - CGW 2003, Cracow, pp. 190\u2013196 (2003)"},{"key":"87_CR12","unstructured":"Karczewski, K., Kuczynski, L., Wyrzykowski, R.: CDMS - ClusteriX Data Management System. In: Proc. Cracow Grid Workshop - CGW 2004, Cracow, pp. 241\u2013247 (2004)"},{"key":"87_CR13","first-page":"99","volume-title":"Knowledge and Data Management in Grids","author":"K. Karczewski","year":"2006","unstructured":"Karczewski, K., Kuczynski, L.: ClusteriX Data Management System (CDMS) Architecture and Use Cases. In: Talia, D., Bilas, A., Dikaiakos, M.D. (eds.) Knowledge and Data Management in Grids, pp. 99\u2013115. Springer, Heidelberg (2006)"},{"key":"87_CR14","doi-asserted-by":"crossref","unstructured":"Kher, V., Kim, Y.: Securing Distributed Storage: Challenges, Techniques, and Systems. In: Proc. 2005 ACM workshop on Storage Security and Survivability, Fairfax, VA, USA, pp. 9\u201325 (2005)","DOI":"10.1145\/1103780.1103783"},{"key":"87_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"240","DOI":"10.1007\/11752578_30","volume-title":"Parallel Processing and Applied Mathematics","author":"L. Kuczynski","year":"2006","unstructured":"Kuczynski, L., Karczewski, K., Wyrzykowski, R.: ClusteriX Data Management System and Its Integration with Applications. In: Wyrzykowski, R., Dongarra, J., Meyer, N., Wa\u015bniewski, J. (eds.) PPAM 2005. LNCS, vol.\u00a03911, pp. 240\u2013248. Springer, Heidelberg (2006)"},{"issue":"6","key":"87_CR16","doi-asserted-by":"publisher","first-page":"1062","DOI":"10.1049\/ip-com:20050237","volume":"152","author":"D.J.C. MacKay","year":"2005","unstructured":"MacKay, D.J.C.: Fountain codes. IEE Proc.-Commun.\u00a0152(6), 1062\u20131068 (2005)","journal-title":"IEE Proc.-Commun."},{"issue":"2","key":"87_CR17","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1145\/263876.263881","volume":"27","author":"L. Rizzo","year":"1997","unstructured":"Rizzo, L.: Effective Erasure Codes for Reliable Computer Communication Protocols. ACM Computer Comm. Review\u00a027(2), 24\u201336 (1997)","journal-title":"ACM Computer Comm. Review"},{"key":"87_CR18","unstructured":"Roca, V., Neumann, C.: Design, Evaluation and Comparison of Four Large Block FEC Codes, LDPC, LDGM, LDGM Staircase and LDGM Triangle, plus a Reed-Solomon Small Block FEC Codes. Tech. Rep. No.5225, INRIA Rhone-Alpes (2004)"},{"key":"87_CR19","unstructured":"SDSC Storage Resource Broker, \n                    \n                      http:\/\/www.sdsc.edu\/srb\/"},{"key":"87_CR20","unstructured":"Shimizu, K.: The Cell Broadband Engine processor security architecture, \n                    \n                      http:\/\/www-128.ibm.com\/developerworks\/power\/library\/pa-cellsecurity\/"},{"key":"87_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"707","DOI":"10.1007\/11752578_85","volume-title":"Parallel Processing and Applied Mathematics","author":"R. Slota","year":"2006","unstructured":"Slota, R., Skital, L., Nikolow, D., Kitowski, J.: Algorithms for Automatic Data Replication in Grid Environment. In: Wyrzykowski, R., Dongarra, J., Meyer, N., Wa\u015bniewski, J. (eds.) PPAM 2005. LNCS, vol.\u00a03911, pp. 707\u2013714. Springer, Heidelberg (2006)"},{"key":"87_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45748-8_31","volume-title":"Peer-to-Peer Systems","author":"H. Weatherspoon","year":"2002","unstructured":"Weatherspoon, H., Kubiatowicz, J.D.: Erasure Coding vs. Replication: A Quantitive Comparison. In: Druschel, P., Kaashoek, M.F., Rowstron, A. (eds.) IPTPS 2002. LNCS, vol.\u00a02429, Springer, Heidelberg (2002)"},{"key":"87_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"489","DOI":"10.1007\/978-3-540-75755-9_59","volume-title":"Applied Parallel Computing. State of the Art in Scientific Computing","author":"R. Wyrzykowski","year":"2007","unstructured":"Wyrzykowski, R., et al.: Meta-computations on the CLUSTERIX Grid. In: K\u00e5gstr\u00f6m, B., Elmroth, E., Dongarra, J., Wa\u015bniewski, J. (eds.) PARA 2006. LNCS, vol.\u00a04699, pp. 489\u2013500. Springer, Heidelberg (2007)"}],"container-title":["Lecture Notes in Computer Science","Parallel Processing and Applied Mathematics"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-68111-3_87.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,3]],"date-time":"2021-05-03T04:35:08Z","timestamp":1620016508000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-68111-3_87"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540681052","9783540681113"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-68111-3_87","relation":{},"subject":[]}}