Filters








3 Hits in 2.8 sec

ES-MPICH2: A Message Passing Interface with enhanced security

Xiaojun Ruan, Qing Yang, I. Alghamdi Mohammed, Shu Yin, Zhiyang Ding, Jiong Xie, Joshua Lewis, Xiao Qin
2010 International Performance Computing and Communications Conference  
To address this security issue, we developed a Message Passing Interface (MPI) implementation to preserve confidentiality of messages communicated among nodes of clusters in an unsecured network.  ...  The security overhead in ES-MPICH2 becomes more pronounced with larger messages. Our results also show that security overhead can be significantly reduced in ES-MPICH2 by high-performance clusters.  ...  Section 4 presents the motivation of this work by showing why secured MPI is an important issue and also outlines the design of ES-MPICH2-the message passing interface with enhanced security.  ... 
doi:10.1109/pccc.2010.5682312 dblp:conf/ipccc/RuanYAYDXLQ10 fatcat:6jiw75wd6rewvmqj5o5b3obayq

ES-MPICH2: A Message Passing Interface with Enhanced Security

Xiaojun Ruan, Qing Yang, Mohammed I. Alghamdi, Shu Yin, Xiao Qin
2012 IEEE Transactions on Dependable and Secure Computing  
To address this security issue, we developed a Message Passing Interface (MPI) implementation to preserve confidentiality of messages communicated among nodes of clusters in an unsecured network.  ...  The security overhead in ES-MPICH2 becomes more pronounced with larger messages. Our results also show that security overhead can be significantly reduced in ES-MPICH2 by high-performance clusters.  ...  Section 4 presents the motivation of this work by showing why secured MPI is an important issue and also outlines the design of ES-MPICH2-the message passing interface with enhanced security.  ... 
doi:10.1109/tdsc.2012.9 fatcat:oxlxh5unnfefrnuoklsoghvzgi

MULTI-SERVER AUTHENTICATION KEY EXCHANGE APPROACH IN BIGDATA ENVIRONMENT

Miss Kiran More, Jyoti Raghatwan, Prof Raghatwan
2008 International Research Journal of Engineering and Technology   unpublished
The key establishment difficulty is the maximum central issue and we learn the trouble of key organization for secure many to many communications for past several years.  ...  Our evaluation of the available Kerberos bottommost procedure validates that it has a numeral of borders: (a) a metadata attendant make imaginable key trade over sandwiched amongst the clients and the  ...  (MPICH2) with typical MPI interface that come to be to be ES-MPICH2.  ... 
fatcat:dzco5mevjfej5jbzzf76fnvcfu