RU2016111524A - A method for verifying the safe distribution of user tasks among nodes of a grid system - Google Patents
A method for verifying the safe distribution of user tasks among nodes of a grid system Download PDFInfo
- Publication number
- RU2016111524A RU2016111524A RU2016111524A RU2016111524A RU2016111524A RU 2016111524 A RU2016111524 A RU 2016111524A RU 2016111524 A RU2016111524 A RU 2016111524A RU 2016111524 A RU2016111524 A RU 2016111524A RU 2016111524 A RU2016111524 A RU 2016111524A
- Authority
- RU
- Russia
- Prior art keywords
- nodes
- grid system
- verifying
- user
- legitimate
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6209—Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/46—Multiprogramming arrangements
- G06F9/50—Allocation of resources, e.g. of the central processing unit [CPU]
- G06F9/5061—Partitioning or combining of resources
- G06F9/5072—Grid computing
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
Claims (1)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
RU2016111524A RU2634184C2 (en) | 2016-03-28 | 2016-03-28 | Verification method of the user tasks safe distribution according to the grid system units |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
RU2016111524A RU2634184C2 (en) | 2016-03-28 | 2016-03-28 | Verification method of the user tasks safe distribution according to the grid system units |
Publications (2)
Publication Number | Publication Date |
---|---|
RU2016111524A true RU2016111524A (en) | 2017-09-29 |
RU2634184C2 RU2634184C2 (en) | 2017-10-24 |
Family
ID=60047547
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
RU2016111524A RU2634184C2 (en) | 2016-03-28 | 2016-03-28 | Verification method of the user tasks safe distribution according to the grid system units |
Country Status (1)
Country | Link |
---|---|
RU (1) | RU2634184C2 (en) |
Family Cites Families (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7644153B2 (en) * | 2003-07-31 | 2010-01-05 | Hewlett-Packard Development Company, L.P. | Resource allocation management in interactive grid computing systems |
US7765552B2 (en) * | 2004-09-17 | 2010-07-27 | Hewlett-Packard Development Company, L.P. | System and method for allocating computing resources for a grid virtual system |
US8261277B2 (en) * | 2006-04-10 | 2012-09-04 | General Electric Company | System and method for dynamic allocation of resources in a computing grid |
RU2494453C2 (en) * | 2011-11-24 | 2013-09-27 | Закрытое акционерное общество "Лаборатория Касперского" | Method for distributed performance of computer security tasks |
RU2536678C1 (en) * | 2013-07-30 | 2014-12-27 | ООО "НеоБИТ" | Method of authentication of user accounts in grid systems and system for its implementation |
-
2016
- 2016-03-28 RU RU2016111524A patent/RU2634184C2/en active
Also Published As
Publication number | Publication date |
---|---|
RU2634184C2 (en) | 2017-10-24 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
GB2496354B (en) | A method and system of providing authentication of user access to a computer resource via a mobile device using multiple separate security factors | |
BR112017003018A2 (en) | secure provision of an authentication credential | |
BR112017002747A2 (en) | computer implemented method, and, computer system. | |
BR112019008371A2 (en) | method, apparatus and data transmission system | |
CN104378386A (en) | Method for cloud data confidentiality protection and access control | |
DK3381172T3 (en) | METHOD AND SYSTEM FOR DISTRIBUTING CRYPTOGRAPHIC KEY CREATION AND STORAGE BY ELLIPTIC CURVE Cryptography | |
JP2016514912A5 (en) | ||
NZ770092A (en) | Methods and systems for virtual file storage and encryption | |
WO2016122747A3 (en) | Storage for encrypted data with enhanced security | |
RU2018137847A (en) | SYSTEM AND METHOD FOR DISTRIBUTION OF KEY MATERIAL AND CERTIFICATE BASED ON IDENTIFICATION INFORMATION | |
JP2013509089A5 (en) | ||
CN106027503A (en) | Cloud storage data encryption method based on TPM | |
MY190785A (en) | Network system for secure communication | |
JP2016527608A5 (en) | ||
SG10201804297QA (en) | Systems and methods for software based encryption | |
RU2019117050A (en) | ENCRYPTED DATA CONTROL THROUGH MULTIPLE CONTROLS | |
CN106411515B (en) | The method and system for promoting key safety are split to key using cipher machine | |
JP2015534343A5 (en) | ||
IN2014MU00771A (en) | ||
CN102509034A (en) | Software license control device and method | |
FI20120110A (en) | Secure remote access license procedure | |
MX2018007332A (en) | Method, device, server and system for authenticating a user. | |
MY151312A (en) | A method and system for file encryption and decryption in a server | |
WO2015163967A3 (en) | Cryptographic method and system of protecting digital content and recovery of same through unique user identification | |
RU2016111524A (en) | A method for verifying the safe distribution of user tasks among nodes of a grid system |