Performance evaluation of a new scheduling algorithm for distributed systems with security heterogeneity

T Xie, X Qin - Journal of Parallel and Distributed Computing, 2007 - Elsevier
High quality of security service is increasingly critical for applications running on
heterogeneous distributed systems. However, existing scheduling algorithms for …

A security-oriented task scheduler for heterogeneous distributed systems

T Xie, X Qin - High Performance Computing-HiPC 2006: 13th …, 2006 - Springer
High quality of security is increasingly critical for applications running on heterogeneous
distributed systems, where processors operate at different speeds and communication …

A novel security-driven scheduling algorithm for precedence-constrained tasks in heterogeneous distributed systems

T Xiaoyong, K Li, Z Zeng… - IEEE Transactions on …, 2010 - ieeexplore.ieee.org
In the recent past, security-sensitive applications, such as electronic transaction processing
systems, stock quote update systems, which require high quality of security to guarantee …

A two-phase scheduling strategy for real-time applications with security requirements on heterogeneous clusters

X Zhu, P Lu - Computers & Electrical Engineering, 2009 - Elsevier
Nowadays, increasing attention has been directed towards the issue of security service for
real-time applications with security requirements on clusters. However, the study of …

Security-aware resource allocation for real-time parallel jobs on homogeneous and heterogeneous clusters

T Xie, X Qin - IEEE transactions on parallel and distributed …, 2008 - ieeexplore.ieee.org
Security is increasingly becoming an important issue in the design of real-time parallel
applications, which are widely used in the industry and academic organizations. However …

Scheduling security-critical real-time applications on clusters

T Xie, X Qin - IEEE transactions on computers, 2006 - ieeexplore.ieee.org
Security-critical real-time applications such as military aircraft flight control systems have
mandatory security requirements in addition to stringent timing constraints. Conventional …

Security‐aware scheduling model for computational grid

R Kashyap, DP Vidyarthi - Concurrency and Computation …, 2012 - Wiley Online Library
Grid applications with stringent security requirements introduce challenging concerns
because the schedule devised by nonsecurity‐aware scheduling algorithms may suffer in …

Enhancing security of real-time applications on grids through dynamic scheduling

T Xie, X Qin - Workshop on Job Scheduling Strategies for Parallel …, 2005 - Springer
Real-time applications with security requirements are emerging in various areas including
government, education, and business. However, conventional real-time scheduling …

Improving security for periodic tasks in embedded systems through scheduling

T Xie, X Qin - ACM Transactions on Embedded Computing Systems …, 2007 - dl.acm.org
While many scheduling algorithms for periodic tasks ignore security requirements posed by
sensitive applications and are, consequently, unable to perform properly in embedded …

Security driven dynamic level scheduling under precedence constrained tasks in IaaS cloud

M Alam, M Shahid, S Mustajab, F Ahmad - International Journal of …, 2024 - Springer
High performance in large-scale heterogeneous distributed infrastructure, like cloud
computing depends on effective scheduling algorithms. List-based scheduling is one of the …