The Community for Technology Leaders
RSS Icon
Issue No.03 - May/June (2012 vol.9)
pp: 361-374
Xiaojun Ruan , West Chester University of Pennsylvania, PA
Qing Yang , Montana State University, MT
Mohammed I. Alghamdi , Al-Baha University, Al-Baha City
Shu Yin , Auburn University, Auburn
Xiao Qin , Auburn University, Auburn
Parallel computing, computer security, message passing interface, encryption.
Xiaojun Ruan, Qing Yang, Mohammed I. Alghamdi, Shu Yin, Xiao Qin, "ES-MPICH2: A Message Passing Interface with Enhanced Security", IEEE Transactions on Dependable and Secure Computing, vol.9, no. 3, pp. 361-374, May/June 2012, doi:10.1109/TDSC.2012.9
[1] Nat'l Security Agency. Nat'l Policy on the Use of the Advanced Encryption Standard (aes) to Protect Nat'l Security Systems and Nat'l Security Information cnss Policy no. 15 Fact Sheet no. 1, June 2003.
[2] I.F. Blake, G. Seroussi, and N.P. Smart, Elliptic Curves in Cryptography. Cambridge Univ. Press, 1999.
[3] R. Brightwell, D.S. Greenberg, B.J. Matt, and G.I. Davida Barriers to Creating a Secure mpi, 1997.
[4] D. Coppersmith, D.B. Johnson, S.M. Matyas, T.J. Watson, D.B. Johnson, and S.M. Matyas Triple des cipher Block Chaining with Output Feedback Masking, 1996.
[5] , Intel Corporation. Intel mpi Benchmarks User Guide and Methodology Description, 2008.
[6] J. Daemen and V. Rijmen, The Design of Rijndael. Springer, 2002.
[7] D.E. Denning, "Secure Personal Computing in an Insecure Network," Comm. ACM, vol. 22, no. 8, pp. 476-482, 1979.
[8] J.J. Dongarra, S.W. Otto, M. Snir, and D. Walker, "An Introduction to the Mpi Standard," technical report, Knoxville, TN, 1995.
[9] W. Ehrsam, S. Matyas, C. Meyer, and W. Tuchman, "A Cryptographic Key Management Scheme for Implementing the Data Encryption Standard," IBM Systems J., vol. 17, no. 2, pp. 106-125, 1978.
[10] A.J. Elbirt, W. Yip, B. Chetwynd, and C. Paar, "An fpga-Based Performance Evaluation of the aes Block Cipher Candidate Algorithm Finalists," IEEE Trans. Very Large Scale Integration Systems, vol. 9, no. 4, pp. 545-557, Aug. 2001.
[11] I. Foster, N.T. Karonis, C. Kesselman, G. Koenig, and S. Tuecke, "A Secure Communications Infrastructure for High-Performance Distributed Computing," Proc. IEEE Sixth Symp. High Performance Distributed Computing, pp. 125-136, 1996.
[12] A. Geist, W. Gropp, S. Huss-Lederman, A. Lumsdaine, E.L. Lusk, W. Saphir, T. Skjellum, and M. Snir, "Mpi-2: Extending the Message-Passing Interface," Proc. Second Int'l Euro-Par Conf. Parallel Processing (Euro-Par '96), pp. 128-135, 1996.
[13] R. Grabner, F. Mietke, and W. Rehm, "Implementing an mpich-2 Channel Device over Vapi on Infiniband," Proc. 18th Int'l Parallel and Distributed Processing Symp., p. 184, Apr. 2004.
[14] W. Gropp, E. Lusk, N. Doss, and A. Skjellum, "A High-Performance, Portable Implementation of the Mpi Message Passing Interface Standard," Parallel Computing, vol. 22, no. 6, pp. 789-828, 1996.
[15] P. Hamalainen, M. Hannikainen, T. Hamalainen, and J. Saarinen, "Configurable Hardware Implementation of Triple-des Encryption Algorithm for Wireless Local Area Network," Proc. IEEE Int'l Conf. Acoustics, Speech, and Signal Processing (ICASSP '01), pp. 1221-1224, 2001.
[16] G.A. Koenig, X. Meng, A.J. Lee, M. Treaster, N. Kiyanclar, and W. Yurcik, "Cluster Security with Nvisioncc: Process Monitoring by Leveraging Emergent Properties," Proc. IEEE Int'l Symp. Cluster Computing and Grid (CCGrid '05), 2005.
[17] M. Lee and E.J. Kim, "A Comprehensive Framework for Enhancing Security in Infiniband Architecture," IEEE Trans. Parallel Distributed Systems, vol. 18, no. 10, pp. 1393-1406, Oct. 2007.
[18] J. Liu, W. Jiang, P. Wyckoff, D.K. Panda, D. Ashton, D. Buntinas, W. Gropp, and B. Toonen, "Design and Implementation of Mpich2 over Infiniband with rdma Support," Proc. 18th Int'l Parallel and Distributed Processing Symp., p. 16, Apr. 2004.
[19] S. Mangard, M. Aigner, and S. Dominikus, "A Highly Regular and Scalable aes Hardware Architecture," IEEE Trans. Computers, vol. 52, no. 4, pp. 483-491, Apr. 2003.
[20] S. Matyas and C. Meyer, "Generation, Distribution, and Installation of Cryptographic Keys," IBM Systems J., vol. 17, no. 2, pp. 126-137, 1978.
[21] M. Pourzandi, D. Gordon, W. Yurcik, and G.A. Koenig, "Clusters and Security: Distributed Security for Distributed Systems," Proc. IEEE Int'l Symp. Cluster Computing and the Grid (CCGrid '05), vol. 1, pp. 96-104, May 2005.
[22] R. Prabhakar, C. Patrick, and M. Kandemir, "MPISec I/O: Providing Data Confidentiality in MPI-I/O," Proc. IEEE/ACM Ninth Int'l Symp. Cluster Computing and the Grid, pp. 388-395, 2009.
[23] V. Ramsurrun and K.M.S. Soyjaudah, "A Highly Available Transparent Linux Cluster Security Model," Proc. IEEE Int'l Performance, Computing and Comm. Conf. (IPCCC), pp. 69-76, Dec. 2008.
[24] S. Saini, R. Ciotti, B.T.N. Gunney, T.E. Spelce, A. Koniges, D. Dossa, P. Adamidis, R. Rabenseifner, S.R. Tiyyagura, and M. Mueller, "Performance Evaluation of Supercomputers using hpcc and imb Benchmarks," J. Computer and System Sciences, vol. 74, no. 6, pp. 965-982, 2008.
[25] S. Shepler, B. Callaghan, D. Robinson, R. Thurlow, C. Beame, M. Eisler, and D. Noveck, "Network File System (nfs) Version 4 Protocol," 2003.
[26] D.S. Wong, H.H. Fuentes, and A.H. Chan, "The Performance Measurement of Cryptographic Primitives on Palm Devices," Proc. 17th Ann. Computer Security Applications Conf. (ACSAC), pp. 92-101, 2001.
48 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool