External Firewall

14,000,000 Leading Edge Experts on the ideXlab platform

Scan Science and Technology

Contact Leading Edge Experts & Companies

Scan Science and Technology

Contact Leading Edge Experts & Companies

The Experts below are selected from a list of 12 Experts worldwide ranked by ideXlab platform

D. L. G Hill - One of the best experts on this subject based on the ideXlab platform.

  • Using Grid Services From Behind A Firewall
    2010
    Co-Authors: A. L. Rowland, M. Burns, J. V Hajnal, D. Rueckert, D. L. G Hill
    Abstract:

    Grid services promise the power of the supercomputer to the average desktop user. However, as with all forms of distributed computing, they rely on the sending and receiving of messages between components for the system to work. The rapid rise in attacks by malicious users has meant that Firewalls have become a way of life for any machine permanently connected to the internet. Opening External Firewall ports involves a degree of trust which, even to ‘friendly ’ networks, is still unacceptable for many institutions. This paper discusses the security concerns and describes a system for submitting complex workflows to a remote grid service for execution and retrieving the corresponding output, from a location situated behind a Firewall with no open inbound ports without the need for any low level user interaction

A. L. Rowland - One of the best experts on this subject based on the ideXlab platform.

  • Using Grid Services From Behind A Firewall
    2010
    Co-Authors: A. L. Rowland, M. Burns, J. V Hajnal, D. Rueckert, D. L. G Hill
    Abstract:

    Grid services promise the power of the supercomputer to the average desktop user. However, as with all forms of distributed computing, they rely on the sending and receiving of messages between components for the system to work. The rapid rise in attacks by malicious users has meant that Firewalls have become a way of life for any machine permanently connected to the internet. Opening External Firewall ports involves a degree of trust which, even to ‘friendly ’ networks, is still unacceptable for many institutions. This paper discusses the security concerns and describes a system for submitting complex workflows to a remote grid service for execution and retrieving the corresponding output, from a location situated behind a Firewall with no open inbound ports without the need for any low level user interaction

M. Burns - One of the best experts on this subject based on the ideXlab platform.

  • Using Grid Services From Behind A Firewall
    2010
    Co-Authors: A. L. Rowland, M. Burns, J. V Hajnal, D. Rueckert, D. L. G Hill
    Abstract:

    Grid services promise the power of the supercomputer to the average desktop user. However, as with all forms of distributed computing, they rely on the sending and receiving of messages between components for the system to work. The rapid rise in attacks by malicious users has meant that Firewalls have become a way of life for any machine permanently connected to the internet. Opening External Firewall ports involves a degree of trust which, even to ‘friendly ’ networks, is still unacceptable for many institutions. This paper discusses the security concerns and describes a system for submitting complex workflows to a remote grid service for execution and retrieving the corresponding output, from a location situated behind a Firewall with no open inbound ports without the need for any low level user interaction

J. V Hajnal - One of the best experts on this subject based on the ideXlab platform.

  • Using Grid Services From Behind A Firewall
    2010
    Co-Authors: A. L. Rowland, M. Burns, J. V Hajnal, D. Rueckert, D. L. G Hill
    Abstract:

    Grid services promise the power of the supercomputer to the average desktop user. However, as with all forms of distributed computing, they rely on the sending and receiving of messages between components for the system to work. The rapid rise in attacks by malicious users has meant that Firewalls have become a way of life for any machine permanently connected to the internet. Opening External Firewall ports involves a degree of trust which, even to ‘friendly ’ networks, is still unacceptable for many institutions. This paper discusses the security concerns and describes a system for submitting complex workflows to a remote grid service for execution and retrieving the corresponding output, from a location situated behind a Firewall with no open inbound ports without the need for any low level user interaction

D. Rueckert - One of the best experts on this subject based on the ideXlab platform.

  • Using Grid Services From Behind A Firewall
    2010
    Co-Authors: A. L. Rowland, M. Burns, J. V Hajnal, D. Rueckert, D. L. G Hill
    Abstract:

    Grid services promise the power of the supercomputer to the average desktop user. However, as with all forms of distributed computing, they rely on the sending and receiving of messages between components for the system to work. The rapid rise in attacks by malicious users has meant that Firewalls have become a way of life for any machine permanently connected to the internet. Opening External Firewall ports involves a degree of trust which, even to ‘friendly ’ networks, is still unacceptable for many institutions. This paper discusses the security concerns and describes a system for submitting complex workflows to a remote grid service for execution and retrieving the corresponding output, from a location situated behind a Firewall with no open inbound ports without the need for any low level user interaction