Abstract

The authors believe that providing security for supercomputer clusters is different from providing security for stand-alone PCs. The types of programs that supercomputer clusters run and the sort of data available on supercomputer clusters are fundamentally different from the programs and data found on stand-alone PCs. This situation might attract a different type of attacker with different goals and different tactics. This paper discusses the results of a questionnaire sent out to many supercomputer clusters in the United States and relates them to a literature search that was also undertaken. These results suggest approaches that can be taken to further secure supercomputer clusters.

Meeting Name

2007 International Conference on Security and Management, SAM'07 (2007: Jun. 25-28, Las Vegas, NV)

Department(s)

Computer Science

Keywords and Phrases

Cluster; Cluster securities; Literature searches; Questionnaire; Security; Stand -alone; Computers; Supercomputers

International Standard Book Number (ISBN)

978-1601320483

Document Type

Article - Conference proceedings

Document Version

Final Version

File Type

text

Language(s)

English

Rights

© 2007 CSREA Press, All rights reserved.

Publication Date

01 Jun 2007

Share

 
COinS