The authors believe that providing security for supercomputer clusters is different from providing security for stand-alone PCs. The types of programs that supercomputer clusters run and the sort of data available on supercomputer clusters are fundamentally different from the programs and data found on stand-alone PCs. This situation might attract a different type of attacker with different goals and different tactics. This paper discusses the results of a questionnaire sent out to many supercomputer clusters in the United States and relates them to a literature search that was also undertaken. These results suggest approaches that can be taken to further secure supercomputer clusters.
G. Markowsky and L. Markowsky, "Survey of Supercomputer Cluster Security Issues," Proceedings of the 2007 International Conference on Security and Management, SAM'07 (2007, Las Vegas, NV), pp. 474-480, CSREA Press, Jun 2007.
2007 International Conference on Security and Management, SAM'07 (2007: Jun. 25-28, Las Vegas, NV)
Keywords and Phrases
Cluster; Cluster securities; Literature searches; Questionnaire; Security; Stand -alone; Computers; Supercomputers
International Standard Book Number (ISBN)
Article - Conference proceedings
© 2007 CSREA Press, All rights reserved.
01 Jun 2007