Millions of people all over the world are now connected to the Internet for doing business. Therefore, the
demand for Internet and web-based services continues to grow. So, need to install required infrastructure
to balance the computing. In spite the success of new infrastructure, it is susceptible to several critical
malfunctions. Therefore, to guarantee the secure operations on Network and Data, several solutions need
to be developed. The researchers are working in this direction to have the better solution for security.
In distributed environment, at the time of management of resources both computing and networking,
resource allocation and resource utilization, etc, the security is most crucial problem. In this paper, an
extensive review has been made on the different security aspect, different types of attack and techniques to
sustain and block the attack in the distributed environment.
%0 Journal Article
%1 noauthororeditor
%A Tondre, V.S.
%A Thakare, Dr. V.M
%A Sherekar, Dr. S.S.
%A Dharaskar, Dr. R.V.
%D 2011
%J International Journal of Computer Science, Engineering and Information Technology (IJCSEIT)
%K Anomaly Client-Server Firewall Internet Security discovery distributed system
%N 5
%P 01-12
%R 10.5121/ijcseit.2011.1501
%T ANALYSIS OF SECURITY ASPECTS FOR DYNAMIC RESOURCE MANAGEMENT IN DISTRIBUTED SYSTEMS
%U http://airccse.org/journal/ijcseit/papers/1211ijcseit01.pdf
%V 1
%X Millions of people all over the world are now connected to the Internet for doing business. Therefore, the
demand for Internet and web-based services continues to grow. So, need to install required infrastructure
to balance the computing. In spite the success of new infrastructure, it is susceptible to several critical
malfunctions. Therefore, to guarantee the secure operations on Network and Data, several solutions need
to be developed. The researchers are working in this direction to have the better solution for security.
In distributed environment, at the time of management of resources both computing and networking,
resource allocation and resource utilization, etc, the security is most crucial problem. In this paper, an
extensive review has been made on the different security aspect, different types of attack and techniques to
sustain and block the attack in the distributed environment.
@article{noauthororeditor,
abstract = {Millions of people all over the world are now connected to the Internet for doing business. Therefore, the
demand for Internet and web-based services continues to grow. So, need to install required infrastructure
to balance the computing. In spite the success of new infrastructure, it is susceptible to several critical
malfunctions. Therefore, to guarantee the secure operations on Network and Data, several solutions need
to be developed. The researchers are working in this direction to have the better solution for security.
In distributed environment, at the time of management of resources both computing and networking,
resource allocation and resource utilization, etc, the security is most crucial problem. In this paper, an
extensive review has been made on the different security aspect, different types of attack and techniques to
sustain and block the attack in the distributed environment.
},
added-at = {2018-09-12T07:46:42.000+0200},
author = {Tondre, V.S. and Thakare, Dr. V.M and Sherekar, Dr. S.S. and Dharaskar, Dr. R.V.},
biburl = {https://www.bibsonomy.org/bibtex/2cf1209dd8f9b4fe68dfa220aecb48aa2/ijcseit},
doi = {10.5121/ijcseit.2011.1501},
interhash = {7405ccb23757c938b9f2b082bedf7147},
intrahash = {cf1209dd8f9b4fe68dfa220aecb48aa2},
issn = {2231-3117 [Online] ; 2231-3605 [Print]},
journal = {International Journal of Computer Science, Engineering and Information Technology (IJCSEIT)},
keywords = {Anomaly Client-Server Firewall Internet Security discovery distributed system},
language = {English},
month = dec,
number = 5,
pages = {01-12},
timestamp = {2019-07-26T12:24:59.000+0200},
title = {ANALYSIS OF SECURITY ASPECTS FOR DYNAMIC RESOURCE MANAGEMENT IN DISTRIBUTED SYSTEMS},
url = {http://airccse.org/journal/ijcseit/papers/1211ijcseit01.pdf},
volume = 1,
year = 2011
}