A systematic review on security aware real-time task scheduling
S Singh - Sustainable Computing: Informatics and Systems, 2023 - Elsevier
Nowadays, security and scheduling are the most crucial aspects of each distributed real-
time application due to the rapidly enhanced use of such applications. This study presents a …
time application due to the rapidly enhanced use of such applications. This study presents a …
[PDF][PDF] Open issues and challenges in security-aware real-time scheduling for distributed systems
Task Scheduling for real-time distributed systems has been investigated extensively in the
literature. However, conventional wisdom in dynamic scheduling ignores security …
literature. However, conventional wisdom in dynamic scheduling ignores security …
Real-time scheduling with quality of security constraints
An increasing number of real-time applications such as aircraft control and medical
electronics systems require high quality of security to assure confidentiality, authenticity and …
electronics systems require high quality of security to assure confidentiality, authenticity and …
SDTS: security driven task scheduling algorithm for real-time applications using fog computing
S Singh, S Pal - IETE Journal of Research, 2023 - Taylor & Francis
Nowadays, security and scheduling have become more critical issues of rapidly increasing
applications running in real-time systems. In this work, we tried to solve these intricate issues …
applications running in real-time systems. In this work, we tried to solve these intricate issues …
A two-phase scheduling strategy for real-time applications with security requirements on heterogeneous clusters
X Zhu, P Lu - Computers & Electrical Engineering, 2009 - Elsevier
Nowadays, increasing attention has been directed towards the issue of security service for
real-time applications with security requirements on clusters. However, the study of …
real-time applications with security requirements on clusters. However, the study of …
Dynamic task scheduling with security awareness in real-time systems
An increasing number of real-time applications, such as aircraft control and medical
electronics systems, require high quality of security to assure confidentiality, authenticity and …
electronics systems, require high quality of security to assure confidentiality, authenticity and …
Scheduling security-critical real-time applications on clusters
Security-critical real-time applications such as military aircraft flight control systems have
mandatory security requirements in addition to stringent timing constraints. Conventional …
mandatory security requirements in addition to stringent timing constraints. Conventional …
Enhancing security of real-time applications on grids through dynamic scheduling
Real-time applications with security requirements are emerging in various areas including
government, education, and business. However, conventional real-time scheduling …
government, education, and business. However, conventional real-time scheduling …
Security aware dynamic scheduling algorithm (SADSA) for real-time applications on grid
S Singh, S Batabyal, S Tripathi - Cluster Computing, 2020 - Springer
Security is a major concern of modern real-time applications, besides requiring stringent
latency bound. However, encryption algorithms are computation intensive task which …
latency bound. However, encryption algorithms are computation intensive task which …
[PDF][PDF] Design and analysis of security aware scheduling in grid computing environment
M Khan - International Journal of Computer Science and …, 2013 - researchgate.net
Grid computing solves large scale applications by coordinating and sharing computational
power, data storage and network resources across dynamic and geographically dispersed …
power, data storage and network resources across dynamic and geographically dispersed …