Autors: Sharabov, M. Z., Tsochev, G. R., Trifonov, R. I. Title: Security of Clusters: A Review Keywords: clusters, FIM, HBA, OpenID Connect, RBAC, security, single sign onAbstract: Security of computer networks and clusters is crucial for ensuring connectivity to the outside world and cloud services to not be interrupted. To prevent unauthorized access to them we must ensure that we have robust encryption and authentication of the connection between the servers and clients. To ensure security standards, security audits and updates are crucial to prevent threats in cluster environments. Firewall, intrusion detection and prevention systems are great assets for strengthening clusters security. This article gives an overview of security of clusters. References - M. Pourzandi, D. Gordon, W. Yurcik and G. A. Koenig, "Clusters and security: distributed security for distributed systems," CCGrid 2005. IEEE International Symposium on Cluster Computing and the Grid, 2005., Cardiff, UK, 2005, pp. 96-104 Vol. 1, doi: 10.1109/CCGRID.2005.1558540.
- Guilherme Chehab, “Computer Clusters, Types, Uses and Applications”, Online, Available at: https://www.baeldung.com/cs/computer-clusters-types (Last visit: 11.11.2023)
- Xu, Cheng-Zhong. (2005). Scalable and Secure Internet Services and Architecture. 10.1201/9781420035209.
- Topic 2: Clustering Security, Online, Available at: https://www.coursehero.com/file/26681072/IT332-unit5-db2docx/, (Last visit 13.11.2023)
- R. Senigaglia, Cl. Irti, Al. Bernes, Privacy and Data Protection in Software Services (Services and Business Process Reengineering); Publisher: Springer; ISBN: 9789811630514
- Taina Teravainen, “single sign-on (SSO)”, Online, Available at: https://www.techtarget.com/searchsecurity/definition/single-sign-on (Last visit: 11.11.2023)
Issue
| Proceedings - 2024 International Conference on Applied Mathematics and Computer Science, ICAMCS 2024, pp. 92-95, 2024, , https://doi.org/10.1109/ICAMCS62774.2024.00018 |
|