Architecture Layer Based Grid Computing Security Study

Qing-hai BAI


With increasing grid computing application in more and more industries and sectors, grid security has grown into the most critical as well as important aspect in overall application architecture. This article, from architecture layer security dimension, studies security issue in grid computing environments, indicating architecture layer based security solutions in current grid computing and proposing grid security recommendations as well, which will contribute to further defining and analyzing security strategy in grid computing and function as a guideline to the development of grid computing technology. Keywords: grid security infrastructure; security strategy; grid computing


grid security infrastructure; security strategy; grid computing

Full Text:




  • There are currently no refbacks.

Share us to:   


  • How to do online submission to another Journal?
  • If you have already registered in Journal A, then how can you submit another article to Journal B? It takes two steps to make it happen:

1. Register yourself in Journal B as an Author

  • Find the journal you want to submit to in CATEGORIES, click on “VIEW JOURNAL”, “Online Submissions”, “GO TO LOGIN” and “Edit My Profile”. Check “Author” on the “Edit Profile” page, then “Save”.

2. Submission

  • Go to “User Home”, and click on “Author” under the name of Journal B. You may start a New Submission by clicking on “CLICK HERE”.

We only use three mailboxes as follows to deal with issues about paper acceptance, payment and submission of electronic versions of our journals to databases:;;

 Articles published in Management Science and Engineering are licensed under Creative Commons Attribution 4.0 (CC-BY).


Address: 9375 Rue de Roissy Brossard, Québec, J4X 3A1, Canada

Telephone: 1-514-558 6138
Http:// Http://

Copyright © 2010 Canadian Research & Development Centre of Sciences and Cultures