TY - JOUR T1 - SRR: Secured Resource Reservation in Grid Computing AU - Devi, S. Nirmala AU - Pethalakshmi, A. JO - Asian Journal of Information Technology VL - 15 IS - 24 SP - 5102 EP - 5105 PY - 2016 DA - 2001/08/19 SN - 1682-3915 DO - ajit.2016.5102.5105 UR - https://makhillpublications.co/view-article.php?doi=ajit.2016.5102.5105 KW - Grid Computing KW -Resource Reservation KW -Security KW -Trustworthy Computing AB - Since, the advent of networking, the computers are vulnerable to the attack of the intruders. To tackle this, trustworthy computing was adopted in the networking environment. The grid computing environment works on the agreed virtual organizations which necessitates the secured reservation schemes. There were various reservation schemes available in grid as FCFS, priority based reservation, reservation based on negotiation, TARR, optimal resource reservation, etc. in this grid environment, there is the possibility for an intruder to reserve the resource. The intruder may send the request for the resource and reserve it to block the actual process to access the resource. This paper deals with the application of challenge response authentication for resource reservation in grid computing. ER -