Grid Computing: Combating Global Terrorism with the World Wide Grid

Grid Computing: Combating Global Terrorism with the World Wide Grid

Gokop Goteng, Ashutosh Tiwari, Rajkumar Roy
ISBN13: 9781605661841|ISBN10: 1605661848|EISBN13: 9781605661858
DOI: 10.4018/978-1-60566-184-1.ch027
Cite Chapter Cite Chapter

MLA

Goteng, Gokop, et al. "Grid Computing: Combating Global Terrorism with the World Wide Grid." Handbook of Research on Grid Technologies and Utility Computing: Concepts for Managing Large-Scale Applications, edited by Emmanuel Udoh and Frank Zhigang Wang, IGI Global, 2009, pp. 269-280. https://doi.org/10.4018/978-1-60566-184-1.ch027

APA

Goteng, G., Tiwari, A., & Roy, R. (2009). Grid Computing: Combating Global Terrorism with the World Wide Grid. In E. Udoh & F. Wang (Eds.), Handbook of Research on Grid Technologies and Utility Computing: Concepts for Managing Large-Scale Applications (pp. 269-280). IGI Global. https://doi.org/10.4018/978-1-60566-184-1.ch027

Chicago

Goteng, Gokop, Ashutosh Tiwari, and Rajkumar Roy. "Grid Computing: Combating Global Terrorism with the World Wide Grid." In Handbook of Research on Grid Technologies and Utility Computing: Concepts for Managing Large-Scale Applications, edited by Emmanuel Udoh and Frank Zhigang Wang, 269-280. Hershey, PA: IGI Global, 2009. https://doi.org/10.4018/978-1-60566-184-1.ch027

Export Reference

Mendeley
Favorite

Abstract

The emerging grid technology provides a secured platform for multidisciplinary experts in the security intelligence profession to collaborate and fight global terrorism. This chapter developed grid architecture and implementation strategy on how to connect the dots between security agents such as the CIA, FBI, police, custom officers and transport industry to share data and information on terrorists and their movements. The major grid components that featured in the architecture are the grid security portal, data grid, computational grid, semantic grid and collaboratory. The challenges of implementing this architecture are conflicting laws, cooperation among governments, and information on terrorist’s network and interoperability problem.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.