Grid Computing: Combating Global Terrorism with the World Wide Grid

Grid Computing: Combating Global Terrorism with the World Wide Grid

Gokop Goteng, Ashutosh Tiwari, Rajkumar Roy
ISBN13: 9781466608795|ISBN10: 146660879X|EISBN13: 9781466608801
DOI: 10.4018/978-1-4666-0879-5.ch101
Cite Chapter Cite Chapter

MLA

Goteng, Gokop, et al. "Grid Computing: Combating Global Terrorism with the World Wide Grid." Grid and Cloud Computing: Concepts, Methodologies, Tools and Applications, edited by Information Resources Management Association, IGI Global, 2012, pp. 1-11. https://doi.org/10.4018/978-1-4666-0879-5.ch101

APA

Goteng, G., Tiwari, A., & Roy, R. (2012). Grid Computing: Combating Global Terrorism with the World Wide Grid. In I. Management Association (Ed.), Grid and Cloud Computing: Concepts, Methodologies, Tools and Applications (pp. 1-11). IGI Global. https://doi.org/10.4018/978-1-4666-0879-5.ch101

Chicago

Goteng, Gokop, Ashutosh Tiwari, and Rajkumar Roy. "Grid Computing: Combating Global Terrorism with the World Wide Grid." In Grid and Cloud Computing: Concepts, Methodologies, Tools and Applications, edited by Information Resources Management Association, 1-11. Hershey, PA: IGI Global, 2012. https://doi.org/10.4018/978-1-4666-0879-5.ch101

Export Reference

Mendeley
Favorite

Abstract

The emerging grid technology provides a secured platform for multidisciplinary experts in the security intelligence profession to collaborate and fight global terrorism. This chapter developed grid architecture and implementation strategy on how to connect the dots between security agents such as the CIA, FBI, police, custom officers and transport industry to share data and information on terrorists and their movements. The major grid components that featured in the architecture are the grid security portal, data grid, computational grid, semantic grid and collaboratory. The challenges of implementing this architecture are conflicting laws, cooperation among governments, and information on terrorist’s network and interoperability problem.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.