Innovations for Grid Security from Trusted Computing
暂无分享,去创建一个
[1] Tal Garfinkel,et al. Flexible OS Support and Applications for Trusted Computing , 2003, HotOS.
[2] Andrew Martin,et al. Grids and Private Networks are Anthitetical , 2004 .
[3] Ian T. Foster,et al. The Anatomy of the Grid: Enabling Scalable Virtual Organizations , 2001, Int. J. High Perform. Comput. Appl..
[4] Ian Foster,et al. The Grid 2 - Blueprint for a New Computing Infrastructure, Second Edition , 1998, The Grid 2, 2nd Edition.
[5] Ian T. Foster,et al. A security architecture for computational grids , 1998, CCS '98.
[6] David W. Chadwick,et al. RBAC Policies in XML for X.509 Based Privilege Management , 2002, SEC.
[7] David P. Anderson,et al. BOINC: a system for public-resource computing and storage , 2004, Fifth IEEE/ACM International Workshop on Grid Computing.
[8] Marvin Theimer,et al. Feasibility of a serverless distributed file system deployed on an existing set of desktop PCs , 2000, SIGMETRICS '00.
[9] Rajkumar Buyya,et al. Fifth IEEE/ACM International Workshop on Grid Computing : 8 November 2004, Pittsburgh, PA : proceedings , 2004 .
[10] Sean W. Smith,et al. Experimenting with TCPA/TCG Hardware, Or: How I Learned to Stop Worrying and Love The Bear , 2003 .
[11] Steven Tuecke,et al. An online credential repository for the Grid: MyProxy , 2001, Proceedings 10th IEEE International Symposium on High Performance Distributed Computing.
[12] Srilekha Mudumbai,et al. Certificate-based authorization policy in a PKI environment , 2003, TSEC.
[13] William A. Arbaugh,et al. Improving the TCPA Specification , 2002, Computer.
[14] Dave Stainforth,et al. Security principles for public-resource modeling research , 2004, 13th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises.
[15] Robert P. Goldberg,et al. Survey of virtual machine research , 1974, Computer.
[16] Ian T. Foster,et al. A community authorization service for group collaboration , 2002, Proceedings Third International Workshop on Policies for Distributed Systems and Networks.
[17] Michael Franz,et al. Semantic remote attestation: a virtual machine directed approach to trusted computing , 2004 .
[18] Ákos Frohner,et al. VOMS, an Authorization System for Virtual Organizations , 2003, European Across Grids Conference.
[19] Jerome H. Saltzer,et al. End-to-end arguments in system design , 1984, TOCS.
[20] David P. Anderson,et al. SETI@home-massively distributed computing for SETI , 2001, Comput. Sci. Eng..
[21] Leonard A. Smith,et al. Uncertainty in predictions of the climate response to rising levels of greenhouse gases , 2005, Nature.