Abstractions, accounts and grid usability
暂无分享,去创建一个
Alex Voss | Rob Procter | Mark Hartswood | Yuwei Lin | Jenny Ure | Roger Slack | J. M. Schopf | J. Schopf | R. Procter | A. Voss | M. Hartswood | R. Slack | Yuwei Lin | J. Ure
[1] Ian Foster,et al. The Grid 2 - Blueprint for a New Computing Infrastructure, Second Edition , 1998, The Grid 2, 2nd Edition.
[2] Diana K. Smetters,et al. In search of usable security: five lessons from the field , 2004, IEEE Security & Privacy Magazine.
[3] Andrew C. Simpson,et al. Collaboration and Trust in Healthcare Innovation: The eDiaMoND Case Study , 2005, Computer Supported Cooperative Work (CSCW).
[4] K. Knorr-Cetina,et al. Epistemic cultures : how the sciences make knowledge , 1999 .
[5] Paul Dourish,et al. In the eye of the beholder: A visualization-based approach to information system security , 2005, Int. J. Hum. Comput. Stud..
[6] John Bowers,et al. The work to make a network work: studying CSCW in action , 1994, CSCW '94.
[7] Stephen Farrell,et al. Securely Available Credentials - Requirements , 2001, RFC.
[8] Jadwiga Indulska,et al. Balancing autonomy and user control in context-aware systems - a survey , 2006, Fourth Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOMW'06).
[9] Paul Dourish,et al. Where the action is , 2001 .
[10] Yvonne Rogers,et al. Ghosts in the network: distributed troubleshooting in a shared working environment , 1992, CSCW '92.
[11] Jim Basney,et al. The MyProxy online credential repository , 2005, Softw. Pract. Exp..
[12] Thomas A. Corbi,et al. The dawning of the autonomic computing era , 2003, IBM Syst. J..
[13] Ami Marowka,et al. The GRID: Blueprint for a New Computing Infrastructure , 2000, Parallel Distributed Comput. Pract..
[14] Rob Procter,et al. Improving Web Usability with the Link Lens , 1999, Comput. Networks.
[15] Stuart Anderson,et al. Making autonomic computing systems accountable: the problem of human computer interaction , 2003, 14th International Workshop on Database and Expert Systems Applications, 2003. Proceedings..
[16] Jim Basney,et al. Mechanisms for increasing the usability of grid security , 2005, Int. J. Hum. Comput. Stud..
[17] Martina Angela Sasse,et al. Why users compromise computer security mechanisms and how to take remedial measures. , 1999 .
[18] Mike Just,et al. Securely Available Credentials (SACRED) - Credential Server Framework , 2004, RFC.
[19] Peter Gutmann,et al. Plug-and-Play PKI: A PKI Your Mother Can Use , 2003, USENIX Security Symposium.