Security architecture for heterogeneous distributed computing systems
暂无分享,去创建一个
[1] Gaetano Borriello,et al. Location Systems for Ubiquitous Computing , 2001, Computer.
[2] Thomas Phan,et al. Challenge: integrating mobile wireless devices into the computational grid , 2002, MobiCom '02.
[3] M.E. Hellman,et al. An overview of public key cryptography , 1978, IEEE Communications Magazine.
[4] Gaurav S. Sukhatme,et al. Connecting the Physical World with Pervasive Networks , 2002, IEEE Pervasive Comput..
[5] Franco Zambonelli,et al. The Cloak of Invisibility: Challenges and Applications , 2002, IEEE Pervasive Comput..
[6] Stephan Olariu,et al. Towards a new paradigm for securing wireless sensor networks , 2003, NSPW '03.
[7] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[8] He Huang,et al. ISCP: design and implementation of an inter-domain security management agent (SMA) coordination protocol , 2000, NOMS 2000. 2000 IEEE/IFIP Network Operations and Management Symposium 'The Networked Planet: Management Beyond 2000' (Cat. No.00CB37074).
[9] Ian T. Foster,et al. The anatomy of the grid: enabling scalable virtual organizations , 2001, Proceedings First IEEE/ACM International Symposium on Cluster Computing and the Grid.
[10] Ian T. Foster,et al. Security for Grid services , 2003, High Performance Distributed Computing, 2003. Proceedings. 12th IEEE International Symposium on.
[11] Cynthia E. Irvine,et al. Quality of security service , 2001, NSPW '00.
[12] Vijay Varadharajan,et al. A multilevel security model for a distributed object-oriented system , 1990, [1990] Proceedings of the Sixth Annual Computer Security Applications Conference.
[13] Gregory D. Abowd,et al. A Context-Based Infrastructure for Smart Environments , 2000 .
[14] E. Ferrari,et al. Trust negotiations: concepts, systems, and languages , 2004, Computing in Science & Engineering.