GOLD infrastructure for virtual organizations
暂无分享,去创建一个
N Cook | Jeremy Bryans | Ar Wright | Rob Smith | Michael D. Hamilton | Hugo Hiden | Paul Watson | P Periorellis | A Conlin | J Wu | X Gong | F Zhu
[1] Yuri Demchenko,et al. Virtual organisations in computer grids and identity management , 2004, Inf. Secur. Tech. Rep..
[2] Santosh K. Shrivastava,et al. Implementing fair non-repudiable interactions with Web services , 2005, Ninth IEEE International EDOC Enterprise Computing Conference (EDOC'05).
[3] Gerard J. Holzmann,et al. Design and validation of computer protocols , 1991 .
[4] George Coulouris,et al. Security requirements for cooperative work: a model and its system implications , 1994, EW 6.
[5] L. Meyerovich,et al. The Soundness and Completeness of Margrave with Respect to a Subset of XACML , 2005 .
[6] Ravi S. Sandhu,et al. Role-Based Access Control Models , 1996, Computer.
[7] Ravi S. Sandhu,et al. Task-Based Authorization Controls (TBAC): A Family of Models for Active and Enterprise-Oriented Autorization Management , 1997, DBSec.
[8] Santosh K. Shrivastava,et al. A method for specifying contract mediated interactions , 2005, Ninth IEEE International EDOC Enterprise Computing Conference (EDOC'05).
[9] Peter Checkland,et al. Soft Systems Methodology in Action , 1990 .
[10] Ken Klingenstein,et al. Federated Security: The Shibboleth Approach , 2004 .
[11] David W. Chadwick,et al. The PERMIS X.509 role based privilege management infrastructure , 2003, Future Gener. Comput. Syst..
[12] Jianying Zhou,et al. An intensive survey of fair non-repudiation protocols , 2002, Comput. Commun..
[13] Geoffrey C. Fox,et al. NaradaBrokering: A Distributed Middleware Framework and Architecture for Enabling Durable Peer-to-Peer Grids , 2003, Middleware.
[14] Luc Moreau,et al. The myGrid Notification Service , 2003 .
[15] Rob Smith,et al. A computer architecture to support the operation of virtual organisations for the chemical development lifecycle , 2005 .
[16] J. Crowcroft,et al. On the monitoring of contractual service level agreements , 2004, Proceedings. First IEEE International Workshop on Electronic Contracting, 2004..
[17] Santosh K. Shrivastava,et al. Contract representation for run-time monitoring and enforcement , 2003, EEE International Conference on E-Commerce, 2003. CEC 2003..
[18] Michael Carl Tschantz,et al. Verification and change-impact analysis of access-control policies , 2005, Proceedings. 27th International Conference on Software Engineering, 2005. ICSE 2005..
[19] Thomas Erl,et al. Service-Oriented Architecture: A Field Guide to Integrating XML and Web Services , 2004 .
[20] Liang Chen,et al. Grid Service Orchestration Using the Business Process Execution Language (BPEL) , 2005, Journal of Grid Computing.
[21] Santosh K. Shrivastava,et al. Distributed object middleware to support dependable information sharing between organisations , 2002, Proceedings International Conference on Dependable Systems and Networks.
[22] Dieter Gollmann,et al. On Fairness in Exchange Protocols , 2002, ICISC.
[23] Roshan K. Thomas,et al. Team-based access control (TMAC): a primitive for applying role-based access controls in collaborative environments , 1997, RBAC '97.
[24] Panos Periorellis. Authorization-Authentication Using XACML and SAML , 2005 .
[25] Peter Li. The myGrid information model , 2004 .
[26] Giovanni Della-Libera,et al. Web Services Trust Language (WS-Trust) , 2002 .
[27] Andreas Matheus,et al. How to Declare Access Control Policies for XML Structured Information Objects using OASIS' eXtensible Access Control Markup Language (XACML) , 2005, Proceedings of the 38th Annual Hawaii International Conference on System Sciences.
[28] Santosh K. Shrivastava,et al. Model Checking Correctness Properties of Electronic Contracts , 2003, ICSOC.