Security Implications of Typical Grid Computing Usage Scenarios
暂无分享,去创建一个
[1] John F. Karpovich,et al. Resource management in Legion , 1999, Future Gener. Comput. Syst..
[2] Andrew S. Grimshaw,et al. Accountability and Control of Process Creation in Metasystems , 2000, NDSS.
[3] Theodore Y. Ts'o,et al. Kerberos: an authentication service for computer networks , 1994, IEEE Communications Magazine.
[4] Andrew S. Grimshaw,et al. A Flexible Security System for Metacomputing Environments , 1999, HPCN Europe.
[5] Ian T. Foster,et al. A security architecture for computational grids , 1998, CCS '98.
[6] Ian T. Foster,et al. Grid information services for distributed resource sharing , 2001, Proceedings 10th IEEE International Symposium on High Performance Distributed Computing.
[7] Leon Gommans,et al. AAA Authorization Requirements , 2000, RFC.
[8] Premkumar T. Devanbu,et al. Resource Management , 2000, EDO.
[9] Andrew S. Grimshaw,et al. The Legion Vision of a Worldwide Computer. , 1997 .
[10] William E. Johnston,et al. Overview of security considerations for computational and data grids , 2001, Proceedings 10th IEEE International Symposium on High Performance Distributed Computing.
[11] Marty Humphrey,et al. Security Implications of Typical Grid Computing Usage Scenarios , 2001, Proceedings 10th IEEE International Symposium on High Performance Distributed Computing.
[12] Marty Humphrey,et al. Toward Realizable Restricted Delegation in Computational Grids , 2001, HPCN Europe.
[13] Andrew S. Grimshaw,et al. The Legion vision of a worldwide virtual computer , 1997, Commun. ACM.
[14] Carmen M. Pancerella,et al. The Diesel Combustion Collaboratory: Combustion Researchers Collaborating over the Internet , 1999, SC.
[15] Ian T. Foster,et al. Globus: a Metacomputing Infrastructure Toolkit , 1997, Int. J. High Perform. Comput. Appl..
[16] Christopher Allen,et al. The TLS Protocol Version 1.0 , 1999, RFC.
[17] Leon Gommans,et al. AAA Authorization Application Examples , 2000, RFC.