Security policy verification in grid systems
暂无分享,去创建一个
[1] Ami Marowka,et al. The GRID: Blueprint for a New Computing Infrastructure , 2000, Parallel Distributed Comput. Pract..
[2] Ian Foster,et al. The Grid 2 - Blueprint for a New Computing Infrastructure, Second Edition , 1998, The Grid 2, 2nd Edition.
[3] Ahmad-Reza Sadeghi,et al. Enhancing Grid Security Using Trusted Virtualization , 2007, ATC.
[4] Maxim O. Kalinin,et al. Security Modeling of Grid Systems Using Petri Nets , 2012, MMM-ACNS.
[5] Bibhudatta Sahoo,et al. An Anamaly Detection System for DDOS attack in Grid Computing , 2009 .
[6] Sung Je Hong,et al. Workflow-Based Authorization Service in the Grid , 2004, Journal of Grid Computing.
[7] Arie Shoshani,et al. The Grid 2: Blueprint for a New Computing Infrastructure (2nd edition), , 2003 .
[8] Fabio Martinelli,et al. Enhancing grid security by fine-grained behavioral control and negotiation-based authorization , 2009, International Journal of Information Security.
[9] Anirban Chakrabarti. Grid computing security , 2007 .