-
1
-
-
6344252245
-
Proxy chaining and policy implementation in roaming
-
June
-
B. Aboba and J. Vollbrecht. "Proxy chaining and policy implementation in roaming." RFC 2607, June 1999.
-
(1999)
RFC
, vol.2607
-
-
Aboba, B.1
Vollbrecht, J.2
-
2
-
-
33749663640
-
Job management in grids of MOSIX clusters
-
August 13-15 Reno, Nevada, USA
-
Abramson, D., Barak, A and Enticott, C. "Job Management in Grids of MOSIX Clusters", 16th International Conference on Parallel and Distributed Computing Systems, August 13-15, pp 36-42, 2003 Reno, Nevada, USA.
-
(2003)
16th International Conference on Parallel and Distributed Computing Systems
, pp. 36-42
-
-
Abramson, D.1
Barak, A.2
Enticott, C.3
-
3
-
-
0029531502
-
Nimrod: A tool for performing parametised simulations using distributed workstations
-
Virginia, August
-
D. Abramson, R. Sosic, J. Giddy, and B. Hall. "Nimrod: A tool for performing parametised simulations using distributed workstations." In Proceedings of the 4th IEEE Symposium on High Performance Distributed Computing, Virginia, August 1995.
-
(1995)
Proceedings of the 4th IEEE Symposium on High Performance Distributed Computing
-
-
Abramson, D.1
Sosic, R.2
Giddy, J.3
Hall, B.4
-
4
-
-
84960378385
-
Nimrod/G: An architecture of a resource management and scheduling system in a global computational grid
-
Beijing, China, May 14-17
-
R. Buyya, D. Abramson, and J. Giddy. "Nimrod/G: An architecture of a resource management and scheduling system in a global computational grid." In Proceedings of HPC Asia 2000, Beijing, China, May 14-17 2000.
-
(2000)
Proceedings of HPC Asia 2000
-
-
Buyya, R.1
Abramson, D.2
Giddy, J.3
-
5
-
-
0010512569
-
A guide to understanding covert channel analysis of trusted systems
-
National Computer Security Center, Fort Meade, Maryland, November
-
National Computer Security Center. "A guide to understanding covert channel analysis of trusted systems." Technical Report NCSC-TG-030, National Computer Security Center, Fort Meade, Maryland, November 1993. Available: http://www.radium.ncsc.mil/tpep/library/rainbow/NCSC-TG-030.html.
-
(1993)
Technical Report
, vol.NCSC-TG-030
-
-
-
10
-
-
0032218229
-
A security architecture for computational grids
-
I. Foster, C. Kesselman, G. Tsudik, and S. Tuecke. "A security architecture for computational grids." In Proc. 5th ACM Conference on Computer and Communications Security Conference, pages 83-92, 1998.
-
(1998)
Proc. 5th ACM Conference on Computer and Communications Security Conference
, pp. 83-92
-
-
Foster, I.1
Kesselman, C.2
Tsudik, G.3
Tuecke, S.4
-
14
-
-
33749663448
-
-
The Globus Alliance website: http://www.globus.org.
-
-
-
-
15
-
-
26544456282
-
Globus grid and firewalls: Issues and solutions in a utility data center environment
-
HP Laboratories Palo Alto
-
S. Graupner and C. Reimann. "Globus grid and firewalls: Issues and solutions in a utility data center environment." Technical Report HPL-2002-278, HP Laboratories Palo Alto, 2002.
-
(2002)
Technical Report
, vol.HPL-2002-278
-
-
Graupner, S.1
Reimann, C.2
-
17
-
-
2342549575
-
GSS-API authentication method for SOCKS version 5
-
June
-
P. McMahon. "GSS-API authentication method for SOCKS version 5. RFC 1961." June 1996.
-
(1996)
RFC
, vol.1961
-
-
McMahon, P.1
-
19
-
-
0033684968
-
-
hpdc
-
Y. Tanaka, M. Sato, M Hirano, H Nakada and S Sekiguchi. "Performance Evaluation of a Firewall-Compliant Globus-Based Wide-Area Cluster System," hpdc, vol. 00, no., p. 121, 2000.
-
(2000)
Performance Evaluation of a Firewall-compliant Globus-based Wide-area Cluster System
, pp. 121
-
-
Tanaka, Y.1
Sato, M.2
Hirano, M.3
Nakada, H.4
Sekiguchi, S.5
-
20
-
-
33749657250
-
-
Web services architecture. Available: http://www.w3.org/TR/ws-arch.
-
-
-
|