메뉴 건너뛰기




Volumn , Issue , 2006, Pages 373-380

Towards a secure, tamper-proof grid platform

Author keywords

[No Author keywords available]

Indexed keywords

GRID PLATFORM ARCHITECTURE; TAMPERRESISTANT ENVIRONMENT; TRUSTED COMPUTING;

EID: 33751081043     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/CCGRID.2006.103     Document Type: Conference Paper
Times cited : (19)

References (21)
  • 1
    • 33751118430 scopus 로고    scopus 로고
    • Department of Defense Trusted Computer System Evaluation Criteria, Dec. 1985
    • Department of Defense Trusted Computer System Evaluation Criteria, Dec. 1985.
  • 2
    • 84860035570 scopus 로고    scopus 로고
    • Nov.
    • Globus toolkit advisories. http://www-unix. globus.org/toolkit/ advisories.html, Nov. 2005.
    • (2005)
  • 4
    • 0027684663 scopus 로고
    • Operating system protection through program evoloution
    • Oct.
    • F. Cohen. Operating system protection through program evoloution. Computers and Security, 12(6):565-584, Oct. 1993.
    • (1993) Computers and Security , vol.12 , Issue.6 , pp. 565-584
    • Cohen, F.1
  • 12
    • 84957893114 scopus 로고    scopus 로고
    • On software protection via function hiding
    • D. Aucsmith, editor, number vol. 1525 in Lecture Notes in Computer Science. Springer-Verlag, New York
    • T. Sander and C. Tschudin. On software protection via function hiding. In D. Aucsmith, editor, Proceedings of the 2nd International Conferance on Information Hiding, number vol. 1525 in Lecture Notes in Computer Science, pages 111-123. Springer-Verlag, New York, 1998.
    • (1998) Proceedings of the 2nd International Conferance on Information Hiding , pp. 111-123
    • Sander, T.1    Tschudin, C.2
  • 16
    • 27544477855 scopus 로고    scopus 로고
    • BIND: A fine-grained attestation service for secure distributed systems
    • Oakland, CA, May. IEEE Press
    • E. Shi, A. Perrig, and L. van Doom. BIND: A fine-grained attestation service for secure distributed systems. In Proc. IEEE Security & Privacy Conf., Oakland, CA, May 2005. IEEE Press.
    • (2005) Proc. IEEE Security & Privacy Conf.
    • Shi, E.1    Perrig, A.2    Van Doom, L.3
  • 20
    • 0002717089 scopus 로고    scopus 로고
    • Protecting mobile agents through tracing
    • Springer-Verlag, New York
    • G. Vigna. Protecting mobile agents through tracing. In Lecture Notes in Computer Science, number vol. 1419, pages 137-153. Springer-Verlag, New York, 1998.
    • (1998) Lecture Notes in Computer Science , vol.1419 , pp. 137-153
    • Vigna, G.1
  • 21
    • 84982946701 scopus 로고    scopus 로고
    • A sanctuary for mobile agents
    • J. Vitek and C. Jensen, editors, number vol. 1603 in Lecture Notes in Computer Science, Springer-Verlag, New York
    • B. Yee. A sanctuary for mobile agents. In J. Vitek and C. Jensen, editors, Secure Internet Programming: Security Issues for Mobile and Distributed Objects, number vol. 1603 in Lecture Notes in Computer Science, pages 261-274. Springer-Verlag, New York, 1999.
    • (1999) Secure Internet Programming: Security Issues for Mobile and Distributed Objects , pp. 261-274
    • Yee, B.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.