-
1
-
-
34247623400
-
-
WSRF Specifications. http://www.oasis-open.org/committees/tc_home.php
-
-
-
-
2
-
-
34247631446
-
-
ActiveX. http://msdn.microsoft.com/library/default.asp?url=/workshop/components/activex/intro.asp
-
-
-
-
3
-
-
34247619123
-
-
Java Applet. http://java.sun.com/applets/
-
-
-
-
4
-
-
34247627718
-
-
The Globus Toolkit. http://www.globus.org/toolkit/
-
-
-
-
5
-
-
34247555746
-
-
Apache Axis. http://ws.apache.org/axis/
-
-
-
-
6
-
-
34247568192
-
-
Microsoft .NET. http://www.microsoft.com/net/
-
-
-
-
7
-
-
34247639296
-
-
GLORIAD. http://www.gloriad.org/gloriad/
-
-
-
-
8
-
-
34247576030
-
-
PRAGMA. http://www.pragma-grid.net/index.html
-
-
-
-
9
-
-
0031358966
-
-
R. Anand, N. Islam, T. Jaeger, J.R. Rao, A flexible security model for using internet content, in: Proceedings of the Sixth Symposium on Reliable Distributed Systems, 1997
-
-
-
-
10
-
-
84949228621
-
-
F. Baude, D. Caromel, F. Huet, L. Mestre, J. Vayssiere, Interactive and descriptor-based deployment of object-oriented Grid applications, in: Proceedings of the 11th IEEE International Symposium on High Performance Distributed Computing, 2002
-
-
-
-
11
-
-
34247609055
-
-
L. Bernardo, P. Pinto, Scalable service deployment using mobile agents, in: Proceedings of the Second International Workshop on Mobile Agents, 1998
-
-
-
-
12
-
-
34247603798
-
-
M. Blaze, J. Feigenbaum, J. Ioannidis, A.D. Keromytis, The KeyNote trust management system version2, IETF RFC 2704, 1999
-
-
-
-
13
-
-
34247642526
-
-
M. Bossardt, A. Muhlemann, R. Zurcher, B. Plattner, Pattern based service deployment for active networks, in: Proceedings of the Second International Workshop on Active Network Technologies and Applications, 2003
-
-
-
-
14
-
-
34247574057
-
-
C. Ellison, B. Frantz, B. Lampson, R. Rivest, B. Thomas, T. Ylonen, SPKI certificate therory, IETF RFC 2693, 1999
-
-
-
-
15
-
-
34247580472
-
-
M. Fleury, F. Reverbel, The JBoss extensible server, in: Proceedings of ACM/IFIP/USENIX International Middleware Conference, 2003
-
-
-
-
16
-
-
0032218229
-
-
I. Foster, C. Kesselman, G. Tsudik, S. Tuecke, A security architecture for computational grids, in: Proceedings of the 5th ACM Conference on Computer and Communications Security, 1998
-
-
-
-
20
-
-
2442582540
-
-
E. Freudenthal, V. Karamcheti, DisCo: Middleware for securely deploying decomposable services in partly trusted environments, in: Proceedings of the 24th International Conference on Distributed Computing Systems, 2004
-
-
-
-
21
-
-
20444495387
-
-
T. Friese, M. Smith, B. Freisleben, Hot service deployment in an Ad Hoc grid environment, in: Proceedings of International Conference on Service Oriented Computing, 2004
-
-
-
-
22
-
-
84887507059
-
-
L. Gong, Going beyond the sandbox: An overview of the new security architecture in the Java development kit 1.2, in: Proceedings of USENIX Symposium on Internet Technologies and Systems, 1997
-
-
-
-
23
-
-
19944407585
-
-
W. Goscinski, D. Abramson, Distributed ant: A system to support application deployment in the grid, in: Proceedings of the Fifth IEEE/ACM International Workshop on Grid Computing, 2004
-
-
-
-
24
-
-
34247598668
-
-
J. Huai, Y. Liu, X. Li, C. Hu, Early experiences with CROWN grid, Technical Report, School of Computer Science, Beihang University, 2005
-
-
-
-
25
-
-
0035751908
-
-
N. Li, W.H. Winsborough, J.C. Mitchell, Distributed credential chain discovery in trust management, in: Proceedings of the 8th ACM Conference on Computer and Communications Security, 2001
-
-
-
-
26
-
-
0036085965
-
-
N. Li, J.C. Mitchell, W.H. Winsborough, Design of a role-based trust-management framework, in: Proceedings of IEEE Symposium on Security and Privacy, 2002
-
-
-
-
28
-
-
21644443831
-
-
P. Patel, A. Whitaker, D. Wetherall, J. Lepreau, T. Stack, Upgrading transport protocols using untrusted mobile code, in: Proceedings of the 19th ACM Symposium on Operating Systems Principles, 2003
-
-
-
-
29
-
-
34247643473
-
-
C. Pomerrance, The quadratic sieve factoring algorithm, in: Proceedings of EUROCRYPT, 1985
-
-
-
-
31
-
-
21644444136
-
-
R. Sekar, V.N. Venkatakrishnan, S. Basu, S. Bhatkar, D.C. DuVarney, Model-carrying code: A practical approach for safe execution of untrusted applications, in: Proceedings of the 19th ACM Symposium on Operating Systems Principles, 2003
-
-
-
-
32
-
-
84939548725
-
-
W.H. Winsborough, K.E. Seamons, V.E. Jones, Automated trust negotiation, in: Proceedings of DARPA Information Survivability Conference and Exposition, 2000
-
-
-
-
33
-
-
84893110297
-
-
W.H. Winsborough, N. Li, Towards practical automated trust negotiation, in: Proceedings of the 3rd International Worshop on Policies for Distributed Systems and Networks, 2002
-
-
-
-
34
-
-
3543128965
-
-
W.H. Winsborough, N. Li, Safety in automated trust negotiation, in: Proceedings of IEEE Symposium on Security and Privacy, 2004
-
-
-
-
35
-
-
0036871183
-
Negotiating trust on the web
-
Winslett M., Yu T., Seamons K.E., Hess A., Jacobson J., Jarvis R., Smith B., and Yu L. Negotiating trust on the web. IEEE Internet Computing (2002)
-
(2002)
IEEE Internet Computing
-
-
Winslett, M.1
Yu, T.2
Seamons, K.E.3
Hess, A.4
Jacobson, J.5
Jarvis, R.6
Smith, B.7
Yu, L.8
-
36
-
-
0038148412
-
-
T. Yu, M. Winslett, A unified scheme for resource protection in automated trust negotiation, in: Proceedings of IEEE Symposium on Security and Privacy, 2003
-
-
-
|