메뉴 건너뛰기




Volumn 23, Issue 6, 2007, Pages 825-835

ROST: Remote and hot service deployment with trustworthiness in CROWN Grid

Author keywords

CROWN Grid; Distributed computing; Prototype implementation; Remote and hot deployment; Trust negotiation agent (TNA)

Indexed keywords

QUALITY OF SERVICE; REMOTE CONTROL; TELECOMMUNICATION NETWORKS; TELECOMMUNICATION SERVICES;

EID: 34247587142     PISSN: 0167739X     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.future.2007.01.004     Document Type: Article
Times cited : (10)

References (36)
  • 1
    • 34247623400 scopus 로고    scopus 로고
    • WSRF Specifications. http://www.oasis-open.org/committees/tc_home.php
  • 2
    • 34247631446 scopus 로고    scopus 로고
    • ActiveX. http://msdn.microsoft.com/library/default.asp?url=/workshop/components/activex/intro.asp
  • 3
    • 34247619123 scopus 로고    scopus 로고
    • Java Applet. http://java.sun.com/applets/
  • 4
    • 34247627718 scopus 로고    scopus 로고
    • The Globus Toolkit. http://www.globus.org/toolkit/
  • 5
    • 34247555746 scopus 로고    scopus 로고
    • Apache Axis. http://ws.apache.org/axis/
  • 6
    • 34247568192 scopus 로고    scopus 로고
    • Microsoft .NET. http://www.microsoft.com/net/
  • 7
    • 34247639296 scopus 로고    scopus 로고
    • GLORIAD. http://www.gloriad.org/gloriad/
  • 8
    • 34247576030 scopus 로고    scopus 로고
    • PRAGMA. http://www.pragma-grid.net/index.html
  • 9
    • 0031358966 scopus 로고    scopus 로고
    • R. Anand, N. Islam, T. Jaeger, J.R. Rao, A flexible security model for using internet content, in: Proceedings of the Sixth Symposium on Reliable Distributed Systems, 1997
  • 10
    • 84949228621 scopus 로고    scopus 로고
    • F. Baude, D. Caromel, F. Huet, L. Mestre, J. Vayssiere, Interactive and descriptor-based deployment of object-oriented Grid applications, in: Proceedings of the 11th IEEE International Symposium on High Performance Distributed Computing, 2002
  • 11
    • 34247609055 scopus 로고    scopus 로고
    • L. Bernardo, P. Pinto, Scalable service deployment using mobile agents, in: Proceedings of the Second International Workshop on Mobile Agents, 1998
  • 12
    • 34247603798 scopus 로고    scopus 로고
    • M. Blaze, J. Feigenbaum, J. Ioannidis, A.D. Keromytis, The KeyNote trust management system version2, IETF RFC 2704, 1999
  • 13
    • 34247642526 scopus 로고    scopus 로고
    • M. Bossardt, A. Muhlemann, R. Zurcher, B. Plattner, Pattern based service deployment for active networks, in: Proceedings of the Second International Workshop on Active Network Technologies and Applications, 2003
  • 14
    • 34247574057 scopus 로고    scopus 로고
    • C. Ellison, B. Frantz, B. Lampson, R. Rivest, B. Thomas, T. Ylonen, SPKI certificate therory, IETF RFC 2693, 1999
  • 15
    • 34247580472 scopus 로고    scopus 로고
    • M. Fleury, F. Reverbel, The JBoss extensible server, in: Proceedings of ACM/IFIP/USENIX International Middleware Conference, 2003
  • 16
    • 0032218229 scopus 로고    scopus 로고
    • I. Foster, C. Kesselman, G. Tsudik, S. Tuecke, A security architecture for computational grids, in: Proceedings of the 5th ACM Conference on Computer and Communications Security, 1998
  • 20
    • 2442582540 scopus 로고    scopus 로고
    • E. Freudenthal, V. Karamcheti, DisCo: Middleware for securely deploying decomposable services in partly trusted environments, in: Proceedings of the 24th International Conference on Distributed Computing Systems, 2004
  • 21
    • 20444495387 scopus 로고    scopus 로고
    • T. Friese, M. Smith, B. Freisleben, Hot service deployment in an Ad Hoc grid environment, in: Proceedings of International Conference on Service Oriented Computing, 2004
  • 22
    • 84887507059 scopus 로고    scopus 로고
    • L. Gong, Going beyond the sandbox: An overview of the new security architecture in the Java development kit 1.2, in: Proceedings of USENIX Symposium on Internet Technologies and Systems, 1997
  • 23
    • 19944407585 scopus 로고    scopus 로고
    • W. Goscinski, D. Abramson, Distributed ant: A system to support application deployment in the grid, in: Proceedings of the Fifth IEEE/ACM International Workshop on Grid Computing, 2004
  • 24
    • 34247598668 scopus 로고    scopus 로고
    • J. Huai, Y. Liu, X. Li, C. Hu, Early experiences with CROWN grid, Technical Report, School of Computer Science, Beihang University, 2005
  • 25
    • 0035751908 scopus 로고    scopus 로고
    • N. Li, W.H. Winsborough, J.C. Mitchell, Distributed credential chain discovery in trust management, in: Proceedings of the 8th ACM Conference on Computer and Communications Security, 2001
  • 26
    • 0036085965 scopus 로고    scopus 로고
    • N. Li, J.C. Mitchell, W.H. Winsborough, Design of a role-based trust-management framework, in: Proceedings of IEEE Symposium on Security and Privacy, 2002
  • 28
    • 21644443831 scopus 로고    scopus 로고
    • P. Patel, A. Whitaker, D. Wetherall, J. Lepreau, T. Stack, Upgrading transport protocols using untrusted mobile code, in: Proceedings of the 19th ACM Symposium on Operating Systems Principles, 2003
  • 29
    • 34247643473 scopus 로고    scopus 로고
    • C. Pomerrance, The quadratic sieve factoring algorithm, in: Proceedings of EUROCRYPT, 1985
  • 31
    • 21644444136 scopus 로고    scopus 로고
    • R. Sekar, V.N. Venkatakrishnan, S. Basu, S. Bhatkar, D.C. DuVarney, Model-carrying code: A practical approach for safe execution of untrusted applications, in: Proceedings of the 19th ACM Symposium on Operating Systems Principles, 2003
  • 32
    • 84939548725 scopus 로고    scopus 로고
    • W.H. Winsborough, K.E. Seamons, V.E. Jones, Automated trust negotiation, in: Proceedings of DARPA Information Survivability Conference and Exposition, 2000
  • 33
    • 84893110297 scopus 로고    scopus 로고
    • W.H. Winsborough, N. Li, Towards practical automated trust negotiation, in: Proceedings of the 3rd International Worshop on Policies for Distributed Systems and Networks, 2002
  • 34
    • 3543128965 scopus 로고    scopus 로고
    • W.H. Winsborough, N. Li, Safety in automated trust negotiation, in: Proceedings of IEEE Symposium on Security and Privacy, 2004
  • 36
    • 0038148412 scopus 로고    scopus 로고
    • T. Yu, M. Winslett, A unified scheme for resource protection in automated trust negotiation, in: Proceedings of IEEE Symposium on Security and Privacy, 2003


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.