-
1
-
-
0033554707
-
Do-it-yourself climate prediction
-
Allen M. Do-it-yourself climate prediction. Nature 401 6754 (Oct 1999) 642
-
(1999)
Nature
, vol.401
, Issue.6754
, pp. 642
-
-
Allen, M.1
-
2
-
-
10444272266
-
BOINC: a system for public-resource computing and storage
-
IEEE Computer Society
-
Anderson D.P. BOINC: a system for public-resource computing and storage. Proceedings of the fifth IEEE/ACM international workshop on grid computing (GRID '04), Pittsburgh, USA, November 8, 2004 (Nov 2004), IEEE Computer Society 4-10
-
(2004)
Proceedings of the fifth IEEE/ACM international workshop on grid computing (GRID '04), Pittsburgh, USA, November 8, 2004
, pp. 4-10
-
-
Anderson, D.P.1
-
3
-
-
33749405352
-
Trusted computing: providing security for peer-to-peer networks
-
Caronni G., et al. (Ed), IEEE Computer Society
-
Balfe S., Lakhani A.D., and Patterson K.G. Trusted computing: providing security for peer-to-peer networks. In: Caronni G., et al. (Ed). Proceedings of the fifth international conference on peer-to-peer computing (P2P '05), Konstanz, Germany, August 31-September 2, 2005 (Aug-Sep 2005), IEEE Computer Society 117-124
-
(2005)
Proceedings of the fifth international conference on peer-to-peer computing (P2P '05), Konstanz, Germany, August 31-September 2, 2005
, pp. 117-124
-
-
Balfe, S.1
Lakhani, A.D.2
Patterson, K.G.3
-
4
-
-
22144453211
-
The MyProxy online credential repository
-
Basney J., Humphrey M., and Welch V. The MyProxy online credential repository. Software Pract Exper 35 9 (Jul 2005) 801-816
-
(2005)
Software Pract Exper
, vol.35
, Issue.9
, pp. 801-816
-
-
Basney, J.1
Humphrey, M.2
Welch, V.3
-
5
-
-
35348933223
-
-
Basney J, Nejdl W, Olmedilla D, Welch V, Winslett M. Negotiating trust on the Grid. In: Goble C, Kesselman C, Sure Y, editors. Proceedings of seminar 05271 - semantic grid: the convergence of technologies, Dagstuhl, Germany, July 3-8, 2005, Internationales Begegnungs- und Forschungszentrum fuer Informatik (IBFI), Schloss Dagstuhl, Germany; July 2005. p. 50-60.
-
-
-
-
6
-
-
17044423787
-
Authorisation in grid computing
-
Chadwick D. Authorisation in grid computing. Inform Secur Tech Rep 10 1 (Jan 2005) 33-40
-
(2005)
Inform Secur Tech Rep
, vol.10
, Issue.1
, pp. 33-40
-
-
Chadwick, D.1
-
7
-
-
0037362986
-
Role-based access control with x.509 attribute certificates
-
Chadwick D., Otenko A., and Ball E. Role-based access control with x.509 attribute certificates. IEEE Internet Comput 7 2 (Mar 2003) 62-69
-
(2003)
IEEE Internet Comput
, vol.7
, Issue.2
, pp. 62-69
-
-
Chadwick, D.1
Otenko, A.2
Ball, E.3
-
8
-
-
33751081043
-
Towards a secure, tamper-proof grid platform
-
IEEE Press
-
Cooper A., and Martin A. Towards a secure, tamper-proof grid platform. Proceedings of the sixth IEEE international symposium on cluster computing and the grid, Singapore, May 2006 (May 2006), IEEE Press 373-380
-
(2006)
Proceedings of the sixth IEEE international symposium on cluster computing and the grid, Singapore, May 2006
, pp. 373-380
-
-
Cooper, A.1
Martin, A.2
-
9
-
-
34547468412
-
Towards an open, trusted digital rights management platform
-
ACM Press
-
Cooper A., and Martin A. Towards an open, trusted digital rights management platform. Proceedings of the ACM workshop on digital rights management (DRM '06), Alexandria, Virginia, USA, October 30, 2006 (Oct 2006), ACM Press 79-88
-
(2006)
Proceedings of the ACM workshop on digital rights management (DRM '06), Alexandria, Virginia, USA, October 30, 2006
, pp. 79-88
-
-
Cooper, A.1
Martin, A.2
-
10
-
-
34548333699
-
Resource and service management
-
Foster I., and Kesselman C. (Eds), Morgan Kaufmann Publishers [2nd ed., Chapter 18]
-
Czajkowski K., Foster I., and Kesselman C. Resource and service management. In: Foster I., and Kesselman C. (Eds). The grid 2: blueprint for a new computing infrastructure (2004), Morgan Kaufmann Publishers 259-283 [2nd ed., Chapter 18]
-
(2004)
The grid 2: blueprint for a new computing infrastructure
, pp. 259-283
-
-
Czajkowski, K.1
Foster, I.2
Kesselman, C.3
-
11
-
-
35348964117
-
-
Knight Christopher G, Knight Sylvia HE, Massey Neil, Aina Tolu, Christensen Carl, Frame Dave J, et al. Association of parameter, software and hardware variation with large scale behavior across 57,000 climate models. Proc Natl Acad Sci U S A. National Academy of Sciences; in press.
-
-
-
-
12
-
-
35348977728
-
-
Dierks T, Allen C. The TLS protocol, version 1.0. RFC 2246, Internet and Engineering Task Force; January 1999.
-
-
-
-
13
-
-
33744935671
-
-
I. Foster. Globus Toolkit version 4: software for service-oriented systems. In Proceedings of the IFIP international conference on network and parallel computing (NPC 2006), Tokyo, Japan, October 2-4, 2006, pages 2-13. [Springer-Verlag] (LNCS 3779), Oct 2006.
-
-
-
-
14
-
-
84941289551
-
A grid-enabled MPI: message passing in heterogeneous distributed computing systems
-
IEEE Computer Society
-
Foster I., and Karonis N.T. A grid-enabled MPI: message passing in heterogeneous distributed computing systems. Proceedings of the 1998 ACM/IEEE conference on supercomputing (CDROM), Orlando, FL, USA, November, 1998 (Nov 1998), IEEE Computer Society 1-11
-
(1998)
Proceedings of the 1998 ACM/IEEE conference on supercomputing (CDROM), Orlando, FL, USA, November, 1998
, pp. 1-11
-
-
Foster, I.1
Karonis, N.T.2
-
16
-
-
0035455653
-
The anatomy of the grid: enabling scalable virtual organizations
-
Foster I., Kesselman C., and Tuecke S. The anatomy of the grid: enabling scalable virtual organizations. Int J High Perform Comput Appl 15 3 (2001) 200-222
-
(2001)
Int J High Perform Comput Appl
, vol.15
, Issue.3
, pp. 200-222
-
-
Foster, I.1
Kesselman, C.2
Tuecke, S.3
-
18
-
-
0032218229
-
A security architecture for computational grids
-
ACM Press, New York
-
Foster I., Kesselman C., Tsudik G., and Tuecke S. A security architecture for computational grids. Proceedings of the 5th ACM conference on computer and communications security, San Francisco, CA, United States, November 02-05 (Nov 1998), ACM Press, New York 83-92
-
(1998)
Proceedings of the 5th ACM conference on computer and communications security, San Francisco, CA, United States, November 02-05
, pp. 83-92
-
-
Foster, I.1
Kesselman, C.2
Tsudik, G.3
Tuecke, S.4
-
20
-
-
70349659108
-
Semantic remote attestation - a virtual machine directed approach to trusted computing
-
USENIX
-
Haldar V., Chandra D., and Franz M. Semantic remote attestation - a virtual machine directed approach to trusted computing. Proceedings of the 3rd USENIX virtual machine research & technology symposium (VM '04), San Jose, CA, USA, May 6-7, 2004 (May 2004), USENIX 29-41
-
(2004)
Proceedings of the 3rd USENIX virtual machine research & technology symposium (VM '04), San Jose, CA, USA, May 6-7, 2004
, pp. 29-41
-
-
Haldar, V.1
Chandra, D.2
Franz, M.3
-
21
-
-
33745268641
-
Instrumentation and monitoring
-
Foster I., and Kesselman C. (Eds), Morgan Kaufmann Publishers [2nd ed., Chapter 20]
-
Hollingsworth J., and Tierney B. Instrumentation and monitoring. In: Foster I., and Kesselman C. (Eds). The grid 2: blueprint for a new computing infrastructure (2004), Morgan Kaufmann Publishers 319-351 [2nd ed., Chapter 20]
-
(2004)
The grid 2: blueprint for a new computing infrastructure
, pp. 319-351
-
-
Hollingsworth, J.1
Tierney, B.2
-
24
-
-
84934300631
-
VMPlants: providing and managing virtual machine execution environments for grid computing
-
IEEE Computer Society
-
Krsul I., Ganguly A., Zhang J., Fortes J.A.B., and Figueiredo R.J. VMPlants: providing and managing virtual machine execution environments for grid computing. Proceedings of the 2004 ACM/IEEE conference on supercomputing, Pittsburgh, PA, USA, November 6-12, 2004 (Nov 2004), IEEE Computer Society 7
-
(2004)
Proceedings of the 2004 ACM/IEEE conference on supercomputing, Pittsburgh, PA, USA, November 6-12, 2004
, pp. 7
-
-
Krsul, I.1
Ganguly, A.2
Zhang, J.3
Fortes, J.A.B.4
Figueiredo, R.J.5
-
25
-
-
35348985949
-
Enhancing grid security using trusted virtualization
-
Proceedings of the 1st Benelux workshop on information and system security (WISSEC '06), Antwerpen, Belgium, November 8-9, 2006, K.U. Leuven [ESAT/SCD]
-
Löhr H., Ramasamy H.V., Sadeghi A.-R., Schulz S., Schunter M., and Stüble C. Enhancing grid security using trusted virtualization. Proceedings of the 1st Benelux workshop on information and system security (WISSEC '06), Antwerpen, Belgium, November 8-9, 2006. COmputer Security and Industrial Cryptography (COSIC) (Nov 2006), K.U. Leuven [ESAT/SCD]
-
(2006)
COmputer Security and Industrial Cryptography (COSIC)
-
-
Löhr, H.1
Ramasamy, H.V.2
Sadeghi, A.-R.3
Schulz, S.4
Schunter, M.5
Stüble, C.6
-
26
-
-
35348945844
-
-
Mao W, Martin A, Jin H, Zhang H. Innovations for grid security from trusted computing - protocol solutions to sharing of security resource. In: Proceedings of the 14th international workshop on security protocols, Cambridge, UK, March 2006. LNCS. Springer-Verlag; in press.
-
-
-
-
27
-
-
34250346420
-
Daonity - grid security with behaviour conformity from trusted computing
-
ACM Press
-
Mao W., Yan F., and Chen C. Daonity - grid security with behaviour conformity from trusted computing. Proceedings of the first ACM workshop on scalable trusted computing, Alexandria, Virginia, US, Nov 2006 (Nov 2006), ACM Press 43-46
-
(2006)
Proceedings of the first ACM workshop on scalable trusted computing, Alexandria, Virginia, US, Nov 2006
, pp. 43-46
-
-
Mao, W.1
Yan, F.2
Chen, C.3
-
28
-
-
84883290046
-
-
Marchesini J, Smith SW. SHEMP: secure hardware enhanced MyProxy. In: Proceedings of the third annual conference on privacy, security and trust (PST '05), New Brunswick, Canada, October 12-14, 2005; October 2005.
-
-
-
-
29
-
-
35348958388
-
On two kinds of public-resource distributed computing
-
EPSRC
-
Martin A., Aina T., Christensen C., Kettleborough J., and Stainforth D. On two kinds of public-resource distributed computing. Proceedings of the UK e-science all hands meeting 2005 (AHM '05), Nottingham, UK, September 19-22, 2005 (Sep 2005), EPSRC 931-936
-
(2005)
Proceedings of the UK e-science all hands meeting 2005 (AHM '05), Nottingham, UK, September 19-22, 2005
, pp. 931-936
-
-
Martin, A.1
Aina, T.2
Christensen, C.3
Kettleborough, J.4
Stainforth, D.5
-
31
-
-
0012380264
-
Adapting globus and kerberos for a secure ASCI grid
-
ACM Press
-
Moore P.C., Johnson W.R., and Detry R.J. Adapting globus and kerberos for a secure ASCI grid. Proceedings of the 2001 ACM/IEEE conference on supercomputing (CDROM), Denver, Colorado, USA, November 10-16, 2001 (Nov 2001), ACM Press 21
-
(2001)
Proceedings of the 2001 ACM/IEEE conference on supercomputing (CDROM), Denver, Colorado, USA, November 10-16, 2001
, pp. 21
-
-
Moore, P.C.1
Johnson, W.R.2
Detry, R.J.3
-
32
-
-
35349009065
-
-
Moreau L, Chapman S, Schreiber A, Hempel R, Rana O, Varga L, et al. Provenance-based trust for grid computing: Position paper. Technical report, University of Southampton; May 2004.
-
-
-
-
33
-
-
0034870062
-
An online credential repository for the grid: MyProxy
-
IEEE Computer Society
-
Novotny J., Tuecke S., and Welch V. An online credential repository for the grid: MyProxy. Proceedings of the 10th international symposium on high performance distributed computing (HPDC-10), San Francisco, CA, USA, August 7-9, 2001 (Aug 2001), IEEE Computer Society 104-111
-
(2001)
Proceedings of the 10th international symposium on high performance distributed computing (HPDC-10), San Francisco, CA, USA, August 7-9, 2001
, pp. 104-111
-
-
Novotny, J.1
Tuecke, S.2
Welch, V.3
-
34
-
-
35348979676
-
CA-based trust model for grid authentication and identity delegation
-
Olson T., et al. CA-based trust model for grid authentication and identity delegation. Open Grid Forum (Oct 2002)
-
(2002)
Open Grid Forum
-
-
Olson, T.1
-
35
-
-
35348981258
-
-
Oasis Standards. WS-Trust 1.3; March 2007.
-
-
-
-
36
-
-
35348960438
-
Monitoring, policing and trust for grid-based virtual organisations
-
EPSRC
-
Patel J., Teacy W.T.L., Jennings N.R., and Luck M. Monitoring, policing and trust for grid-based virtual organisations. Proceedings of the UK e-science all hands meeting 2005 (AHM '05), Nottingham, UK, September 19-22, 2005 (Sep 2005), EPSRC 891-898
-
(2005)
Proceedings of the UK e-science all hands meeting 2005 (AHM '05), Nottingham, UK, September 19-22, 2005
, pp. 891-898
-
-
Patel, J.1
Teacy, W.T.L.2
Jennings, N.R.3
Luck, M.4
-
37
-
-
84887853842
-
A community authorization service for group collaboration
-
IEEE Computer Society
-
Pearlman L., Welch V., Foster I., Kesselman C., and Tuecke S. A community authorization service for group collaboration. Proceedings of the 3rd international workshop on policies for distributed systems and networks (POLICY '02), Monterey, CA, USA, June 5-7, 2002 (June 2002), IEEE Computer Society 50-60
-
(2002)
Proceedings of the 3rd international workshop on policies for distributed systems and networks (POLICY '02), Monterey, CA, USA, June 5-7, 2002
, pp. 50-60
-
-
Pearlman, L.1
Welch, V.2
Foster, I.3
Kesselman, C.4
Tuecke, S.5
-
38
-
-
33751073448
-
Evaluating provenance-based trust for scientific workflows
-
IEEE Press
-
Rajbhandari S., Wootten I., Ali A.S., and Rana O.F. Evaluating provenance-based trust for scientific workflows. Proceedings of the sixth IEEE international symposium on cluster computing and the grid, Singapore, May 2006 (May 2006), IEEE Press 365-372
-
(2006)
Proceedings of the sixth IEEE international symposium on cluster computing and the grid, Singapore, May 2006
, pp. 365-372
-
-
Rajbhandari, S.1
Wootten, I.2
Ali, A.S.3
Rana, O.F.4
-
39
-
-
29244450159
-
Property-based attestation for computing platforms: caring about properties, not mechanisms
-
ACM Press
-
Sadeghi A.-R., and Stüble C. Property-based attestation for computing platforms: caring about properties, not mechanisms. Proceedings of the 2004 workshop on new security paradigms (NSPW '04), Nova Scotia, Canada, September 20-23, 2004 (Sep 2004), ACM Press 67-77
-
(2004)
Proceedings of the 2004 workshop on new security paradigms (NSPW '04), Nova Scotia, Canada, September 20-23, 2004
, pp. 67-77
-
-
Sadeghi, A.-R.1
Stüble, C.2
-
40
-
-
27544477855
-
BIND: a fine-grained attestation service for secure distributed systems
-
IEEE Press
-
Shi E., Perrig A., and Doorn L.V. BIND: a fine-grained attestation service for secure distributed systems. Proceedings of the 2005 IEEE symposium on security and privacy, Oakland, CA, USA, May 8-11, 2005 (May 2005), IEEE Press 154-168
-
(2005)
Proceedings of the 2005 IEEE symposium on security and privacy, Oakland, CA, USA, May 8-11, 2005
, pp. 154-168
-
-
Shi, E.1
Perrig, A.2
Doorn, L.V.3
-
41
-
-
10444270329
-
Security principles for public-resource modeling research
-
IEEE Computer Society
-
Stainforth D., Martin A., Simpson A., Christensen C., Kettleborough J., Aina T., et al. Security principles for public-resource modeling research. Proceedings of the 13th IEEE international workshops on enabling technologies: infrastructure for collaborative enterprises (WETICE'04), Modena, Italy, June 14-16, 2004 (Nov 2004), IEEE Computer Society 319-324
-
(2004)
Proceedings of the 13th IEEE international workshops on enabling technologies: infrastructure for collaborative enterprises (WETICE'04), Modena, Italy, June 14-16, 2004
, pp. 319-324
-
-
Stainforth, D.1
Martin, A.2
Simpson, A.3
Christensen, C.4
Kettleborough, J.5
Aina, T.6
-
42
-
-
13444269104
-
Uncertainty in the predictions of the climate response to rising levels of greenhouse gases
-
Stainforth D.A., Aina T., Christensen C., Collins M., Faull N., Frame D.J., et al. Uncertainty in the predictions of the climate response to rising levels of greenhouse gases. Nature 433 7024 (Jan 2005) 403-406
-
(2005)
Nature
, vol.433
, Issue.7024
, pp. 403-406
-
-
Stainforth, D.A.1
Aina, T.2
Christensen, C.3
Collins, M.4
Faull, N.5
Frame, D.J.6
-
43
-
-
14244258507
-
Distributed computing in practice: the condor experience
-
Thain D., Tannenbaum T., and Livny M. Distributed computing in practice: the condor experience. Concurr Comput Pract Exper 17 2-4 (Feb 2005) 323-356
-
(2005)
Concurr Comput Pract Exper
, vol.17
, Issue.2-4
, pp. 323-356
-
-
Thain, D.1
Tannenbaum, T.2
Livny, M.3
-
44
-
-
2942654406
-
Certificate-based authorization policy in a PKI environment
-
Thompson M.R., Essiari A., and Mudumbai S. Certificate-based authorization policy in a PKI environment. ACM Trans Inform Syst Secur 6 4 (Nov 2003) 566-588
-
(2003)
ACM Trans Inform Syst Secur
, vol.6
, Issue.4
, pp. 566-588
-
-
Thompson, M.R.1
Essiari, A.2
Mudumbai, S.3
-
45
-
-
35349008513
-
-
Trusted Computing Group. TPM Main Part 1 design principles specification, Version 1.2. Revision 94; March 2006.
-
-
-
-
46
-
-
35349000616
-
-
Trusted Computing Group. TCG specification architecture overview. Revision 1.3; March 2007.
-
-
-
-
47
-
-
35348933761
-
-
Tuecke S, Welch V, Engert D, Perlman L, Thompson M. Internet X.509 public key infrastructure (PKI) proxy certificate profile. RFC 3820, Internet and Engineering Task Force; June 2004.
-
-
-
-
48
-
-
33745767064
-
A taxonomy of data grids for distributed data sharing, management, and processing
-
Venugopal S., Buyya R., and Ramamohanarao K. A taxonomy of data grids for distributed data sharing, management, and processing. ACM Comput Surv 38 1 (Mar 2006) 1-53
-
(2006)
ACM Comput Surv
, vol.38
, Issue.1
, pp. 1-53
-
-
Venugopal, S.1
Buyya, R.2
Ramamohanarao, K.3
-
49
-
-
84942318236
-
Security for grid services
-
IEEE Press
-
Welch V., Siebenlist F., Foster I., Bresnahan J., Czajkowski K., Gawor J., et al. Security for grid services. Proceedings of the twelfth international symposium on high performance distributed computing (HPDC-12), Seattle, Washington, June 22-24, 2003 (Jun 2003), IEEE Press 48-57
-
(2003)
Proceedings of the twelfth international symposium on high performance distributed computing (HPDC-12), Seattle, Washington, June 22-24, 2003
, pp. 48-57
-
-
Welch, V.1
Siebenlist, F.2
Foster, I.3
Bresnahan, J.4
Czajkowski, K.5
Gawor, J.6
-
50
-
-
84875404012
-
A PKI-based secure audit web service
-
IASTED
-
Xu W., Chadwick D., and Otenko S. A PKI-based secure audit web service. Proceedings of the IASTED international conference on communication, network and information security (CNIS '05), Phoenix, USA, November 14-16, 2005 (Nov 2005), IASTED
-
(2005)
Proceedings of the IASTED international conference on communication, network and information security (CNIS '05), Phoenix, USA, November 14-16, 2005
-
-
Xu, W.1
Chadwick, D.2
Otenko, S.3
-
51
-
-
33749064387
-
WS-attestation: efficient and fine-grained remote attestation on web services
-
IEEE Computer Society
-
Yoshihama S., Ebringer T., Nakamura M., Munetoh S., and Maruyama H. WS-attestation: efficient and fine-grained remote attestation on web services. Proceedings of the IEEE international conference on web services (ICWS '05), Orlando, FL, USA, July 11-15, 2005 (Jul 2005), IEEE Computer Society 743-750
-
(2005)
Proceedings of the IEEE international conference on web services (ICWS '05), Orlando, FL, USA, July 11-15, 2005
, pp. 743-750
-
-
Yoshihama, S.1
Ebringer, T.2
Nakamura, M.3
Munetoh, S.4
Maruyama, H.5
|