-
1
-
-
38649101912
-
-
K. Amin, G.V. Laszewski, A.R. Mikler, Grid computing for the masses: an overview, http://students.csci.unt.edu/~amin/publications/gcc-03/masses-gcc03.pdf (Document view: March 28, 2006).
-
-
-
-
2
-
-
38649083478
-
-
APPLE DEVELOPER. http://developer.apple.com/documentation/Security/Conceptual/CertKeyTrustProgGuide/glossary/chapter_5_section_1.html (Document view: March 28, 2006).
-
-
-
-
6
-
-
38649107869
-
-
R. Buyya, Grid computing info centre: frequently asked questions (FAQ), http://www.gridcomputing.com/gridfaq.html (Document view: March 28, 2006).
-
-
-
-
7
-
-
3543049206
-
Distributed computing research issues in grid computing
-
Cassanova H. Distributed computing research issues in grid computing. ACM SIGACT News 33 3 (2002) 50-70
-
(2002)
ACM SIGACT News
, vol.33
, Issue.3
, pp. 50-70
-
-
Cassanova, H.1
-
8
-
-
4344641071
-
ENTROPIA: architecture and performance for an Enterprise desktop grid system
-
Chien A., Calder B., and Elder S. ENTROPIA: architecture and performance for an Enterprise desktop grid system. Journal of Parallel and Distributed Computing 65 5 (2003) 597-610
-
(2003)
Journal of Parallel and Distributed Computing
, vol.65
, Issue.5
, pp. 597-610
-
-
Chien, A.1
Calder, B.2
Elder, S.3
-
9
-
-
0242456132
-
Breaking the barriers: high performance security for high performance computing
-
Virginia Beach, Virginia
-
Connelly K., and Chien A. Breaking the barriers: high performance security for high performance computing. Proc. of the 2002 Workshop on New Security Paradigms (2002) 36-42 Virginia Beach, Virginia
-
(2002)
Proc. of the 2002 Workshop on New Security Paradigms
, pp. 36-42
-
-
Connelly, K.1
Chien, A.2
-
12
-
-
0032218229
-
A security architecture for computational grids
-
Foster I., Kesselman K., and Tzudik G. A security architecture for computational grids. Proc. of the 5th ACM conference on Computer and Communications Security, San Francisco, California (1998) 83-92
-
(1998)
Proc. of the 5th ACM conference on Computer and Communications Security, San Francisco, California
, pp. 83-92
-
-
Foster, I.1
Kesselman, K.2
Tzudik, G.3
-
16
-
-
38649134834
-
-
M. Haynos, What's the difference between grid computing, P2P, CORBA, cluster computing and DCE? http://www-106.ibm.com/developerworks/grid/library/gr-heritage/?Open&ca=daw Document view: March 28 2006.
-
-
-
-
19
-
-
38649134221
-
-
B. Jacob, Grid computing-what are the key components? http://www-106.ibm.com/developerworks/grid/library/gr-overview/?ca=dgr-lnxw09Gri, Document view: March 28 2006.
-
-
-
-
20
-
-
38649102538
-
-
B. Jacob, How grid infrastructure affects application design, http://www-106.ibm.com/developerworks/library/gr-infra.html, (Document view: March 28 2006).
-
-
-
-
23
-
-
38649132933
-
-
K. Kaneda, K. Taura, A. Yonezawa, Virtual Private Grid: A Command Shell for Utilizing Hundreds of Machines.
-
-
-
-
25
-
-
38649126238
-
A taxonomy and survey of grid resource management systems for distributed computing, Software Practice and Experience, 00:1-7, 2001
-
Klaus K., Buyya R., and Maheshwaren M. A taxonomy and survey of grid resource management systems for distributed computing, Software Practice and Experience, 00:1-7, 2001. Effectively, Future Generation Computer Systems 9 4 (May 2003) 563-573
-
(2003)
Effectively, Future Generation Computer Systems
, vol.9
, Issue.4
, pp. 563-573
-
-
Klaus, K.1
Buyya, R.2
Maheshwaren, M.3
-
26
-
-
84944073206
-
Monitoring, security and dynamic configuration with the dynamic TAO reflective ORB
-
New York, United States
-
Kon F., Roman M., and Liu P. Monitoring, security and dynamic configuration with the dynamic TAO reflective ORB. IFIP/ACM International Conference on Distributed Systems Platforms (2000) 121-143 New York, United States
-
(2000)
IFIP/ACM International Conference on Distributed Systems Platforms
, pp. 121-143
-
-
Kon, F.1
Roman, M.2
Liu, P.3
-
28
-
-
0033489643
-
Secure group management in large distributed systems: what is a group and what does it do?
-
Mchugh J.J., and Michael B. Secure group management in large distributed systems: what is a group and what does it do?. Proc. of the 1999 Workshop on New Security Paradigms, Caledon Hills, Ontario, Canada (1999) 80-89
-
(1999)
Proc. of the 1999 Workshop on New Security Paradigms, Caledon Hills, Ontario, Canada
, pp. 80-89
-
-
Mchugh, J.J.1
Michael, B.2
-
30
-
-
0012380264
-
Adapting globus and kerberos for a secure asci grid
-
Denver, Colorado
-
Moore P.C., Wilbur R.J., and Detry R.R. Adapting globus and kerberos for a secure asci grid. Proc. of the ACM/IEEE Conference on Supercomputing, November 10-16 (2001) 21-21 Denver, Colorado
-
(2001)
Proc. of the ACM/IEEE Conference on Supercomputing, November 10-16
, pp. 21-21
-
-
Moore, P.C.1
Wilbur, R.J.2
Detry, R.R.3
-
31
-
-
38649125944
-
-
Peer to Peer and Grid: Synergies and Opportunities, Workshop Notes, http://www-csag.ucsd.edu/P2P-Grid/P2P-Grid-Workshop10-7-2003.pdf (Document view: March 28, 2006).
-
-
-
-
32
-
-
17144369692
-
Security architecture for open grid services
-
Nagaratnam N., Janson P., Dayka J., Nadalin A., Siebenlist F., Welch V., Tuecke S., and Foster I. Security architecture for open grid services. Global Grid Forum (GGF) OGSA Security Working Group, June (2003)
-
(2003)
Global Grid Forum (GGF) OGSA Security Working Group, June
-
-
Nagaratnam, N.1
Janson, P.2
Dayka, J.3
Nadalin, A.4
Siebenlist, F.5
Welch, V.6
Tuecke, S.7
Foster, I.8
-
33
-
-
38649135769
-
-
P2P Journal-Grid Computing, http://p2pjournal.com/main/grid.htm (Document view: March 28, 2006).
-
-
-
-
37
-
-
0041529859
-
Toward a synergy between P2P and grids
-
http://dsonline.computer.org/0307/d/wp4p2p.htm
-
Talia D., and Trunfio P. Toward a synergy between P2P and grids. IEEE Internet Computing, July/August (2003). http://dsonline.computer.org/0307/d/wp4p2p.htm http://dsonline.computer.org/0307/d/wp4p2p.htm
-
(2003)
IEEE Internet Computing, July/August
-
-
Talia, D.1
Trunfio, P.2
-
39
-
-
38649128212
-
-
P. Shread, Survey finds grid becoming strategic IT investment, http://www.gridcomputingplanet.com/news/article.php/3323731 (Document view: March 28 2006).
-
-
-
-
40
-
-
38649106175
-
-
Sun Grid, http://www.sun.com/2006-0320/feature/index.jsp (Document view: March 26, 2006).
-
-
-
-
42
-
-
38649085683
-
RFC 3820: internet X.509 public key infrastructure proxy certificate profile
-
Tuecke S., Welch V., Engert D., Pearman L., and Thompson M. RFC 3820: internet X.509 public key infrastructure proxy certificate profile. The Internet Engineering Task Force (IETF), June (2004)
-
(2004)
The Internet Engineering Task Force (IETF), June
-
-
Tuecke, S.1
Welch, V.2
Engert, D.3
Pearman, L.4
Thompson, M.5
-
43
-
-
24644454543
-
A security architecture and design for mobile intelligent agents
-
Vuong S.T., and Fu P. A security architecture and design for mobile intelligent agents. ACM SIGAPP Applied Computing Review 9 3 (2001) 21-30
-
(2001)
ACM SIGAPP Applied Computing Review
, vol.9
, Issue.3
, pp. 21-30
-
-
Vuong, S.T.1
Fu, P.2
-
44
-
-
33751110492
-
-
J. Watt, O. Ajayi, J. Jiang, J. Koetsier, R.O. Sinnott, A shibboleth-protected privilege management structure for e-science education. Proceedings of the Sixth International Symposium on Cluster Computing and the Grid (CCGRID'06), May 16-19, 2006.
-
-
-
-
45
-
-
84942318236
-
Security for grid services
-
Welch V., Siebenlist F., Foster I., Bresnahan J., Czajkowski K., Gawor J., Kesselman C., Meder S., Pearlman L., and Tuecke S. Security for grid services. The 12th IEEE International Symposium on High Performance Distributed Computing (HPDC) (June 2003) 41-63
-
(2003)
The 12th IEEE International Symposium on High Performance Distributed Computing (HPDC)
, pp. 41-63
-
-
Welch, V.1
Siebenlist, F.2
Foster, I.3
Bresnahan, J.4
Czajkowski, K.5
Gawor, J.6
Kesselman, C.7
Meder, S.8
Pearlman, L.9
Tuecke, S.10
-
46
-
-
38649114106
-
-
Webopedia, http://www.webopedia.com/TERM/g/grid_computing.html (Document view: March 26, 2006).
-
-
-
-
47
-
-
27544504896
-
LEGIONFS: a secure and scalable file system supporting cross-domain high-performance applications
-
Denver, Colorado
-
White B., Walker M., and Humphrey M. LEGIONFS: a secure and scalable file system supporting cross-domain high-performance applications. Proc. of the ACM/IEEE conference on Supercomputing, November 10-16 (2001) 21-21 Denver, Colorado
-
(2001)
Proc. of the ACM/IEEE conference on Supercomputing, November 10-16
, pp. 21-21
-
-
White, B.1
Walker, M.2
Humphrey, M.3
-
48
-
-
21644483415
-
SHARP: an architecture for secure resource peering
-
Proc. of the 19th ACM Symposium on Operating Systems Principles, Bolton Landing, NY, USA
-
Yun F., Chase J., and Chun B. SHARP: an architecture for secure resource peering. Proc. of the 19th ACM Symposium on Operating Systems Principles, Bolton Landing, NY, USA. Session: Scheduling and resource allocation (2003) 133-148
-
(2003)
Session: Scheduling and resource allocation
, pp. 133-148
-
-
Yun, F.1
Chase, J.2
Chun, B.3
|