메뉴 건너뛰기




Volumn , Issue , 2002, Pages 206-213

Fine-grain access control for securing shared resources in computational grids

Author keywords

access control; grid environments; grid security; Unix access model

Indexed keywords


EID: 4143113268     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/IPDPS.2002.1015496     Document Type: Conference Paper
Times cited : (32)

References (29)
  • 5
    • 84966656634 scopus 로고    scopus 로고
    • Distributed Computing Technologies Inc. http://www.distributed.net
  • 6
    • 84966554951 scopus 로고    scopus 로고
    • Entropia Inc. http://www.entropia.com
  • 8
    • 84966470877 scopus 로고    scopus 로고
    • Tracing bsd system calls
    • 03
    • S. E. Fagan. Tracing bsd system calls. Dr. Dobb's Journal, pages 38-43, 03 1998.
    • (1998) Dr. Dobb's Journal , pp. 38-43
    • Fagan, S.E.1
  • 13
    • 84966664677 scopus 로고    scopus 로고
    • White Paper: S/390 Virtual Image Facility for Linux
    • GC24-5930-03, February
    • IBM Corporation. White Paper: S/390 Virtual Image Facility for Linux, Guide and Reference. GC24-5930-03, February 2001.
    • (2001) Guide and Reference
    • IBM Corporation1
  • 14
    • 0027808377 scopus 로고
    • Interposition agents: Transparently interposing user code at the system interface
    • M. B. Jones. Interposition agents: Transparently interposing user code at the system interface. In Symposium on Operating Systems Principles, pages 80-93, 1993.
    • (1993) Symposium on Operating Systems Principles , pp. 80-93
    • Jones, M.B.1
  • 15
    • 34247873749 scopus 로고    scopus 로고
    • Enhancing the scalability and usability of computational grids via logical user accounts and virtual file systems
    • April
    • N. H. Kapadia, R. J. Figueiredo, and J. A. B. Fortes. Enhancing the scalability and usability of computational grids via logical user accounts and virtual file systems. In Heterogeneous Computing Workshop at IPDPS, April 2001.
    • (2001) Heterogeneous Computing Workshop at IPDPS
    • Kapadia, N.H.1    Figueiredo, R.J.2    Fortes, J.A.B.3
  • 17
    • 0030677523 scopus 로고    scopus 로고
    • Execution monitoring of security-critical programs in a distributed system: A specification-based approach
    • Oakland, California
    • C. Ko, M. Ruschitzka, and K. Levitt. Execution monitoring of security-critical programs in a distributed system: A specification-based approach. In Proceedings of the 1997 IEEE Symposium on Security and Privacy, Oakland, California, 1997.
    • (1997) Proceedings of the 1997 IEEE Symposium on Security and Privacy
    • Ko, C.1    Ruschitzka, M.2    Levitt, K.3
  • 21
  • 22
    • 0016555241 scopus 로고
    • The protection of information in computer systems
    • J. H. Saltzer and M. D. Schroeder. The protection of information in computer systems. Proceedings of the IEEE, 63(9):1278-1308, 1975.
    • (1975) Proceedings of the IEEE , vol.63 , Issue.9 , pp. 1278-1308
    • Saltzer, J.H.1    Schroeder, M.D.2
  • 23
  • 25
    • 0002717089 scopus 로고    scopus 로고
    • Mobile Agents and Security
    • Springer-Verlag, June
    • G. Vigna, editor. Mobile Agents and Security, volume 1419 of LNCS. Springer-Verlag, June 1998.
    • (1998) LNCS , vol.1419
    • Vigna, G.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.