-
1
-
-
0037809039
-
The physiology of the Grid: An open Grid services architecture for distributed systems integration
-
I. Foster, C. Kesselman, J. Nick, and S. Tuecke, "The Physiology of the Grid: An Open Grid Services Architecture for Distributed Systems Integration," in Open Grid Service Infrastructure WG, Global Grid Forum, 2002, pp. 1-31.
-
(2002)
Open Grid Service Infrastructure WG, Global Grid Forum
, pp. 1-31
-
-
Foster, I.1
Kesselman, C.2
Nick, J.3
Tuecke, S.4
-
3
-
-
84862351029
-
-
IBM Global Services, "FAQs: IBM e-Business On Demand," 2002, http://www.ibm.com/services/ondemand/files/Q&A.pdf.
-
(2002)
FAQs: IBM e-Business on Demand
-
-
-
4
-
-
19644366170
-
Towards a service-oriented ad hoc grid
-
Cork, Ireland
-
M. Smith, T. Friese, and B. Freisleben, "Towards a Service-Oriented Ad Hoc Grid," in Proc. of the 3rd International Symposium on Parallel and Distributed Computing, Cork, Ireland, 2004, pp. 201-208.
-
(2004)
Proc. of the 3rd International Symposium on Parallel and Distributed Computing
, pp. 201-208
-
-
Smith, M.1
Friese, T.2
Freisleben, B.3
-
6
-
-
33746994148
-
Intra-engine service security for grids based on WSRF
-
Cardiff, UK
-
M. Smith, T. Friese, and B. Freisleben, "Intra-Engine Service Security for Grids Based on WSRF," in Proc. of Cluster Computing and Grid, Cardiff, UK, 2005.
-
(2005)
Proc. of Cluster Computing and Grid
-
-
Smith, M.1
Friese, T.2
Freisleben, B.3
-
7
-
-
20444439981
-
Cluster security as a unique problem with emergent properties: Issues and techniques
-
W. Yurcik, G. Koenig, X. Meng, and J. Greenseid, "Cluster Security as a Unique Problem with Emergent Properties: Issues and Techniques," in Proceedings of the 5th LCI Intl. Conference on Linux Clusters, 2004.
-
(2004)
Proceedings of the 5th LCI Intl. Conference on Linux Clusters
-
-
Yurcik, W.1
Koenig, G.2
Meng, X.3
Greenseid, J.4
-
9
-
-
33751104917
-
-
ITSS, Stanford ITSS Security Alert, April 10
-
ITSS, "Multiple Unix Compromises on Campus," Stanford ITSS Security Alert, April 10, 2004.
-
(2004)
Multiple Unix Compromises on Campus
-
-
-
11
-
-
33845477024
-
Clusters and security: Distributed security for distributed systems
-
M. Pourzandi, D. Gordon, W. Yurcik, and G. A. Koenig, "Clusters and Security: Distributed Security for Distributed Systems," in Cluster Security (Cluster-Sec) Workshop at the 5th IEEE International Symposium on Cluster Computing and the Grid (CCGrid), 2005.
-
(2005)
Cluster Security (Cluster-Sec) Workshop at the 5th IEEE International Symposium on Cluster Computing and the Grid (CCGrid)
-
-
Pourzandi, M.1
Gordon, D.2
Yurcik, W.3
Koenig, G.A.4
-
16
-
-
33751114326
-
Global security architecture
-
The Enabling Grids for E-Science (EGEE) Project
-
The Enabling Grids for E-Science (EGEE) Project, "Global Security Architecture," 2004, EU Deliverable DJRA3.1.
-
(2004)
EU Deliverable DJRA3.1
-
-
-
18
-
-
33751080937
-
-
The Globus Project, "The Globus Toolkit 4," 2006, http://www.globus.org/toolkit/.
-
(2006)
The Globus Toolkit
, vol.4
-
-
-
19
-
-
35048883832
-
VOMS, an authorization system for virtual organizations
-
Proc. of the European Across Grids Conference, Santiago de Compostela, Spain: Springer
-
R. Alfieri, R. Cecchini, V. Ciaschini, L. dell'Agnello, Á. Frohner, A. Gianoli, K. Lörentey, and F. Spataro, "VOMS, an Authorization System for Virtual Organizations," in Proc. of the European Across Grids Conference, ser. Lecture Notes in Computer Science, vol. 2970. Santiago de Compostela, Spain: Springer, 2003, pp. 33-40.
-
(2003)
Ser. Lecture Notes in Computer Science
, vol.2970
, pp. 33-40
-
-
Alfieri, R.1
Cecchini, R.2
Ciaschini, V.3
Dell'Agnello, L.4
Frohner, Á.5
Gianoli, A.6
Lörentey, K.7
Spataro, F.8
-
20
-
-
84887853842
-
A community authorization service for group collaboration
-
Monterey, CA USA
-
L. Pearlman, V. Welch, I. Foster, C. Kesselman, and S. Tuecke, "A Community Authorization Service for Group Collaboration," in Proceedings of the IEEE 3rd International Workshop on Policies for Distributed Systems and Networks, Monterey, CA USA, 2003, pp. 50-59.
-
(2003)
Proceedings of the IEEE 3rd International Workshop on Policies for Distributed Systems and Networks
, pp. 50-59
-
-
Pearlman, L.1
Welch, V.2
Foster, I.3
Kesselman, C.4
Tuecke, S.5
-
21
-
-
0037362986
-
Role-based access control with X.509 attribute certificates
-
D. W. Chadwick, A. Otenko, and E. Ball, "Role-Based Access Control With X.509 Attribute Certificates," IEEE Internet Computing, vol. 7, no. 2, pp. 62-69, 2003.
-
(2003)
IEEE Internet Computing
, vol.7
, Issue.2
, pp. 62-69
-
-
Chadwick, D.W.1
Otenko, A.2
Ball, E.3
-
23
-
-
33751078985
-
Detection of privilege escalation for linux cluster security
-
M. Treaster, G. A. Koenig, X. Meng, and W. Yurcik, "Detection of Privilege Escalation for Linux Cluster Security," in 6th LCI Intl. Conference on Linux Clusters, 2005.
-
(2005)
6th LCI Intl. Conference on Linux Clusters
-
-
Treaster, M.1
Koenig, G.A.2
Meng, X.3
Yurcik, W.4
-
24
-
-
0034870062
-
An online credential repository for the grid: MyProxy
-
2007
-
J. Novotny, S. Tuecke, and V. Welch, "An Online Credential Repository for the Grid: MyProxy," in Proceedings of the 10th IEEE International Symposium on High Performance Distributed Computing, 2007, pp. 104-111.
-
Proceedings of the 10th IEEE International Symposium on High Performance Distributed Computing
, pp. 104-111
-
-
Novotny, J.1
Tuecke, S.2
Welch, V.3
-
26
-
-
33751116463
-
-
"Secureid," http://www.ctrl-key.co.uk/index.htm.
-
Secureid
-
-
-
27
-
-
27144504167
-
Trade-offs in protecting storage: A meta-data comparison of cryptographic, backup/versioning, immutable/tamper-proof, and redundant storage solutions
-
J. Tucek, P. Stanton, E. Haubert, R. Hasan, L. Brumbaugh, and W. Yurcik, "Trade-offs in Protecting Storage: A Meta-Data Comparison of Cryptographic, Backup/Versioning, Immutable/Tamper-Proof, and Redundant Storage Solutions," in 22nd IEEE - 13th NASA Goddard Conference on Mass Storage Systems and Technologies (MSST), 2005.
-
(2005)
22nd IEEE - 13th NASA Goddard Conference on Mass Storage Systems and Technologies (MSST)
-
-
Tucek, J.1
Stanton, P.2
Haubert, E.3
Hasan, R.4
Brumbaugh, L.5
Yurcik, W.6
-
29
-
-
33845911848
-
Deploying virtual machines as sandboxes for the grid
-
S. Santhanam, P. Elango, A. Arpaci-Dusseau, and M. Livny, "Deploying Virtual Machines as Sandboxes for the Grid," in Second Workshop on Real, Large Distributed Systems, 2005, p. 712.
-
(2005)
Second Workshop on Real, Large Distributed Systems
, pp. 712
-
-
Santhanam, S.1
Elango, P.2
Arpaci-Dusseau, A.3
Livny, M.4
-
30
-
-
33751096627
-
High-performance computing for the masses
-
M. Clement, Q. Snell, and G. Judd, "High-Performance Computing for the Masses," in Workshop on Java for Parallel and Distributed Computing, IPDPS, 1999, p. 712.
-
(1999)
Workshop on Java for Parallel and Distributed Computing, IPDPS
, pp. 712
-
-
Clement, M.1
Snell, Q.2
Judd, G.3
-
31
-
-
21644433634
-
Xen and the art of virtualization
-
Bolton Landing, NY USA
-
P. Barham, B. Dragovic, K. Fraser, S. Hand, T. Harris, A. Ho, R. Neugebauer, I. Pratt, and A. Warfield, "Xen and the Art of Virtualization," in Proc. of the ACM Symposium on Operating Systems Principles (SOSP), Bolton Landing, NY USA, 2003, pp. 164-177.
-
(2003)
Proc. of the ACM Symposium on Operating Systems Principles (SOSP)
, pp. 164-177
-
-
Barham, P.1
Dragovic, B.2
Fraser, K.3
Hand, S.4
Harris, T.5
Ho, A.6
Neugebauer, R.7
Pratt, I.8
Warfield, A.9
-
32
-
-
33751109625
-
-
Distributed Systems University of Marburg, "MAGE," 2006, http://ds. informatik.uni-marburg.de/MAGE/.
-
(2006)
MAGE
-
-
-
33
-
-
33751104628
-
-
The Globus Project, "Virtual Workspaces," 2006, http://workspace.globus.org/.
-
(2006)
Virtual Workspaces
-
-
-
34
-
-
85091115835
-
Xen and the art of repeated research
-
B. Clark, T. Deshane, E. Dow, S. Evanchik, M. Finlayson, J. Herne, and J. N. Matthews, "Xen and the Art of Repeated Research," in Proceedings of the USENIX 2004 Annual Technical Conference, 2004, pp. 135-144.
-
(2004)
Proceedings of the USENIX 2004 Annual Technical Conference
, pp. 135-144
-
-
Clark, B.1
Deshane, T.2
Dow, E.3
Evanchik, S.4
Finlayson, M.5
Herne, J.6
Matthews, J.N.7
-
38
-
-
33751072277
-
-
IBM Watson Research - Global Security Analysis Lab, "TCPA Resources," http://www.research.ibm.com/gsal/tcpa/.
-
TCPA Resources
-
-
-
40
-
-
33751109394
-
-
SWsoft
-
SWsoft, "OpenVZ," 2006, http://openvz.org/.
-
(2006)
OpenVZ
-
-
-
41
-
-
84878346861
-
Improving host security with system call policies
-
Washington, USA
-
N. Provos, "Improving Host Security with System Call Policies," in Proc. of the 12th USENIX Security Symposium, Washington, USA, 2003, pp. 257-272.
-
(2003)
Proc. of the 12th USENIX Security Symposium
, pp. 257-272
-
-
Provos, N.1
-
43
-
-
32044451265
-
PDS: A virtual execution environment for software deployment
-
Chicago, IL, USA
-
B. Alpern, J. Auerbach, V. Bala, T. Frauenhofer, T. Mummert, and M. Pigott, "PDS: A Virtual Execution Environment for Software Deployment," in Proceedings of the 1st ACM/USENIX International Conference on Virtual Execution Environments (VEE), Chicago, IL, USA, 2005, pp. 175-185.
-
(2005)
Proceedings of the 1st ACM/USENIX International Conference on Virtual Execution Environments (VEE)
, pp. 175-185
-
-
Alpern, B.1
Auerbach, J.2
Bala, V.3
Frauenhofer, T.4
Mummert, T.5
Pigott, M.6
-
44
-
-
84934300631
-
VMPlants: Providing and managing virtual machine execution environments for grid computing
-
Pittsburgh, PA USA
-
I. Krsul, A. Ganguly, J. Zhang, J. A. B. Fortes, and R. J. Figueiredo, "VMPlants: Providing and Managing Virtual Machine Execution Environments for Grid Computing," in Proceedings of the 2004 ACM/IEEE Conference on Supercomputing (SC), Pittsburgh, PA USA, 2004, p. 7.
-
(2004)
Proceedings of the 2004 ACM/IEEE Conference on Supercomputing (SC)
, pp. 7
-
-
Krsul, I.1
Ganguly, A.2
Zhang, J.3
Fortes, J.A.B.4
Figueiredo, R.J.5
-
45
-
-
31844447686
-
The entropia virtual machine for desktop grids
-
Chicago, IL, USA
-
B. Calder, A. A. Chien, J. Wang, and D. Yang, "The Entropia Virtual Machine for Desktop Grids," in Proceedings of the 1st ACM/USENIX International Conference on Virtual Execution Environments (VEE), Chicago, IL, USA, 2005, pp. 186-196.
-
(2005)
Proceedings of the 1st ACM/USENIX International Conference on Virtual Execution Environments (VEE)
, pp. 186-196
-
-
Calder, B.1
Chien, A.A.2
Wang, J.3
Yang, D.4
|