메뉴 건너뛰기




Volumn , Issue , 2006, Pages

Security issues in on-demand grid and cluster computing

Author keywords

[No Author keywords available]

Indexed keywords

CODES (SYMBOLS); COMPUTER CRIME; DISTRIBUTED COMPUTER SYSTEMS; LARGE SCALE SYSTEMS; RESOURCE ALLOCATION; WORLD WIDE WEB;

EID: 42549172780     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (18)

References (45)
  • 3
    • 84862351029 scopus 로고    scopus 로고
    • IBM Global Services, "FAQs: IBM e-Business On Demand," 2002, http://www.ibm.com/services/ondemand/files/Q&A.pdf.
    • (2002) FAQs: IBM e-Business on Demand
  • 9
    • 33751104917 scopus 로고    scopus 로고
    • ITSS, Stanford ITSS Security Alert, April 10
    • ITSS, "Multiple Unix Compromises on Campus," Stanford ITSS Security Alert, April 10, 2004.
    • (2004) Multiple Unix Compromises on Campus
  • 16
    • 33751114326 scopus 로고    scopus 로고
    • Global security architecture
    • The Enabling Grids for E-Science (EGEE) Project
    • The Enabling Grids for E-Science (EGEE) Project, "Global Security Architecture," 2004, EU Deliverable DJRA3.1.
    • (2004) EU Deliverable DJRA3.1
  • 18
    • 33751080937 scopus 로고    scopus 로고
    • The Globus Project, "The Globus Toolkit 4," 2006, http://www.globus.org/toolkit/.
    • (2006) The Globus Toolkit , vol.4
  • 21
    • 0037362986 scopus 로고    scopus 로고
    • Role-based access control with X.509 attribute certificates
    • D. W. Chadwick, A. Otenko, and E. Ball, "Role-Based Access Control With X.509 Attribute Certificates," IEEE Internet Computing, vol. 7, no. 2, pp. 62-69, 2003.
    • (2003) IEEE Internet Computing , vol.7 , Issue.2 , pp. 62-69
    • Chadwick, D.W.1    Otenko, A.2    Ball, E.3
  • 26
    • 33751116463 scopus 로고    scopus 로고
    • "Secureid," http://www.ctrl-key.co.uk/index.htm.
    • Secureid
  • 32
    • 33751109625 scopus 로고    scopus 로고
    • Distributed Systems University of Marburg, "MAGE," 2006, http://ds. informatik.uni-marburg.de/MAGE/.
    • (2006) MAGE
  • 33
    • 33751104628 scopus 로고    scopus 로고
    • The Globus Project, "Virtual Workspaces," 2006, http://workspace.globus.org/.
    • (2006) Virtual Workspaces
  • 38
    • 33751072277 scopus 로고    scopus 로고
    • IBM Watson Research - Global Security Analysis Lab, "TCPA Resources," http://www.research.ibm.com/gsal/tcpa/.
    • TCPA Resources
  • 40
    • 33751109394 scopus 로고    scopus 로고
    • SWsoft
    • SWsoft, "OpenVZ," 2006, http://openvz.org/.
    • (2006) OpenVZ
  • 41
    • 84878346861 scopus 로고    scopus 로고
    • Improving host security with system call policies
    • Washington, USA
    • N. Provos, "Improving Host Security with System Call Policies," in Proc. of the 12th USENIX Security Symposium, Washington, USA, 2003, pp. 257-272.
    • (2003) Proc. of the 12th USENIX Security Symposium , pp. 257-272
    • Provos, N.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.