메뉴 건너뛰기




Volumn SE, Issue GSDCA/M/-, 2008, Pages 146-151

Engineering process based on grid use cases for mobile grid systems

Author keywords

Development process; Grid computing; Mobile computing; Security service oriented architecture; Security use cases; Use cases

Indexed keywords

CORPORATE RESOURCES; DESIGN AND BUILDS; DEVELOPMENT PROCESS; ENGINEERING PROCESS; FORMAL APPROACHES; GRID INFRASTRUCTURES; GRID SYSTEMS; MOBILE GRIDS; SECURITY ARCHITECTURES; SECURITY REQUIREMENTS; SECURITY SERVICE ORIENTED ARCHITECTURE; SECURITY USE CASES; SERVICE-ORIENTED; SOFTWARE DEVELOPMENT; SOFTWARE LIFE CYCLES; USE CASES;

EID: 57649240533     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (7)

References (15)
  • 2
    • 0027804413 scopus 로고
    • Information systems security design methods: Implications for information systems development
    • Baskerville, R. (1993). "Information systems security design methods: implications for information systems development." ACM Computing Surveys 25(4): 375 -414.
    • (1993) ACM Computing Surveys , vol.25 , Issue.4 , pp. 375-414
    • Baskerville, R.1
  • 3
    • 57649146858 scopus 로고    scopus 로고
    • Bradford, P. G., B. M. Grizzell, et al. (2007). Cap. 4. Pragmatic Security for Constrained Wireless Networks. Security in Distributed, Grid, Mobile, and Pervasive Computing. A. Publications. The University of Alabama, Tuscaloosa, USA: 440.
    • Bradford, P. G., B. M. Grizzell, et al. (2007). Cap. 4. Pragmatic Security for Constrained Wireless Networks. Security in Distributed, Grid, Mobile, and Pervasive Computing. A. Publications. The University of Alabama, Tuscaloosa, USA: 440.
  • 7
    • 57649222467 scopus 로고    scopus 로고
    • Lawrence Berkeley National Laboratory. Paper LBNL-54853
    • Humphrey, M., M. R. Thompson, et al. (2005). "Security for Grids." Lawrence Berkeley National Laboratory. Paper LBNL-54853.
    • (2005) Security for Grids
    • Humphrey, M.1    Thompson, M.R.2
  • 8
    • 57649178023 scopus 로고    scopus 로고
    • ITU (2004). ITU-T Recommendation X.1121. Framework of security technologies for mobile end-to-end data communications.
    • ITU (2004). ITU-T Recommendation X.1121. Framework of security technologies for mobile end-to-end data communications.
  • 9
    • 33646765853 scopus 로고    scopus 로고
    • Mobile-To-Grid Middleware: Bridging the gap between mobile and Grid environments
    • Amsterdam, The Netherlands, Springer
    • Jameel, H., U. Kalim, et al. (2005). Mobile-To-Grid Middleware: Bridging the gap between mobile and Grid environments. European Grid Conference EGC 2005, Amsterdam, The Netherlands, Springer.
    • (2005) European Grid Conference EGC
    • Jameel, H.1    Kalim, U.2
  • 11
    • 57649195850 scopus 로고    scopus 로고
    • MAP (2006). Methodology for Information Systems Risk Analysis and Management (MAGERIT version 2), Ministry for Public Administration of Spain.
    • MAP (2006). Methodology for Information Systems Risk Analysis and Management (MAGERIT version 2), Ministry for Public Administration of Spain.
  • 15
    • 85027202312 scopus 로고    scopus 로고
    • Vivas, J. L., J. López, et al. (2007). Cap. 12. Grid Security Architecture: Requirements,fundamentals, standards, and models. Security in Distributed, Grid, Mobile, and Pervasive Computing. A. Publications. Tuscaloosa, USA: 440.
    • Vivas, J. L., J. López, et al. (2007). Cap. 12. Grid Security Architecture: Requirements,fundamentals, standards, and models. Security in Distributed, Grid, Mobile, and Pervasive Computing. A. Publications. Tuscaloosa, USA: 440.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.