메뉴 건너뛰기




Volumn 7, Issue 1, 2009, Pages 25-50

REMUS: A rerouting and multiplexing system for grid connectivity across firewalls

Author keywords

Firewalls; Grid connectivity; Grids; Network security; Networks; Wrappers

Indexed keywords

APPLICATIONS; COMPUTER SYSTEM FIREWALLS; COMPUTER VIRUSES; INTERNET; MIDDLEWARE; MULTIPLEXING; MULTIPLEXING EQUIPMENT; NETWORK SECURITY;

EID: 60449120351     PISSN: 15707873     EISSN: None     Source Type: Journal    
DOI: 10.1007/s10723-008-9104-1     Document Type: Article
Times cited : (5)

References (30)
  • 2
    • 84960378385 scopus 로고    scopus 로고
    • Nimrod/G: An architecture of a resource management and scheduling system in a global computational Grid
    • In: Beijing, China, 14-17 May
    • BuyyA, R., Abramson, D., Giddy, J.: Nimrod/G: an architecture of a resource management and scheduling system in a global computational Grid. In: Proceedings of HPC Asia 2000, Beijing, China, 14-17 May 2000
    • (2000) Proceedings of HPC Asia 2000
    • Buyya, R.1    Abramson, D.2    Giddy, J.3
  • 8
    • 0035455653 scopus 로고    scopus 로고
    • The anatomy of the Grid: Enabling scalable virtual organizations
    • Foster, I., KesselmEn, C., Tuecke, S.: The anatomy of the Grid: enabling scalable virtual organizations. Int. J. Supercomput. Appl. 15(3), 200-222 (2001)
    • (2001) Int. J. Supercomput. Appl. , vol.15 , Issue.3 , pp. 200-222
    • Foster, I.1    Kesselman, C.2    Tuecke, S.3
  • 10
    • 34248207326 scopus 로고    scopus 로고
    • WOW: Self-organizing wide area overlay networks of virtual workstations
    • Ganguly, A., Agrawal, A., Boykin, P.O., Figueiredo, R.J.: WOW: self-organizing wide area overlay networks of virtual workstations. J. Grid Comput. 5(2), 151-172 (2007)
    • (2007) J. Grid Comput. , vol.5 , Issue.2 , pp. 151-172
    • Ganguly, A.1    Agrawal, A.2    Boykin, P.O.3    Figueiredo, R.J.4
  • 15
    • 60449116637 scopus 로고    scopus 로고
    • NEC Systems Laboratory (Online). Accessed
    • LAe, Y.: SOCKS: a protocol for TCP proxy across firewalls, NEC Systems Laboratory (Online). http://archive.socks.permeo.com/protocol/ socks4.protocol. Accessed 2005
    • (2005) SOCKS: A Protocol for TCP Proxy Across Firewalls
    • Lee, Y.1
  • 24
    • 60449083087 scopus 로고    scopus 로고
    • Application of Grid computing to parameter sweeps and optimizations in molecular modelling
    • In: Zomaya, A. (ed.) Wiley, Hoboken (2006). Also appeared in The International Conference on Computational Sciences (ICCS04), Krakow Poland, 6-9 June
    • Sudholt, W., Baldridge, K., Abramson, D., Enticott, C., Garic, S.: Application of Grid computing to parameter sweeps and optimizations in molecular modelling. In: Zomaya, A. (ed.) Parallel Computing for Bioinformatics, pp. 27-35. Wiley, Hoboken (2006). Also appeared in The International Conference on Computational Sciences (ICCS04), Krakow Poland, 6-9 June 2004
    • (2004) Parallel Computing for Bioinformatics , pp. 27-35
    • Sudholt, W.1    Baldridge, K.2    Abramson, D.3    Enticott, C.4    Garic, S.5
  • 27
    • 60449097682 scopus 로고    scopus 로고
    • Online, an email sent to the globus-discuss mailing list about running a GridFTP server behind a NAT firewall Accessed January
    • Thorpe, S.: Online, an email sent to the globus-discuss mailing list about running a GridFTP server behind a NAT firewall. http:// www-unix.globus.org/mail_archive/discuss/2005/01/msg00216.html. Accessed January 2005
    • (2005)
    • Thorpe, S.1
  • 28
    • 35148886802 scopus 로고    scopus 로고
    • The Globus Alliance, (Online). Accessed 31 October
    • Welch, V.: Globus Toolkit Firewall Requirements, version 9. The Globus Alliance, (Online). http://www.globus.org/toolkit/security/firewalls/ Globus-Firewall-Requirements-9.pdf. Accessed 31 October 2006
    • (2006) Globus Toolkit Firewall Requirements, Version 9
    • Welch, V.1
  • 30
    • 85084164692 scopus 로고    scopus 로고
    • SSH - Secure login connections over the internet
    • In: San Jose, CA July
    • Ylonen, T.: SSH - Secure login connections over the internet. In: Proc. 6th USENIX Security Symposium, San Jose, CA, pp. 37-42, July 1996
    • (1996) Proc. 6th USENIX Security Symposium , pp. 37-42
    • Ylonen, T.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.