메뉴 건너뛰기




Volumn , Issue , 2008, Pages 71-79

Integrating security solutions to support nanoCMOS electronics research

Author keywords

[No Author keywords available]

Indexed keywords

ATOMIC-SCALE DEVICES; AUTHENTICATION AND AUTHORIZATION INFRASTRUCTURES; COMPUTE RESOURCES; DESIGN CHALLENGES; ELECTRONICS DEVICES; ELECTRONICS RESEARCHES; END-TO-END SECURITIES; ENGINEERING AND PHYSICAL SCIENCES RESEARCH COUNCILS; INTEGRATING SECURITIES; INTERNET-2; KERBEROS; NANO-CMOS; PUBLIC KEY INFRASTRUCTURES; RESEARCH INFRASTRUCTURES; SECURITY SOLUTIONS;

EID: 60649116442     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ISPA.2008.132     Document Type: Conference Paper
Times cited : (4)

References (31)
  • 1
    • 0000793139 scopus 로고
    • Cramming more components onto integrated circuits
    • April 19
    • G.E. Moore, Cramming more components onto integrated circuits, Electronics, Vol. 38, No. 8, April 19, 1965.
    • (1965) Electronics , vol.38 , Issue.8
    • Moore, G.E.1
  • 2
    • 84868900659 scopus 로고    scopus 로고
    • International Technology Roadmap for Semiconductors ITRS
    • International Technology Roadmap for Semiconductors (ITRS), http://www.itrs.net
  • 3
    • 0036498483 scopus 로고    scopus 로고
    • Design considerations for CMOS near the limits of scaling
    • D. J. Frank and Y. Taur, Design considerations for CMOS near the limits of scaling, Solid-State Electronics, vol. 46, pp 315-320 (2002).
    • (2002) Solid-State Electronics , vol.46 , pp. 315-320
    • Frank, D.J.1    Taur, Y.2
  • 4
    • 0035445204 scopus 로고    scopus 로고
    • A study of the threshold voltage variation for ultra-small bulk and SOI CMOS
    • K. Takeuchi, R. Koh and T. Mogami, A study of the threshold voltage variation for ultra-small bulk and SOI CMOS, IEEE Trans. Electron Dev, vol. 48, p. 1995 (2001).
    • (2001) IEEE Trans. Electron Dev , vol.48 , pp. 1995
    • Takeuchi, K.1    Koh, R.2    Mogami, T.3
  • 5
    • 0041537563 scopus 로고    scopus 로고
    • Intrinsic Fluctuations in Sub-10 nm Double-Gate MOSFETs Introduced by Discreteness of Charge and Matter
    • A. R. Brown, A. Asenov, J. R. Watling, Intrinsic Fluctuations in Sub-10 nm Double-Gate MOSFETs Introduced by Discreteness of Charge and Matter, IEEE Transaction on Nanotechnology, Vol. 1 pp. 195-200 (2002).
    • (2002) IEEE Transaction on Nanotechnology , vol.1 , pp. 195-200
    • Brown, A.R.1    Asenov, A.2    Watling, J.R.3
  • 7
    • 60649101746 scopus 로고    scopus 로고
    • R. Housley, W. Polk, W. Ford, D. Solo, The Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile. RFC 3280 (Proposed Standard), April 2002. (Updated by RFCs 4325, 4630).
    • R. Housley, W. Polk, W. Ford, D. Solo, The Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile. RFC 3280 (Proposed Standard), April 2002. (Updated by RFCs 4325, 4630).
  • 8
    • 3142653204 scopus 로고    scopus 로고
    • VOMS: An authorization system for virtual organizations
    • Santiago de Compostela, Spain, February
    • st European Across Grids Conference, Santiago de Compostela, Spain, February 2003.
    • (2003) st European Across Grids Conference
    • Alfieri, R.1
  • 9
    • 0037362986 scopus 로고    scopus 로고
    • Role-based Access Control with X.509 Attribute Certificates
    • March-April
    • D.W. Chadwick, A. Otenko, E.Ball, Role-based Access Control with X.509 Attribute Certificates, IEEE Internet Computing, March-April 2003.
    • (2003) IEEE Internet Computing
    • Chadwick, D.W.1    Otenko, A.2    Ball, E.3
  • 11
    • 60649096814 scopus 로고    scopus 로고
    • ITU-T Recommendation X.509 (2001) | ISO/IEC 9594-8: 2001, Information technology - Open Systems Interconnection - Public-Key and Attribute Certificate Frameworks.
    • ITU-T Recommendation X.509 (2001) | ISO/IEC 9594-8: 2001, Information technology - Open Systems Interconnection - Public-Key and Attribute Certificate Frameworks.
  • 12
    • 60649084331 scopus 로고    scopus 로고
    • R. Housley, T. Polk, Planning for PKI: Best Practices Guide for Deploying Public Key Infrastructures, Wiley Publishing, 2001.
    • R. Housley, T. Polk, Planning for PKI: Best Practices Guide for Deploying Public Key Infrastructures, Wiley Publishing, 2001.
  • 13
    • 10044237459 scopus 로고    scopus 로고
    • Globus toolkit, http://www.globus.org/toolldt
    • Globus toolkit
  • 14
    • 38449110080 scopus 로고    scopus 로고
    • R.O. Sinnott, J. Watt, D.W. Chadwick, J. Koetsier, O. Otenko, T.A. Nguyen, Supporting Decentralized, Security focused Dynamic Virtual Organizations across the Grid, 2nd IEEE International Conference on e-Science and Grid Computing, Amsterdam, December 2006.
    • R.O. Sinnott, J. Watt, D.W. Chadwick, J. Koetsier, O. Otenko, T.A. Nguyen, Supporting Decentralized, Security focused Dynamic Virtual Organizations across the Grid, 2nd IEEE International Conference on e-Science and Grid Computing, Amsterdam, December 2006.
  • 18
    • 60649101178 scopus 로고    scopus 로고
    • eduPerson Specification, http://www.educause.edu/eduperson/
    • eduPerson Specification, http://www.educause.edu/eduperson/
  • 21
    • 60649116883 scopus 로고    scopus 로고
    • Grid Infrastructures for the Electronics Domain: Requirements and Early Prototypes from an EPSRC Pilot Project
    • Nottingham, UK, September
    • R.O. Sinnott, A. Asenov, A. Brown, C. Millar, G. Roy, S. Roy, G. Stewart, Grid Infrastructures for the Electronics Domain: Requirements and Early Prototypes from an EPSRC Pilot Project, UK e-Science All Hands Meeting, Nottingham, UK, September 2007.
    • (2007) UK e-Science All Hands Meeting
    • Sinnott, R.O.1    Asenov, A.2    Brown, A.3    Millar, C.4    Roy, G.5    Roy, S.6    Stewart, G.7
  • 24
    • 22144453211 scopus 로고    scopus 로고
    • The MyProxy Online Credential Repository
    • July
    • J. Basney, M. Humphrey, V. Welch, The MyProxy Online Credential Repository, Software Practice and Experience, Volume 35, Issue 9, July 2005, pages 801-816.
    • (2005) Software Practice and Experience , vol.35 , Issue.9 , pp. 801-816
    • Basney, J.1    Humphrey, M.2    Welch, V.3
  • 25
    • 50649119767 scopus 로고    scopus 로고
    • R.O. Sinnott, D. Chadwick, T. Doherty, D. Martin, A. Stell, G. Stewart, L. Su, J. Watt, Advanced Security for Virtual Organizations: Exploring the Pros and Cons of Centralized vs Decentralized Security Models, 8th IEEE International Symposium on Cluster Computing and the Grid (CCGrid 2008), May 2008, Lyon, France.
    • R.O. Sinnott, D. Chadwick, T. Doherty, D. Martin, A. Stell, G. Stewart, L. Su, J. Watt, Advanced Security for Virtual Organizations: Exploring the Pros and Cons of Centralized vs Decentralized Security Models, 8th IEEE International Symposium on Cluster Computing and the Grid (CCGrid 2008), May 2008, Lyon, France.
  • 28
    • 24944587318 scopus 로고    scopus 로고
    • R.O. Sinnott, A.J. Stell, D.W. Chadwick, O. Otenko, Experiences of Applying Advanced Grid Authorisation Infrastructures, Proceedings of European Grid Conference (EGC), LNCS 3470, pages 265-275, editors: P.M.A. Sloot, A.G. Hoekstra, T. Priol, A. Reinefeld, M. Bubak, June 2005, Amsterdam, Holland.
    • R.O. Sinnott, A.J. Stell, D.W. Chadwick, O. Otenko, Experiences of Applying Advanced Grid Authorisation Infrastructures, Proceedings of European Grid Conference (EGC), LNCS 3470, pages 265-275, Volume editors: P.M.A. Sloot, A.G. Hoekstra, T. Priol, A. Reinefeld, M. Bubak, June 2005, Amsterdam, Holland.
  • 30
    • 0002548429 scopus 로고
    • The Evolution of the Kerberos Authentication System, Distributed Open Systems
    • J.T. Kohl, B.C. Neuman, T.Y. T'so, The Evolution of the Kerberos Authentication System, Distributed Open Systems, pp78-94, IEEE Computer Society Press, 1994.
    • (1994) IEEE Computer Society Press , pp. 78-94
    • Kohl, J.T.1    Neuman, B.C.2    T'so, T.Y.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.