메뉴 건너뛰기




Volumn 5, Issue 4, 2009, Pages 1125-1136

A quantitative method for evaluating the security threats of grid system to tasks

Author keywords

Confidentiality and integrity; Evaluate; Grid; Risk; Task

Indexed keywords


EID: 64349105810     PISSN: 13494198     EISSN: None     Source Type: Journal    
DOI: None     Document Type: Article
Times cited : (14)

References (18)
  • 4
    • 0001943763 scopus 로고    scopus 로고
    • Time limited blackbox security: Protecting mobile agents from malicious hosts
    • Springer-Verlag
    • F. Hohl, Time limited blackbox security: Protecting mobile agents from malicious hosts, Mobile Agents and Security - Lecture Notes in Computer Science, Springer-Verlag, vol.1419, pp.92-113, 1998.
    • (1998) Mobile Agents and Security - Lecture Notes in Computer Science , vol.1419 , pp. 92-113
    • Hohl, F.1
  • 6
    • 0038223020 scopus 로고    scopus 로고
    • Forward integrity for secure audit logs,
    • Technical Report, Computer Science and Engineering Department, University of California at San Diego
    • M. Bellare and B. S. Yee, Forward integrity for secure audit logs, Technical Report, Computer Science and Engineering Department, University of California at San Diego, 1997.
    • (1997)
    • Bellare, M.1    Yee, B.S.2
  • 13
    • 33644651224 scopus 로고    scopus 로고
    • A combined hardware and software architecture for secure computing
    • Ischia, Italy, pp
    • J. Platte and E. Naroska, A combined hardware and software architecture for secure computing, Proc. of the 2nd Conference on Computing Frontiers, Ischia, Italy, pp.280-288, 2005.
    • (2005) Proc. of the 2nd Conference on Computing Frontiers , pp. 280-288
    • Platte, J.1    Naroska, E.2
  • 18
    • 77954422276 scopus 로고    scopus 로고
    • Trusted Computing Group TCG
    • Trusted Computing Group (TCG), Trusted Platform Modules Strengthen User and Platform Authenticity, 2005. https://www.trustedcomputinggroup.org/ specs/TPM/Whitepaper-TPMs-Strengthen-User-and-Plat- form-Authenticity-Final-l-0. pdf
    • (2005) Trusted Platform Modules Strengthen User and Platform Authenticity


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.