메뉴 건너뛰기




Volumn 179, Issue 15, 2009, Pages 2618-2628

A trust degree based access control in grid environments

Author keywords

Access control; Grid; Resource sharing; Security; Trust

Indexed keywords

ACCESS MECHANISMS; CALCULATION METHODS; CONTROL FRAMEWORKS; COOPERATIVE WORKS; DIFFERENT DOMAINS; DYNAMIC GRIDS; GRID; GRID ENVIRONMENTS; INTER DOMAINS; NEW APPROACHES; NOVEL ACCESS; PERFORMANCE ANALYSIS; PROTOTYPE SYSTEMS; RESOURCE SHARING; SECURITY; TRUST; TRUST DEGREES; TRUST RELATIONSHIPS;

EID: 67349173961     PISSN: 00200255     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.ins.2009.01.039     Document Type: Article
Times cited : (36)

References (31)
  • 4
    • 0042194192 scopus 로고    scopus 로고
    • Condor Team of the University of Wisconsin
    • Condor Team of the University of Wisconsin, Condor, High Throughput Computing, .
    • Condor, High Throughput Computing
  • 15
    • 67349155413 scopus 로고    scopus 로고
    • OASIS, extensible Access Control Markup Language (XACML), V2.0, January 2005.
    • OASIS, extensible Access Control Markup Language (XACML), V2.0, January 2005.
  • 19
    • 84964853055 scopus 로고    scopus 로고
    • Access control: Policies, models, and mechanisms
    • FOSAD
    • P. Samarati, S. de Capitani di Vimercati, Access control: policies, models, and mechanisms, in: FOSAD 2000, LNCS 2171, 2001, pp. 137-196.
    • (2000) LNCS , vol.2171 , pp. 137-196
    • Samarati, P.1    de Capitani di Vimercati, S.2
  • 21
    • 33646486528 scopus 로고    scopus 로고
    • Risk-resilient heuristics and genetic algorithms for security-assured grid job scheduling
    • Song S., Hwang K., and Kwok Y.K. Risk-resilient heuristics and genetic algorithms for security-assured grid job scheduling. IEEE Transactions on Computers 55 6 (2006) 703-719
    • (2006) IEEE Transactions on Computers , vol.55 , Issue.6 , pp. 703-719
    • Song, S.1    Hwang, K.2    Kwok, Y.K.3
  • 22
    • 39049116456 scopus 로고    scopus 로고
    • A trust evaluation framework in distributed networks: Vulnerability analysis and defense against attacks
    • Y. Sun, Z. Han, W. Yu, K.J.R. Liu, A trust evaluation framework in distributed networks: vulnerability analysis and defense against attacks, in: Proceedings of IEEE Infocom, 2006.
    • (2006) Proceedings of IEEE Infocom
    • Sun, Y.1    Han, Z.2    Yu, W.3    Liu, K.J.R.4
  • 26
    • 84942318236 scopus 로고    scopus 로고
    • V. Welch, F. Siebenlist, I. Foster, J. Brresnahan, K. Czajkowski, J. Gawor, C. Kesselman, S. Meder, L. Pearlman, S. Tuedke, Security for grid services, in: Twelfth International Symposium on High Performance Distributed Computing (HPDC-12), June 2003, pp. 48-57.
    • V. Welch, F. Siebenlist, I. Foster, J. Brresnahan, K. Czajkowski, J. Gawor, C. Kesselman, S. Meder, L. Pearlman, S. Tuedke, Security for grid services, in: Twelfth International Symposium on High Performance Distributed Computing (HPDC-12), June 2003, pp. 48-57.
  • 29
    • 33747417748 scopus 로고    scopus 로고
    • A trust-QoS enhanced grid services scheduling
    • Zhang W., and Fang B. A trust-QoS enhanced grid services scheduling. Chinese Journal of Computers 29 7 (2000) 1157-1166
    • (2000) Chinese Journal of Computers , vol.29 , Issue.7 , pp. 1157-1166
    • Zhang, W.1    Fang, B.2
  • 31
    • 34047150751 scopus 로고    scopus 로고
    • PowerTrust: a robust and scalable reputation system for trusted peer-to-peer computing
    • Zhou R., and Hwang K. PowerTrust: a robust and scalable reputation system for trusted peer-to-peer computing. IEEE Transactions on Parallel and Distributed Systems 18 4 (2007) 460-473
    • (2007) IEEE Transactions on Parallel and Distributed Systems , vol.18 , Issue.4 , pp. 460-473
    • Zhou, R.1    Hwang, K.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.