메뉴 건너뛰기




Volumn , Issue , 2009, Pages 145-154

The design and evaluation of accountable grid computing system

Author keywords

[No Author keywords available]

Indexed keywords

ACCOUNTABILITY FRAMEWORK; ACCOUNTABILITY SYSTEMS; EXPERIMENTAL EVALUATION; GRID COMPUTING SYSTEMS; GRID SYSTEMS;

EID: 70350241671     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICDCS.2009.54     Document Type: Conference Paper
Times cited : (18)

References (34)
  • 1
    • 70350241022 scopus 로고    scopus 로고
    • M. Behrens, P. Ziu, Command and Control Grid Systems, http://www.r2ad.com/papers/Grid-Study-R2AD.pdf. White paper. Defense Information Systems Agency 2005
    • M. Behrens, P. Ziu, Command and Control Grid Systems, http://www.r2ad.com/papers/Grid-Study-R2AD.pdf. White paper. Defense Information Systems Agency 2005
  • 2
    • 0032153903 scopus 로고    scopus 로고
    • An access control model supporting periodicity constraints and temporal reasoning
    • E. Bertino, C. Bettini, E. Ferrari, and P. Samarati, An access control model supporting periodicity constraints and temporal reasoning. ACM Trans. Database Syst., 23(3): 231-185, 1998
    • (1998) ACM Trans. Database Syst , vol.23 , Issue.3 , pp. 231-185
    • Bertino, E.1    Bettini, C.2    Ferrari, E.3    Samarati, P.4
  • 4
    • 84869644117 scopus 로고    scopus 로고
    • California Institute Technology
    • California Institute Technology. Monalisa agents systems. http://monalisa.caltech.edu
    • Monalisa agents systems
  • 7
    • 84869649556 scopus 로고    scopus 로고
    • Condor-g: http://www.cs.wisc.edu/condor
    • Condor-g
  • 10
    • 84869259941 scopus 로고    scopus 로고
    • DoD data sharing document: https://www.softwaretechnews.com/stn-view.php? stn-id=10&article-id=51
    • DoD data sharing document
  • 11
    • 84869639032 scopus 로고    scopus 로고
    • Emulab: http://www.emulab.net
    • Emulab
  • 14
    • 36049030250 scopus 로고    scopus 로고
    • L. Khan, M. Awad and B. Thuraisingham, A New Intrusion Detection System using Support Vector Machines and Hierarchical Clustering, The VLDB Journal 16, 4 (Oct. 2007), 507-521.
    • L. Khan, M. Awad and B. Thuraisingham, A New Intrusion Detection System using Support Vector Machines and Hierarchical Clustering, The VLDB Journal 16, 4 (Oct. 2007), 507-521.
  • 15
    • 33845207907 scopus 로고    scopus 로고
    • PlanetFlow : Maintaining Accountability for Network Services
    • January
    • M. Huang, A. Bavier, L. Peterson, PlanetFlow : Maintaining Accountability for Network Services, Operating Systems Review, January 2006
    • (2006) Operating Systems Review
    • Huang, M.1    Bavier, A.2    Peterson, L.3
  • 20
    • 84869650120 scopus 로고    scopus 로고
    • Ganglia: http://ganglia.sourceforge.net
    • Ganglia
  • 22
    • 84869641598 scopus 로고    scopus 로고
    • Gridshib: http://grid.ncsa.uiuc.edu/GridShib/
    • Gridshib
  • 28
    • 84885380243 scopus 로고    scopus 로고
    • Postgresql: http://www.postgresql.org
    • Postgresql
  • 30
    • 84858098605 scopus 로고    scopus 로고
    • Shibboleth: http://shibboleth.internet2.edu/
    • Shibboleth
  • 31
    • 34548806882 scopus 로고    scopus 로고
    • Teragrid: http://www.teragrid.org
    • Teragrid
  • 32
    • 84869659649 scopus 로고    scopus 로고
    • XML Document
    • XML Document: http://www.w3.org/TR/REC-xml
  • 34
    • 26244467247 scopus 로고    scopus 로고
    • Virtual computing infrastructure for nanoelectronics simulation
    • October
    • A. Fortes, J. Figueiredo, M. Lundstrom: Virtual computing infrastructure for nanoelectronics simulation, Proceedings of the IEEE, 93:1839-1847, October 2005
    • (2005) Proceedings of the IEEE , vol.93 , pp. 1839-1847
    • Fortes, A.1    Figueiredo, J.2    Lundstrom, M.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.