-
1
-
-
35048883832
-
VOMS, an authorization system for virtual organizations
-
Fernández Rivera, F, Bubak, M, Gómez Tato, A, Doallo, R, eds, Across Grids 2003, Springer, Heidelberg
-
Alfieri, R., Cecchini, R.L., Ciaschini, V., dell'Agnello, L., Frohner, A., Gianoli, A., Lõrentey, K., Spataro, F.: VOMS, an authorization system for virtual organizations. In: Fernández Rivera, F., Bubak, M., Gómez Tato, A., Doallo, R. (eds.) Across Grids 2003. LNCS, vol. 2970, pp. 33-40. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.2970
, pp. 33-40
-
-
Alfieri, R.1
Cecchini, R.L.2
Ciaschini, V.3
dell'Agnello, L.4
Frohner, A.5
Gianoli, A.6
Lõrentey, K.7
Spataro, F.8
-
4
-
-
85008038596
-
Improving the TCPA specification
-
Arbaugh, B.: Improving the TCPA specification. IEEE Computer, 77-79 (2002)
-
(2002)
IEEE Computer
, vol.77-79
-
-
Arbaugh, B.1
-
5
-
-
0002762440
-
RBAC policies in XML for X.509 based privilege management
-
Chadwick, D.W.: RBAC policies in XML for X.509 based privilege management. In: Proceedings of SEC 2002 (2002)
-
(2002)
Proceedings of SEC
-
-
Chadwick, D.W.1
-
6
-
-
78650880166
-
Flexible OS support and applications for Trusted Computing
-
Garfunkel, T., Rosenblum, M., Boneh, D.: Flexible OS support and applications for Trusted Computing. In: The 9th Hot Topics in Operating Systems, HOTOS-IX (2003)
-
(2003)
The 9th Hot Topics in Operating Systems, HOTOS-IX
-
-
Garfunkel, T.1
Rosenblum, M.2
Boneh, D.3
-
7
-
-
84926427148
-
Survey of virtual machine research
-
Goldberg, R.: Survey of virtual machine research. IEEE Computer Magazine 7, 34-45 (1974)
-
(1974)
IEEE Computer Magazine
, vol.7
, pp. 34-45
-
-
Goldberg, R.1
-
8
-
-
71549160609
-
-
Haldar, V., Chandra, D., Franz, M.: Semantic remote attestation - a virtual machine directed approach to trusted computing. In: VM 2004. USENIX (2004)
-
Haldar, V., Chandra, D., Franz, M.: Semantic remote attestation - a virtual machine directed approach to trusted computing. In: VM 2004. USENIX (2004)
-
-
-
-
9
-
-
21644470487
-
Experimenting with TCPA/TCG hardware, or: How I learned to stop worrying and love the bear
-
Technical Report TR2003-476, Department of Computer Science, Dartmouth College, Hanover, New Hampshire December
-
Marchesini, J., Smith, S., Wild, O., MacDonald, R.: Experimenting with TCPA/TCG hardware, or: How I learned to stop worrying and love the bear. Technical Report TR2003-476, Department of Computer Science, Dartmouth College, Hanover, New Hampshire (December 2003)
-
(2003)
-
-
Marchesini, J.1
Smith, S.2
Wild, O.3
MacDonald, R.4
-
10
-
-
71549118638
-
Grids and Private Networks are Antithetical
-
Chivers, H, Martin, A, eds, Oxford, UK July
-
Martin, A., Cook, C.: Grids and Private Networks are Antithetical. In: Chivers, H., Martin, A. (eds.) Workshop on Grid Security Practice and Experience, Oxford, UK (July 2004)
-
(2004)
Workshop on Grid Security Practice and Experience
-
-
Martin, A.1
Cook, C.2
-
12
-
-
84976845043
-
End-to-End Arguments in System Design
-
Saltzer, J.H., Reed, D.P., Clark, D.D.: End-to-End Arguments in System Design. ACM Transactions in Computer Systems 2(4), 277-288 (1984)
-
(1984)
ACM Transactions in Computer Systems
, vol.2
, Issue.4
, pp. 277-288
-
-
Saltzer, J.H.1
Reed, D.P.2
Clark, D.D.3
-
13
-
-
71549156354
-
-
Stainforth, D., Martin, A., Simpson, A., Christensen, C., Kettleborough, J., Aina, T., Allen, M.: Security principles for public-resource modelling research. In: IASTED (2002)
-
Stainforth, D., Martin, A., Simpson, A., Christensen, C., Kettleborough, J., Aina, T., Allen, M.: Security principles for public-resource modelling research. In: IASTED (2002)
-
-
-
-
15
-
-
71549138170
-
-
Bair, R. (ed.), Agarwal, D., et. al (contributors): National Collaboratories Horizons, Report of the August 10-12, National Collaboratories Program Meeting, the U.S. Department of Energy Office of Science (2004)
-
Bair, R. (ed.), Agarwal, D., et. al (contributors): National Collaboratories Horizons, Report of the August 10-12, National Collaboratories Program Meeting, the U.S. Department of Energy Office of Science (2004)
-
-
-
-
16
-
-
71549126638
-
-
Bellovin, S.: Distributed Firewalls. In: login: pp. 39-47 (November 1999)
-
Bellovin, S.: Distributed Firewalls. In: login: pp. 39-47 (November 1999)
-
-
-
-
17
-
-
0034444963
-
Feasibility of a service distributed file system deployed on an existing set of desktop PCs
-
Bolosky, W.J., Douceur, J.R., Ely, D., Theimer, M.: Feasibility of a service distributed file system deployed on an existing set of desktop PCs. In: Proceedings of International Conference on Measurement and Modelling of Computer Systems, pp. 34-43 (2000)
-
(2000)
Proceedings of International Conference on Measurement and Modelling of Computer Systems
, pp. 34-43
-
-
Bolosky, W.J.1
Douceur, J.R.2
Ely, D.3
Theimer, M.4
-
18
-
-
0038125081
-
Computational Grids
-
Ch. 2, pp, Morgan Kaufmann, San Francisco
-
Foster, I., Kesselman, C.: Computational Grids. In: The Grid: Blueprint for a New Computing Infrastructure, Ch. 2, pp. 15-51. Morgan Kaufmann, San Francisco (1999)
-
(1999)
The Grid: Blueprint for a New Computing Infrastructure
, pp. 15-51
-
-
Foster, I.1
Kesselman, C.2
-
19
-
-
0032218229
-
A security architecture for Computational Grids
-
Foster, I., Kesselman, C., Tsudik, G., Tuecke, S.: A security architecture for Computational Grids. In: 5th ACM Conference on Computer and Communications Security, pp. 83-92 (1998)
-
(1998)
5th ACM Conference on Computer and Communications Security
, pp. 83-92
-
-
Foster, I.1
Kesselman, C.2
Tsudik, G.3
Tuecke, S.4
-
20
-
-
0035455653
-
The anatomy of the Grid: Enabling scalable virtual organizations
-
Foster, I., Kesselman, C., Tuecke, S.: The anatomy of the Grid: Enabling scalable virtual organizations. International Journal of High Performance Computing Applications 15(3), 200-222 (2001)
-
(2001)
International Journal of High Performance Computing Applications
, vol.15
, Issue.3
, pp. 200-222
-
-
Foster, I.1
Kesselman, C.2
Tuecke, S.3
-
21
-
-
71549159838
-
-
Freier, A.O, Karlton, P, Kocher, P.C, The SSL Protocol, Version 3.0. INTERNET-DRAFT, draft-freier-ssl-version3-02.txt November 1996
-
Freier, A.O., Karlton, P., Kocher, P.C.: The SSL Protocol, Version 3.0. INTERNET-DRAFT, draft-freier-ssl-version3-02.txt (November 1996)
-
-
-
-
22
-
-
10044237459
-
-
Globus Toolkit, http://www-unix.globus.org/toolkit/
-
Globus Toolkit
-
-
-
23
-
-
71549148806
-
-
ITU-T.Rec. X.509 (revised) the Directory - Authentication Framework. International Telecommunication Union, Geneva, Switzerland (equivalent to ISO/IEC 9594-8:1995) (1993)
-
ITU-T.Rec. X.509 (revised) the Directory - Authentication Framework. International Telecommunication Union, Geneva, Switzerland (equivalent to ISO/IEC 9594-8:1995) (1993)
-
-
-
-
24
-
-
0034870062
-
An Online Credential Repository for the Grid: MyProxy
-
August, IEEE Press, Los Alamitos
-
Novotny, J., Teucke, S., Welch, V.: An Online Credential Repository for the Grid: MyProxy. In: Proceedings of the Tenth International Symposium on High Performance Distributed Computing (HPDC-10), August 2001. IEEE Press, Los Alamitos (2001)
-
(2001)
Proceedings of the Tenth International Symposium on High Performance Distributed Computing (HPDC-10)
-
-
Novotny, J.1
Teucke, S.2
Welch, V.3
-
25
-
-
84887853842
-
A Community Authorization Service for Group Collaboration
-
Pearlman, L., Welch, V., Foster, I., Kesselman, C., Tuecke, S.: A Community Authorization Service for Group Collaboration. In: Proceedings of the 3rd International Workshop on Policies for Distributed Systems and Networks, p. 50 (2002)
-
(2002)
Proceedings of the 3rd International Workshop on Policies for Distributed Systems and Networks
, pp. 50
-
-
Pearlman, L.1
Welch, V.2
Foster, I.3
Kesselman, C.4
Tuecke, S.5
-
26
-
-
71549151104
-
-
RSA Security. PKCS#11 v2.20: Cryptographic Token Interface Standard. June 28 (2004), http://www.rsasecurity.com/pub/pkcs/pkcs-11/v2-20/pkcs-11v2-20.pdf
-
RSA Security. PKCS#11 v2.20: Cryptographic Token Interface Standard. June 28 (2004), http://www.rsasecurity.com/pub/pkcs/pkcs-11/v2-20/pkcs-11v2-20.pdf
-
-
-
-
27
-
-
71549121459
-
-
http://www.serverwatch.com/
-
-
-
-
28
-
-
2942654406
-
Certificate-based Authorization Policy in a PKI Environment
-
Thompson, M., Essiari, A., Mudumbai, S.: Certificate-based Authorization Policy in a PKI Environment. ACM Transactions on Information and System Security (TISSEC) 6(4), 566-588 (2003)
-
(2003)
ACM Transactions on Information and System Security (TISSEC)
, vol.6
, Issue.4
, pp. 566-588
-
-
Thompson, M.1
Essiari, A.2
Mudumbai, S.3
-
29
-
-
71549158010
-
-
http://www.trustedcomputinggroup.org
-
-
-
-
30
-
-
0003243695
-
SETI@home - massively distributed computing for SETI
-
Korpela, E., Werthimer, D., Anderson, D., Cobb, J., Lebofsky, M.: SETI@home - massively distributed computing for SETI. Computing in Science and Engineering 3(1), 78-83 (2001)
-
(2001)
Computing in Science and Engineering
, vol.3
, Issue.1
, pp. 78-83
-
-
Korpela, E.1
Werthimer, D.2
Anderson, D.3
Cobb, J.4
Lebofsky, M.5
-
31
-
-
13444269104
-
Uncertainty in the predictions of the climate response to rising levels of greenhouse gases
-
Stainforth, D.A., Aina, T., Christensen, C., Collins, M., Faul, N., Frame, D.J., Kettleborough, J.A., Knight, S., Martin, A., Murphy, J.M., Piani, C., Sexton, D., Smith, L.A., Spicer, R.A., Thorpe, A.J., Allen, M.R.: Uncertainty in the predictions of the climate response to rising levels of greenhouse gases. Nature 433, 403-406 (2005)
-
(2005)
Nature
, vol.433
, pp. 403-406
-
-
Stainforth, D.A.1
Aina, T.2
Christensen, C.3
Collins, M.4
Faul, N.5
Frame, D.J.6
Kettleborough, J.A.7
Knight, S.8
Martin, A.9
Murphy, J.M.10
Piani, C.11
Sexton, D.12
Smith, L.A.13
Spicer, R.A.14
Thorpe, A.J.15
Allen, M.R.16
|