메뉴 건너뛰기




Volumn , Issue , 2009, Pages 67-72

Grid of security: A new approach of the network security

Author keywords

Distributed communication; Grid design; Security architecture

Indexed keywords

COMMUNICATION MODELS; DISTRIBUTED COMMUNICATIONS; DISTRIBUTED SECURITY; ENTERPRISE NETWORKS; ENTERPRISE SERVERS; GLOBAL AUTHENTICATION; GLOBAL SECURITY; INBOUND NETWORK; INTRUSION DETECTION SYSTEMS; NETWORK COMMUNICATIONS; NETWORK DEVICES; NEW APPROACHES; SECURITY BREACHES; SECURITY RULES; SECURITY SERVICES; SECURITY SOLUTIONS; VIRTUAL PRIVATE NETWORKS;

EID: 72849146003     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/NSS.2009.53     Document Type: Conference Paper
Times cited : (12)

References (17)
  • 3
    • 0033357103 scopus 로고    scopus 로고
    • Securing ad hoc networks
    • IEEE
    • Z. Lidong and J. H. Zygmunt, "Securing ad hoc networks," in IEEE Network, vol. 13, no. 6. IEEE, 1999, pp. 24-30.
    • (1999) IEEE Network , vol.13 , Issue.6 , pp. 24-30
    • Lidong, Z.1    Zygmunt, J.H.2
  • 4
    • 72849150169 scopus 로고    scopus 로고
    • Rok: A robust key pre-distribution protocol for multi-stage wireless sensor networks
    • September
    • C. Castelluccia and A. Spognardi, "Rok: A robust key pre-distribution protocol for multi-stage wireless sensor networks," in IEEE Securecomm, September 2007.
    • (2007) IEEE Securecomm
    • Castelluccia, C.1    Spognardi, A.2
  • 7
    • 10644223387 scopus 로고    scopus 로고
    • Computing on Large Scale Distributed Systems: XtremWeb Architecture, Programming Models, Security, Tests and Convergence with Grid
    • March
    • F. Cappello, S. Djilali, G. Fedak, T. Herault, F. Magniette, V. Néri, and O. Lodygensky, "Computing on Large Scale Distributed Systems: XtremWeb Architecture, Programming Models, Security, Tests and Convergence with Grid," in FGCS Future Generation Computer Science, vol. 21, March 2004, pp. 417-437.
    • (2004) FGCS Future Generation Computer Science , vol.21 , pp. 417-437
    • Cappello, F.1    Djilali, S.2    Fedak, G.3    Herault, T.4    Magniette, F.5    Néri, V.6    Lodygensky, O.7
  • 10
    • 33845382898 scopus 로고    scopus 로고
    • O. Flauzac, M. Krajecki, and J. Fugère, CONFIIT: a middleware for peer to peer computing, in The 2003 International Conference on Computational Science and its Applications (ICCSA 2003), C. T. M. Gravilova and P. L'Ecuyer, Eds., 2669 (III) of Lecture Notes in Computer Science. Montréal, Québec: Springer-Verlag, June 2003, pp. 69-78.
    • O. Flauzac, M. Krajecki, and J. Fugère, "CONFIIT: a middleware for peer to peer computing," in The 2003 International Conference on Computational Science and its Applications (ICCSA 2003), C. T. M. Gravilova and P. L'Ecuyer, Eds., vol. 2669 (III) of Lecture Notes in Computer Science. Montréal, Québec: Springer-Verlag, June 2003, pp. 69-78.
  • 13
    • 72849146858 scopus 로고    scopus 로고
    • Freenet, "http://www.freenet.sourceforge.net."
  • 15
    • 0036908130 scopus 로고    scopus 로고
    • Grids and grid technologies for wide-area distributed computing
    • Dec
    • M. Baker, R. Buyya, and D. Laforenza, "Grids and grid technologies for wide-area distributed computing," Softw. Pract. Exper., vol. 32, no. 15, pp. 1437-1466, Dec. 2002.
    • (2002) Softw. Pract. Exper , vol.32 , Issue.15 , pp. 1437-1466
    • Baker, M.1    Buyya, R.2    Laforenza, D.3
  • 16
    • 0031153727 scopus 로고    scopus 로고
    • Globus: A metacomputing infrastructure toolkit
    • I. Press, Ed
    • I. Foster and C. Kesselman, "Globus: a metacomputing infrastructure toolkit," in Supercomputer Applications, I. Press, Ed., vol. 11 (2), 1997, pp. 115-128.
    • (1997) Supercomputer Applications , vol.11 , Issue.2 , pp. 115-128
    • Foster, I.1    Kesselman, C.2
  • 17
    • 33745800644 scopus 로고    scopus 로고
    • A random walk topology management solution for grid
    • I2CS, Springer
    • C. Rabat, A. Bui, and O. Flauzac, "A random walk topology management solution for grid," in I2CS, ser. Lecture Notes in Computer Science, vol. 3908. Springer, 2006, pp. 91-104.
    • (2006) ser. Lecture Notes in Computer Science , vol.3908 , pp. 91-104
    • Rabat, C.1    Bui, A.2    Flauzac, O.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.