메뉴 건너뛰기




Volumn 1, Issue 3, 2009, Pages 1-17

Obtaining security requirements for a mobile grid system

Author keywords

Misuse and use case model; Mobile grid computing; Security; Security requirements analysis; Software development methodologies

Indexed keywords

CRYPTOGRAPHY; ELECTRIC POWER SYSTEM SECURITY; ITERATIVE METHODS; SOFTWARE DESIGN;

EID: 77949488225     PISSN: 19380259     EISSN: 19380267     Source Type: Journal    
DOI: 10.4018/jghpc.2009070101     Document Type: Article
Times cited : (12)

References (18)
  • 2
    • 0027804413 scopus 로고
    • Information systems security design methods: Implications for information systems development
    • Baskerville, R. (1993). Information systems security design methods: implications for information systems development. ACM Computing Surveys, 25(4), 375 - 414.
    • (1993) ACM Computing Surveys , vol.25 , Issue.4 , pp. 375-414
    • Baskerville, R.1
  • 4
    • 78651563051 scopus 로고    scopus 로고
    • Enterprise Grid Alliance Security Working Group. 8 July 2005
    • Enterprise Grid Alliance Security Working Group. (2005, 8 July 2005). Enterprise Grid Security Requirements Verison 1.0
    • (2005) Enterprise Grid Security Requirements Verison 1.0
  • 6
    • 0036601844 scopus 로고    scopus 로고
    • Grid services for distributed system integration
    • Foster, I., Kesselman, C., Nick, J. M., & Tuecke, S. (2002). Grid services for distributed system integration. Computer, 35(6), 37-46.
    • (2002) Computer , vol.35 , Issue.6 , pp. 37-46
    • Foster, I.1    Kesselman, C.2    Nick, J.M.3    Tuecke, S.4
  • 10
    • 33646765853 scopus 로고    scopus 로고
    • Mobile-To- grid middleware: Bridging the gap between mobile and Grid environments
    • February 14-16 Paper presented at the Amsterdam, The Netherlands
    • Jameel, H., Kalim, U., Sajjad, A., Lee, S., & Jeon, T. (2005, February 14-16). Mobile-To- Grid Middleware: Bridging the gap between mobile and Grid environments. Paper presented at the European Grid Conference EGC 2005, Amsterdam, The Netherlands.
    • (2005) European Grid Conference EGC 2005
    • Jameel, H.1    Kalim, U.2    Sajjad, A.3    Lee, S.4    Jeon, T.5
  • 13
    • 49049090612 scopus 로고    scopus 로고
    • PSecGCM: Process for the development of Secure Grid Computing based Systems with Mobile devices
    • Paper presented at Reliability and Security (ARES 2008), Barcelona, Spain
    • Rosado, D. G., Fernández-Medina, E., López, J., & Piattini, M. (2008). PSecGCM: Process for the development of Secure Grid Computing based Systems with Mobile devices. Paper presented at the International Conference on Availability, Reliability and Security (ARES 2008), Barcelona, Spain.
    • (2008) The International Conference on Availability
    • Rosado, D.G.1    Fernández-Medina, E.2    López, J.3    Piattini, M.4
  • 15
    • 78651538522 scopus 로고    scopus 로고
    • Chapter 18: Security issues in mobile computing
    • McGraw-Hill Professional
    • Talukder, A., & Yavagal, R. (2006). Chapter 18: Security issues in mobile computing. InMobile Computing: McGraw-Hill Professional.
    • (2006) Mobile Computing
    • Talukder, A.1    Yavagal, R.2
  • 16
    • 85036772423 scopus 로고    scopus 로고
    • Trusted Computing Group Administration. (2006) . Securing Mobile Devices on Converged Networks
    • Trusted Computing Group Administration.(2006) . Securing Mobile Devices on Converged Networks.
  • 17
    • 85027202312 scopus 로고    scopus 로고
    • Cap. 12. grid security architecture: Requirements,fundamentals, standards, and models
    • A. Publications (Ed.), Tuscaloosa, USA
    • Vivas, J. L., López, J., & Montenegro, J. A. (2007) . Cap. 12. Grid Security Architecture: Requirements,fundamentals, standards, and models. In A. Publications (Ed.), Security in Distributed, Grid, Mobile, and Pervasive Computing (pp. 440). Tuscaloosa, USA.
    • (2007) Security in Distributed, Grid, Mobile, and Pervasive Computing , pp. 44-48
    • Vivas, J.L.1    López, J.2    Montenegro, J.A.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.