|
Volumn 76, Issue , 2004, Pages 17-22
|
GridBox: Securing hosts from malicious and greedy applications
|
Author keywords
[No Author keywords available]
|
Indexed keywords
ACCESS CONTROL LISTS;
APPLICATION SECURITY;
COMPUTATIONAL GRIDS;
GENERAL PURPOSE;
GRID APPLICATIONS;
GRID-BOX;
OPERATING SYSTEMS;
ACCESS CONTROL;
COMPUTER OPERATING SYSTEMS;
MIDDLEWARE;
GRID COMPUTING;
|
EID: 77952990951
PISSN: None
EISSN: None
Source Type: Conference Proceeding
DOI: 10.1145/1028493.1028496 Document Type: Conference Paper |
Times cited : (13)
|
References (20)
|