메뉴 건너뛰기




Volumn , Issue , 2007, Pages 1-331

Grid computing security

Author keywords

[No Author keywords available]

Indexed keywords


EID: 84889966187     PISSN: None     EISSN: None     Source Type: Book    
DOI: 10.1007/978-3-540-44493-0     Document Type: Book
Times cited : (77)

References (283)
  • 1
    • 84890004308 scopus 로고    scopus 로고
    • th July, 2006
    • th July, 2006
  • 2
    • 84889962858 scopus 로고    scopus 로고
    • th July, 2006
    • th July, 2006
  • 3
    • 84889958610 scopus 로고    scopus 로고
    • th July, 2006
    • th July, 2006
  • 5
    • 84889990952 scopus 로고    scopus 로고
    • th July 2006
    • th July 2006
  • 7
    • 84889958250 scopus 로고    scopus 로고
    • Financial services grid virtualization for increased business performance and lower TCO
    • NY
    • L. Dimitriou. Financial services Grid virtualization for increased business performance and lower TCO. In Grid in Finance, NY, 2006.
    • (2006) Grid in Finance
    • Dimitriou, L.1
  • 8
    • 84871418151 scopus 로고    scopus 로고
    • Application of stochastic simulation in automotive industry
    • R Detroit
    • R. Reuter R, R. Hoffmann, J. Kamarajan. Application of stochastic Simulation in Automotive Industry. In Proc. AMERI-PAM, Detroit, 2000.
    • (2000) Proc. AMERI-PAM
    • Reuter, R.1    Hoffmann, R.2    Kamarajan, J.3
  • 9
    • 43149111187 scopus 로고    scopus 로고
    • Discovering multi-core: Extending the benefits of moore's law
    • G.
    • G. Koch G. Discovering Multi-Core: Extending the Benefits of Moore's Law. In Technology Intel® Magazine, 2005.
    • (2005) Technology Intel® Magazine
    • Koch, G.1
  • 10
    • 33845396619 scopus 로고    scopus 로고
    • Moore's law vs. storage improvements vs. optical improvements
    • C.
    • C. Vilett C. Moore's Law vs. storage improvements vs. optical improvements. In Scientific American, 2001.
    • (2001) Scientific American
    • Vilett, C.1
  • 12
    • 84890000126 scopus 로고    scopus 로고
    • InfiniBand Trade Association Release 1.1
    • InfiniBand Trade Association. InfiniBand Architecturè Specification, Volume 1, Release 1.1, 2002.
    • (2002) InfiniBand Architecturè Specification , vol.1
  • 16
    • 84889985058 scopus 로고    scopus 로고
    • Employing grid computing for competitive advantage
    • Sun® Microsystems
    • Sun® Microsystems. Employing Grid Computing for Competitive Advantage. Executive Brief, 2003.
    • (2003) Executive Brief
  • 18
    • 84889997948 scopus 로고    scopus 로고
    • IBM® Grid Computing Group White Paper
    • IBM® Grid Computing Group. IBM® and Grid. White Paper, 2003.
    • (2003) IBM® and Grid
  • 21
    • 84890003551 scopus 로고    scopus 로고
    • th July, 2006
    • th July, 2006.
  • 24
    • 84889999444 scopus 로고    scopus 로고
    • Scorpion: Simplifying the corporate IT infrastructure
    • D. Heap. Scorpion: Simplifying the Corporate IT Infrastructure. IBM® Research White Paper, 2000.
    • (2000) IBM® Research White Paper
    • Heap, D.1
  • 26
    • 84889964515 scopus 로고    scopus 로고
    • th July, 2006
    • th July, 2006.
  • 27
    • 84889981857 scopus 로고    scopus 로고
    • th July, 2006
    • th July, 2006.
  • 29
    • 84996622121 scopus 로고
    • PYRROS: Static task scheduling and code generation for message-passing multiprocessors
    • ACM Press, New York
    • T. Yang, A. Gerasoulis. PYRROS: Static Task Scheduling and Code Generation for Message-Passing Multiprocessors. In Proc. 6th ACM Int'l Conf. Supercomputing, ACM Press, New York, pp. 428-433, 1992.
    • (1992) Proc. 6th ACM Int'l Conf. Supercomputing , pp. 428-433
    • Yang, T.1    Gerasoulis, A.2
  • 30
    • 84889982454 scopus 로고    scopus 로고
    • Parallel grid runtime and application development environment
    • P-Grade Team
    • P-Grade Team. Parallel Grid Runtime and Application Development Environment. User's Manual version. 8.4.2, 2006.
    • (2006) User's Manual Version. 8.4.2
  • 31
    • 0034290441 scopus 로고    scopus 로고
    • CASCH: A tool for computer-aided scheduling
    • W.
    • I. Ahmed, Y-K. Kwok, M-Y. Wu, W. Shu W. CASCH: A Tool for Computer-Aided Scheduling. IEEE Concurrency, Vol. 8, no. 4, pp. 21-33, 2000.
    • (2000) IEEE Concurrency , vol.8 , Issue.4 , pp. 21-33
    • Ahmed, I.1    Kwok, Y.-K.2    Wu, M.-Y.3    Shu, W.4
  • 32
    • 84889998015 scopus 로고    scopus 로고
    • st July, 2006
    • st July, 2006.
  • 33
    • 84889959066 scopus 로고    scopus 로고
    • st July, 2006
    • st July, 2006.
  • 38
    • 0017930809 scopus 로고
    • A method for obtaining digital signatures and public key cryptosystems
    • R. Rivest, A. Shamir, L. Adleman. A Method for Obtaining Digital Signatures and Public Key Cryptosystems. Communications of the ACM, Vol. 21, no. 2, 120-126, 1978.
    • (1978) Communications of the ACM , vol.21 , Issue.2 , pp. 120-126
    • Rivest, R.1    Shamir, A.2    Adleman, L.3
  • 39
    • 84874800178 scopus 로고
    • A public key cryptosystem and a signature scheme based on discrete logarithms
    • T. El Gamal. A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Transactions on Information Theory, v. IT-31, no. 4, pp. 469-472, 1985.
    • (1985) IEEE Transactions on Information Theory , vol.IT-31 , Issue.4 , pp. 469-472
    • El Gamal, T.1
  • 40
    • 4344693030 scopus 로고    scopus 로고
    • A tutorial on linear and differential cryptanalysis
    • Centre for Applied Cryptographic Research, Department of Combinatorics and Optimization, University of Waterloo
    • H.M. Heys. A Tutorial on Linear and Differential Cryptanalysis. Technical Report CORR 2001-17, Centre for Applied Cryptographic Research, Department of Combinatorics and Optimization, University of Waterloo, 2001.
    • (2001) Technical Report CORR 2001-17
    • Heys, H.M.1
  • 43
    • 0003195066 scopus 로고
    • MD5 message digest algorithm
    • R. Rivest. MD5 Message Digest Algorithm. IETF RFC 1321, 1992.
    • (1992) IETF RFC 1321
    • Rivest, R.1
  • 44
    • 1542265638 scopus 로고    scopus 로고
    • US secure hash algorithm 1 (SHA1)
    • D. Eastlake, P. Jones. US Secure Hash Algorithm 1 (SHA1). RFC 3174, 2001.
    • (2001) RFC 3174
    • Eastlake, D.1    Jones, P.2
  • 46
    • 0003308762 scopus 로고    scopus 로고
    • Internet X.509 public key infrastructure certificate and CRL profile
    • R. Housley, W. Ford, W. Polk, D. Solo. Internet X.509 Public Key Infrastructure Certificate and CRL Profile. IETF RFC 2459, 1999.
    • (1999) IETF RFC 2459
    • Housley, R.1    Ford, W.2    Polk, W.3    Solo, D.4
  • 49
    • 84889998208 scopus 로고    scopus 로고
    • th July, 2006
    • th July, 2006.
  • 50
    • 84889998758 scopus 로고    scopus 로고
    • th July 2006
    • th July 2006.
  • 51
    • 0002548429 scopus 로고
    • The evolution of the kerberos authentication system
    • IEEE Computer Society Press
    • J.T. Kohl, B.C. Neuman, T.Y. T'so. The Evolution of the Kerberos Authentication System. Distributed Open Systems, IEEE Computer Society Press, pp. 78-94, 1994.
    • (1994) Distributed Open Systems , pp. 78-94
    • Kohl, J.T.1    Neuman, B.C.2    T'so, T.Y.3
  • 52
    • 0018048246 scopus 로고
    • Using encryption for authentication in large networks of computers
    • R. Needham, M. Schroeder. Using Encryption for Authentication in Large Networks of Computers. Communications of the ACM, Vol. 21, pp. 393-399, 1978.
    • (1978) Communications of the ACM , vol.21 , pp. 393-399
    • Needham, R.1    Schroeder, M.2
  • 53
    • 0003068282 scopus 로고    scopus 로고
    • Security architecture for internet protocol
    • S. Kent, R. Atkinson. Security Architecture for Internet Protocol. IETF RFC. 2401, 1998.
    • (1998) IETF RFC. 2401
    • Kent, S.1    Atkinson, R.2
  • 56
    • 0003315821 scopus 로고    scopus 로고
    • IP encapsulated security payload (ESP)
    • S. Kent, R. Atkinson. IP Encapsulated Security Payload (ESP). IETF RFC 2406, 1998.
    • (1998) IETF RFC 2406
    • Kent, S.1    Atkinson, R.2
  • 58
    • 84890011119 scopus 로고    scopus 로고
    • th July 2006
    • th July 2006.
  • 59
    • 0003918059 scopus 로고    scopus 로고
    • The physiology of the grid: An open grid services architecture for distributed systems integration
    • I. Foster, C. Kesselman, J. Nick, S. Tuecke. The Physiology of the Grid: An Open Grid Services Architecture for Distributed Systems Integration. Tech Report, Argonne National Lab, 2002.
    • (2002) Tech Report, Argonne National Lab
    • Foster, I.1    Kesselman, C.2    Nick, J.3    Tuecke, S.4
  • 66
    • 84889995451 scopus 로고    scopus 로고
    • th July 2006
    • th July 2006.
  • 68
    • 84890002418 scopus 로고    scopus 로고
    • Documentation Team accessed on 13th July 2006
    • Documentation Team. GT4 toolkit, 2006, available at, http://www-unix. globus.org/toolkit/docs/4.0/admin/docbook, accessed on 13th July 2006.
    • (2006) GT4 Toolkit
  • 73
    • 0023859517 scopus 로고
    • Using mandatory integrity to enforce "commercial," security
    • Oakland (CA)
    • T. Lee. Using mandatory integrity to enforce "commercial," security. In Proceedings of IEEE Symposium on Security and Privacy, Oakland (CA), pp. 140-146, 1988.
    • (1988) Proceedings of IEEE Symposium on Security and Privacy , pp. 140-146
    • Lee, T.1
  • 76
    • 0016949746 scopus 로고
    • A lattice model of secure information flow
    • D.E. Denning. A Lattice Model of Secure Information Flow. Communications of the ACM, 19 (2), pp. 236-243, 1976.
    • (1976) Communications of the ACM , vol.19 , Issue.2 , pp. 236-243
    • Denning, D.E.1
  • 77
    • 50249183308 scopus 로고    scopus 로고
    • Role hierarchies and constraints for lattice-based access controls
    • New York
    • R. Sandhu. Role Hierarchies and Constraints for Lattice-based Access Controls. In Proceedings of the Conference on Computer Security, New York, pp. 65-79, 1996.
    • (1996) Proceedings of the Conference on Computer Security , pp. 65-79
    • Sandhu, R.1
  • 78
    • 84884311106 scopus 로고    scopus 로고
    • Configuring role-based access control to enforce mandatory and discretionary access control policies
    • S. Osborn, R. Sandhu, Q. Munawer. Configuring Role-Based Access Control to Enforce Mandatory and Discretionary Access Control Policies. ACM Trans. on Information and System Security, Vol. 3, no. 2, pp. 85-106, 2000.
    • (2000) ACM Trans. on Information and System Security , vol.3 , Issue.2 , pp. 85-106
    • Osborn, S.1    Sandhu, R.2    Munawer, Q.3
  • 83
    • 0002817535 scopus 로고    scopus 로고
    • The PERMIS X.509 role based privilege management infrastructure
    • Lake Tahoe (CA)
    • D. Chadwick, O. Otenko. The PERMIS X.509 Role Based Privilege Management Infrastructure. In ACM SACMAT, Lake Tahoe (CA), pp. 135-140, 2002.
    • (2002) ACM SACMAT , pp. 135-140
    • Chadwick, D.1    Otenko, O.2
  • 84
    • 84889987096 scopus 로고    scopus 로고
    • th July, 2006
    • th July, 2006.
  • 87
    • 84889994672 scopus 로고    scopus 로고
    • th July 2006
    • th July 2006.
  • 88
    • 84889991278 scopus 로고    scopus 로고
    • th July, 2006
    • th July, 2006.
  • 89
    • 0003976889 scopus 로고    scopus 로고
    • Trends in denial of service attack technology
    • v1.0
    • K.J. Houle, G.M. Weaver. Trends in Denial of Service Attack Technology. CERT Advisory, v1.0, 2001.
    • (2001) CERT Advisory
    • Houle, K.J.1    Weaver, G.M.2
  • 96
    • 0034776786 scopus 로고    scopus 로고
    • On the effectiveness of route-based packet filtering for distributed DoS attack prevention in power-law internet
    • San Diego (CA)
    • K. Park, H. Lee. On the Effectiveness of Route-Based Packet Filtering for Distributed DoS Attack Prevention in Power-Law Internet. In Proc. ACM SIGCOMM, San Diego (CA), pp. 15-26, 2001.
    • (2001) Proc. ACM SIGCOMM , pp. 15-26
    • Park, K.1    Lee, H.2
  • 98
    • 0038404196 scopus 로고    scopus 로고
    • Defending against distributed denial of service attacks with max-min fair server-centric router throttles quality of service
    • Miami (FL)
    • D.K. Yau, J.C.S. Lui, F. Liang. Defending Against Distributed Denial of Service Attacks with Max-min Fair Server-centric Router Throttles Quality of Service. Tenth IEEE International Workshop on QoS (IWQoS), Miami (FL), pp. 35-44, 2002.
    • (2002) Tenth IEEE International Workshop on QoS (IWQoS) , pp. 35-44
    • Yau, D.K.1    Lui, J.C.S.2    Liang, F.3
  • 100
    • 0003516333 scopus 로고    scopus 로고
    • Intrusion detection systems: A survey and taxonomy
    • Dept. of Computer Engineering, Chalmers University of Technology, Goteborg (Sweden)
    • S. Axelsson. Intrusion Detection Systems: A Survey and Taxonomy. Technical report 99-15, Dept. of Computer Engineering, Chalmers University of Technology, Goteborg (Sweden), 2000.
    • (2000) Technical Report 99-15
    • Axelsson, S.1
  • 101
    • 84889961228 scopus 로고    scopus 로고
    • th July, 2006
    • th July, 2006.
  • 104
    • 84889958843 scopus 로고    scopus 로고
    • th July, 2006
    • th July, 2006.
  • 106
    • 85011016678 scopus 로고    scopus 로고
    • Tracing anonymous packets to their approximate sources
    • New Orleans (LA)
    • H. Burch, B. Cheswick. Tracing anonymous packets to their approximate sources. In Proc. USENIX LISA Conf., New Orleans (LA), pp. 319-327, 2000.
    • (2000) Proc. USENIX LISA Conf. , pp. 319-327
    • Burch, H.1    Cheswick, B.2
  • 109
    • 0004075434 scopus 로고    scopus 로고
    • ICMP traceback messages
    • S.M. Bellovin. ICMP Traceback Messages. Internet Draft, 2000. draft-bellovin-itrace-00.txt.
    • (2000) Internet Draft
    • Bellovin, S.M.1
  • 111
    • 0034997397 scopus 로고    scopus 로고
    • Advanced and authenticated marking schemes for IP traceback
    • Alaska
    • D.X. Song, A. Perrig. Advanced and Authenticated Marking Schemes for IP Traceback. In Proc. INFOCOM, Alaska, pp. 878-886, 2001.
    • (2001) Proc. INFOCOM , pp. 878-886
    • Song, D.X.1    Perrig, A.2
  • 112
    • 0037457637 scopus 로고    scopus 로고
    • On detecting service violations and bandwidth theft in QoS network domains
    • Elsevier
    • A. Habib, S. Fahmy, S.R. Avasarala, V. Prabhakar, B. Bhargava. On Detecting Service Violations and Bandwidth Theft in QoS Network Domains. Computer Communications, Elsevier, Vol. 26, issue 8, pp. 861-871, 2003.
    • (2003) Computer Communications , vol.26 , Issue.8 , pp. 861-871
    • Habib, A.1    Fahmy, S.2    Avasarala, S.R.3    Prabhakar, V.4    Bhargava, B.5
  • 113
    • 0035009495 scopus 로고    scopus 로고
    • Efficiently monitoring bandwidth and latency in IP networks
    • Alaska
    • Y. Breitbart et al. Efficiently monitoring bandwidth and latency in IP networks. In Proc. IEEE INFOCOM, Alaska, pp. 933-942, 2001.
    • (2001) Proc. IEEE INFOCOM , pp. 933-942
    • Breitbart, Y.1
  • 115
  • 118
    • 84947264061 scopus 로고    scopus 로고
    • GridBank: A grid accounting services architecture (GASA) for distributed systems sharing and integration
    • A Nice (France)
    • A. Barmouta A, R. Buyya. GridBank: A Grid Accounting Services Architecture (GASA) for Distributed Systems Sharing and Integration. In International Parallel and Distributed Processing Symposium (IPDPS'03), Nice (France), 2003.
    • (2003) International Parallel and Distributed Processing Symposium (IPDPS'03)
    • Barmouta, A.1    Buyya, R.2
  • 122
    • 84889985554 scopus 로고    scopus 로고
    • th July, 2006
    • th July, 2006.
  • 124
    • 84889984454 scopus 로고    scopus 로고
    • A complete server virtualization and automation solution
    • Virtuozzo Team
    • Virtuozzo Team. A Complete Server Virtualization and Automation Solution. Virtuozzo White Paper and Data Sheet, 2005.
    • (2005) Virtuozzo White Paper and Data Sheet
  • 125
    • 84889995648 scopus 로고    scopus 로고
    • th July, 2006
    • th July, 2006.
  • 127
    • 84889989919 scopus 로고    scopus 로고
    • th July 2006
    • th July 2006.
  • 129
    • 33751086179 scopus 로고    scopus 로고
    • Nova: An approach to on-demand virtual execution environments for grids
    • Singapore
    • S. Sundarrajan, H. Nellitheertha, S. Bhattacharya, N. Arurkar. Nova: An Approach to On-Demand Virtual Execution Environments for Grids. In Proc. CCGrid, Singapore, pp. 544-547, 2006.
    • (2006) Proc. CCGrid , pp. 544-547
    • Sundarrajan, S.1    Nellitheertha, H.2    Bhattacharya, S.3    Arurkar, N.4
  • 130
    • 84889987887 scopus 로고    scopus 로고
    • Container-based operating system virtualization: A scalable, high-performance alternative to hypervisors
    • S. Soltesz, H. Potzl, M.E. Fiuczynski, A. Bavier, L. Peterson. Container-based Operating System Virtualization: A Scalable, High-performance Alternative to Hypervisors. Princeton White Paper, 2005.
    • (2005) Princeton White Paper
    • Soltesz, S.1    Potzl, H.2    Fiuczynski, M.E.3    Bavier, A.4    Peterson, L.5
  • 131
    • 0345968382 scopus 로고
    • On reliable and extendable operating systems
    • Infotech
    • B.W. Lampson. On reliable and extendable operating systems. State of the Art Report, Infotech, 1, 1971.
    • (1971) State of the Art Report , pp. 1
    • Lampson, B.W.1
  • 134
    • 84883516225 scopus 로고
    • Exokernel: An operating system architecture for application-level resource management
    • Copper Mountain (CO)
    • D.R. Engler, M.F. Kaashoek, J. O'Toole Jr. Exokernel: An operating system architecture for application-level resource management. In ACM Symp. On Operating Systems Principles (SOSP), Copper Mountain (CO), pp. 251-266, 1995.
    • (1995) ACM Symp. on Operating Systems Principles (SOSP) , pp. 251-266
    • Engler, D.R.1    Kaashoek, M.F.2    O'Toole Jr., J.3
  • 135
    • 85059232140 scopus 로고
    • Cmmp - A multi-mini-processor
    • AFIPS Press
    • W. Wulf, C.G. Bell. C.mmp - a multi-mini-processor. In Proc. AFIPS, FJCJ, Vol. 41, AFIPS Press, pp. 765-777, 1972.
    • (1972) Proc. AFIPS, FJCJ , vol.41 , pp. 765-777
    • Wulf, W.1    Bell, C.G.2
  • 136
    • 85084162735 scopus 로고    scopus 로고
    • A secure environment for untrusted helper applications: Confining the wiley hacker
    • San Jose (CA)
    • I. Goldberg, D. Wagner, R. Thomas, E.A. Brewer. A Secure Environment for Untrusted Helper Applications: Confining the Wiley Hacker. In USENIX Security Symposium, San Jose (CA), 1996.
    • (1996) USENIX Security Symposium
    • Goldberg, I.1    Wagner, D.2    Thomas, R.3    Brewer, E.A.4
  • 139
  • 141
    • 84889963078 scopus 로고    scopus 로고
    • Advanced reservation: State of the art
    • GGF Document
    • GGF Document. Advanced Reservation: State of the Art. GGF Draft, ggf-draft-sched-graap-2.0, 2003.
    • (2003) GGF Draft
  • 143
    • 0036788946 scopus 로고    scopus 로고
    • A computational economy for grid computing and its implementation in the nimrod-G resource broker
    • J.
    • D. Abramson, R. Buyya, J. Giddy J. A Computational Economy for Grid Computing and its Implementation in the Nimrod-G Resource Broker. Future Generation Computer Systems, Vol. 18, issue 8, pp. 1061-1074, 2002.
    • (2002) Future Generation Computer Systems , vol.18 , Issue.8 , pp. 1061-1074
    • Abramson, D.1    Buyya, R.2    Giddy, J.3
  • 144
    • 0036871268 scopus 로고    scopus 로고
    • Internet infrastructure security: A taxonomy
    • A. Chakrabarti, G. Manimaran. Internet Infrastructure Security: A Taxonomy. IEEE Networks, Vol. 16, no. 6, pp. 13-21, 2002.
    • (2002) IEEE Networks , vol.16 , Issue.6 , pp. 13-21
    • Chakrabarti, A.1    Manimaran, G.2
  • 146
    • 84889969553 scopus 로고    scopus 로고
    • Cisco® Systems White Paper, Cisco® Systems
    • Cisco® Systems. Evolution of Firewall Industry. White Paper, Cisco® Systems, 2002.
    • (2002) Evolution of Firewall Industry
  • 147
    • 70449654066 scopus 로고    scopus 로고
    • Master's Thesis, Technical University of Denmark
    • T.D. Yao. Adaptive Firewalls for the Grid. Master's Thesis, Technical University of Denmark, 2005.
    • (2005) Adaptive Firewalls for the Grid
    • Yao, T.D.1
  • 152
    • 33746302558 scopus 로고    scopus 로고
    • Asynchronous peer-to-peer web services and firewalls
    • Washington DC
    • D. Caromel, A. Costanzo, D. Gannon, A. Slominski. Asynchronous Peer-to-Peer Web Services and Firewalls. In Proc. IPDPS, Washington DC, 2005.
    • (2005) Proc. IPDPS
    • Caromel, D.1    Costanzo, A.2    Gannon, D.3    Slominski, A.4
  • 153
    • 84889970006 scopus 로고    scopus 로고
    • Service requirements for layer 2 provider provisioned virtual private networks
    • W. Augustyn, Y. Serbest. Service requirements for layer 2 provider provisioned virtual private networks. Internet Draft, 2003, draft-augustyn- ppvpn-l2vpn-requirements-02.txt.
    • (2003) Internet Draft
    • Augustyn, W.1    Serbest, Y.2
  • 164
    • 84966276701 scopus 로고    scopus 로고
    • Intrusion detection for link state routing protocol through integrated network management
    • Boston (MA)
    • F. Wang, F. Gong, F.S. Wu, R. Narayan. Intrusion Detection for Link State Routing Protocol Through Integrated Network Management. In Proc. ICCCN, Boston (MA), pp. 694-699, 1999.
    • (1999) Proc. ICCCN , pp. 694-699
    • Wang, F.1    Gong, F.2    Wu, F.S.3    Narayan, R.4
  • 166
    • 0030695529 scopus 로고    scopus 로고
    • Securing distance-vector routing protocols
    • San Diego (CA)
    • B.R. Smith, S. Murthy, J.J. Garcia-Luna-Aceves. Securing Distance-Vector Routing Protocols. In Proc. NDSS, San Diego (CA), pp. 85-92, 1997.
    • (1997) Proc. NDSS , pp. 85-92
    • Smith, B.R.1    Murthy, S.2    Garcia-Luna-Aceves, J.J.3
  • 167
    • 84890002512 scopus 로고    scopus 로고
    • An efficient algorithm for routing update detection & recovery in distance vector protocols
    • Alaska
    • A. Chakrabarti, G. Manimaran. An Efficient Algorithm for Routing Update Detection & Recovery in Distance Vector Protocols. In Proc. ICC, Alaska, 2003.
    • (2003) Proc. ICC
    • Chakrabarti, A.1    Manimaran, G.2
  • 168
    • 0031120164 scopus 로고    scopus 로고
    • Multipoint communications: A survey of protocols, functions and mechanisms
    • C. Diot, W. Dabbous, J. Crowcroft. Multipoint communications: A survey of protocols, functions and mechanisms. IEEE J. Select. Areas Communications (JSAC), Vol. 15, no. 3, pp. 277-290, 1997.
    • (1997) IEEE J. Select. Areas Communications (JSAC) , vol.15 , Issue.3 , pp. 277-290
    • Diot, C.1    Dabbous, W.2    Crowcroft, J.3
  • 169
    • 0033909171 scopus 로고    scopus 로고
    • Multicast routing and its QoS extension: Problems, algorithms and protocols
    • J. Hou, B. Wang. Multicast routing and its QoS extension: Problems, algorithms and Protocols. IEEE Networks, pp. 22-36, 2000.
    • (2000) IEEE Networks , pp. 22-36
    • Hou, J.1    Wang, B.2
  • 170
    • 0033900912 scopus 로고    scopus 로고
    • Multicast routing algorithms and protocols: A tutorial
    • L. Sahasrabuddhe, B. Mukherjee. Multicast routing algorithms and protocols: A tutorial. IEEE Network, pp. 90-102, 2000.
    • (2000) IEEE Network , pp. 90-102
    • Sahasrabuddhe, L.1    Mukherjee, B.2
  • 172
    • 0002413598 scopus 로고    scopus 로고
    • Intra- and interdomain multicast routing protocols: A survey and taxonomy
    • M. Ramalho. Intra- and Interdomain multicast routing protocols: A survey and taxonomy. IEEE Communications Surveys and Tutorials, Vol. 3, no. 1, pp. 2-25, 2000.
    • (2000) IEEE Communications Surveys and Tutorials , vol.3 , Issue.1 , pp. 2-25
    • Ramalho, M.1
  • 174
    • 0030609312 scopus 로고    scopus 로고
    • Iolus: A framework for scalable secure multicasting
    • Cannes (France)
    • S. Mittra. Iolus: A Framework for Scalable Secure Multicasting. In Proc. ACM SIGCOMM, Cannes (France), pp. 277-288, 1997.
    • (1997) Proc. ACM SIGCOMM , pp. 277-288
    • Mittra, S.1
  • 175
    • 84961917665 scopus 로고    scopus 로고
    • Key establishment for IGMP authentication in IP multicast
    • Colmar (France)
    • T. Hardjono, B. Cain. Key establishment for IGMP authentication in IP multicast. In Proc. IEEE ECUMN, Colmar (France), 2000.
    • (2000) Proc. IEEE ECUMN
    • Hardjono, T.1    Cain, B.2
  • 176
    • 0003308056 scopus 로고    scopus 로고
    • Scalable multicast key distribution
    • A. Ballardie. Scalable Multicast Key Distribution. RFC 1949, 1996.
    • (1996) RFC 1949
    • Ballardie, A.1
  • 177
    • 0033204997 scopus 로고    scopus 로고
    • KHIP - A scalable protocol for secure multicast routing
    • Cambridge (MA)
    • C. Shields, J.J. Garcia-Luna-Aceves. KHIP - A Scalable Protocol for Secure Multicast Routing. In Proc. ACM SIGCOMM, Cambridge (MA), pp. 53-64, 1999.
    • (1999) Proc. ACM SIGCOMM , pp. 53-64
    • Shields, C.1    Garcia-Luna-Aceves, J.J.2
  • 179
    • 0033893174 scopus 로고    scopus 로고
    • Secure group communications using key graphs
    • C. Wong, M. Gouda, S. Lam. Secure Group Communications Using Key Graphs. IEEE/ACM Trans. On Networking (ToN), Vol. 8, issue 1, pp. 16-30, 1998.
    • (1998) IEEE/ACM Trans. on Networking (ToN) , vol.8 , Issue.1 , pp. 16-30
    • Wong, C.1    Gouda, M.2    Lam, S.3
  • 180
    • 0006513010 scopus 로고    scopus 로고
    • Reliable group rekey: A performance analysis
    • San Diego (CA)
    • Y.R. Yand, X.S. Li, X.B. Zhang, S.S. Lam. Reliable Group Rekey: A Performance Analysis. In Proc. ACM SIGCOMM, San Diego (CA), pp. 27-38, 2001.
    • (2001) Proc. ACM SIGCOMM , pp. 27-38
    • Yand, Y.R.1    Li, X.S.2    Zhang, X.B.3    Lam, S.S.4
  • 181
    • 84889351757 scopus 로고    scopus 로고
    • How to sign digital streams
    • Santa Barbara (CA), Springer-Verlag
    • R. Gennaro, P. Rahtogi. How to sign digital streams. In Proc. CRYPTO, Santa Barbara (CA), Springer-Verlag, pp. 180-197, 1997.
    • (1997) Proc. CRYPTO , pp. 180-197
    • Gennaro, R.1    Rahtogi, P.2
  • 182
    • 0032594123 scopus 로고    scopus 로고
    • Digital signatures for flows and multicasts
    • C.K. Wong. Digital Signatures for Flows and Multicasts. IEEE/ACM Trans. on Networking, Vol. 7, no. 4, pp. 502-513, 1999.
    • (1999) IEEE/ACM Trans. on Networking , vol.7 , Issue.4 , pp. 502-513
    • Wong, C.K.1
  • 185
    • 0003597249 scopus 로고    scopus 로고
    • Wormhole detection in wireless ad hoc networks
    • Department of Computer Science, Rice University
    • Y.C. Hu, A. Perrig, D.B. Johnson. Wormhole detection in wireless ad hoc networks. Tech. Rep. TR01-384, Department of Computer Science, Rice University, 2002.
    • (2002) Tech. Rep. TR01-384
    • Hu, Y.C.1    Perrig, A.2    Johnson, D.B.3
  • 187
    • 26444574670 scopus 로고    scopus 로고
    • TinySec: A link layer security architecture for wireless sensor networks
    • Baltimore (MD)
    • C. Karlof, N. Sastry, D. Wagner. TinySec: A Link Layer Security Architecture for Wireless Sensor Networks. In Proc. ACM SenSys, Baltimore (MD), 2004.
    • (2004) Proc. ACM SenSys
    • Karlof, C.1    Sastry, N.2    Wagner, D.3
  • 189
    • 0006290405 scopus 로고    scopus 로고
    • Challenges and new technologies for addressing security in high performance distributed environments
    • Arlington (Virginia)
    • R. Dimitrov, M. Gleeson. Challenges and New Technologies for Addressing Security in High Performance Distributed Environments. In Proc. of the 21st National Information Systems Security Conference, Arlington (Virginia), pp. 457-468, 1998.
    • (1998) Proc. of the 21st National Information Systems Security Conference , pp. 457-468
    • Dimitrov, R.1    Gleeson, M.2
  • 190
    • 33746298446 scopus 로고    scopus 로고
    • Security enhancements in infiniband architecture
    • Denver (CO)
    • M. Lee, E.J. Kim, M. Yousif. Security Enhancements in Infiniband Architecture. In Proc. IPDPS, Denver (CO), 2005.
    • (2005) Proc. IPDPS
    • Lee, M.1    Kim, E.J.2    Yousif, M.3
  • 191
    • 27744489607 scopus 로고    scopus 로고
    • CYSEP - A cyber security processor for 10 gbps networks and beyond
    • Monterey (CA)
    • H.J. Chao, R. Karri, W.C. Lau. CYSEP - A Cyber Security Processor for 10 Gbps Networks and Beyond. In IEEE MILCOM, Monterey (CA), pp. 1114-1122, 2004.
    • (2004) IEEE MILCOM , pp. 1114-1122
    • Chao, H.J.1    Karri, R.2    Lau, W.C.3
  • 194
    • 84889987435 scopus 로고    scopus 로고
    • Securely available credentials (SACRED) - Credential server framework
    • D. Gustafson, M. Just, M. Nystrom. Securely Available Credentials (SACRED) - Credential Server Framework. IETF RFC 3760, 2004.
    • (2004) IETF RFC 3760
    • Gustafson, D.1    Just, M.2    Nystrom, M.3
  • 195
    • 84889965701 scopus 로고    scopus 로고
    • An introduction to smart cards
    • S. Petri. An Introduction to Smart Cards. Messaging Magazine, Sep. Issue, 1999.
    • (1999) Messaging Magazine , Issue.SPEC. ISSUE
    • Petri, S.1
  • 196
    • 0007608299 scopus 로고    scopus 로고
    • Breaking up is hard to do: Modeling security threats for smart cards
    • Chicago (IL)
    • B. Schneier, A. Shostack. Breaking Up is Hard to Do: Modeling Security Threats for Smart Cards. In USENIX Workshop on Smart Card Technology, Chicago (IL), pp. 175-185, 1999.
    • (1999) USENIX Workshop on Smart Card Technology , pp. 175-185
    • Schneier, B.1    Shostack, A.2
  • 197
    • 4544363068 scopus 로고    scopus 로고
    • Password-enabled PKI: Virtual smartcards versus virtual soft tokens
    • R. Sandhu, M. Bellare, R. Ganesan. Password-Enabled PKI: Virtual Smartcards versus Virtual Soft Tokens. In 1st Annual PKI Workshop, pp. 89-96, 2002.
    • (2002) 1st Annual PKI Workshop , pp. 89-96
    • Sandhu, R.1    Bellare, M.2    Ganesan, R.3
  • 204
    • 0001698236 scopus 로고
    • Cooperation and trust: Some theoretical notes
    • M. R. Jones, Nebraska University Press
    • M. Deutsch. Cooperation and Trust: Some Theoretical Notes. Nebraska Symposium on Motivation, M. R. Jones, Nebraska University Press, pp. 279-319, 1962.
    • (1962) Nebraska Symposium on Motivation , pp. 279-319
    • Deutsch, M.1
  • 207
    • 0009481412 scopus 로고    scopus 로고
    • A survey of trust in internet applications
    • T. Grandison, M. Sloman. A Survey Of Trust in Internet Applications. IEEE Communications Surveys, Vol. 3, no. 4, pp. 2-16, 2000.
    • (2000) IEEE Communications Surveys , vol.3 , Issue.4 , pp. 2-16
    • Grandison, T.1    Sloman, M.2
  • 208
    • 33646702918 scopus 로고    scopus 로고
    • A survey of trust management and resource discovery technologies in peer-to-peer applications
    • G. Suryanarayan, R.N. Taylor. A Survey of Trust Management and Resource Discovery Technologies in Peer-to-Peer Applications. ISR Technical Report, UCI-ISR-04-6, 2004.
    • (2004) ISR Technical Report, UCI-ISR-04-6
    • Suryanarayan, G.1    Taylor, R.N.2
  • 219
    • 3142738238 scopus 로고    scopus 로고
    • PeerTrust: Supporting reputation-based trust for peer-to-peer electronic communities
    • L. Xiong, L. Liu. PeerTrust: Supporting Reputation-Based Trust for Peer-to-Peer Electronic Communities. IEEE Transactions of Knowledge and Data Engineering, Vol. 16, no. 7, pp. 179-194, 2004.
    • (2004) IEEE Transactions of Knowledge and Data Engineering , vol.16 , Issue.7 , pp. 179-194
    • Xiong, L.1    Liu, L.2
  • 220
    • 34547509462 scopus 로고    scopus 로고
    • P-grid: A self-organizing access structure for P2P information systems
    • Springer-Verlag
    • K. Aberer. P-Grid: A Self-Organizing Access Structure for P2P Information Systems. In Proc. Ninth Int'l Conf. Cooperative Information Systems, Springer-Verlag, pp. 179-194, 2001.
    • (2001) Proc. Ninth Int'l Conf. Cooperative Information Systems , pp. 179-194
    • Aberer, K.1
  • 221
    • 57349142855 scopus 로고    scopus 로고
    • Pastry: Scalable, decentralized object location and routing for large-scale peer-to-peer systems
    • Heidelberg (Germany), SpringerVerlag
    • A. Rowstron, P. Druschel. Pastry: Scalable, Decentralized Object Location and Routing for Large-Scale Peer-to-Peer Systems. In Proc. IFIP/ACM Intl. Conf. on Dist. Systems and Platforms, Heidelberg (Germany), SpringerVerlag, pp. 329-350, 2001.
    • (2001) Proc. IFIP/ACM Intl. Conf. on Dist. Systems and Platforms , pp. 329-350
    • Rowstron, A.1    Druschel, P.2
  • 226
    • 35048858013 scopus 로고    scopus 로고
    • Fuzzy trust integration for security enforcement in grid computing
    • Wuhan (China)
    • S. Song, K. Hwang, M. Macwan. Fuzzy Trust Integration for Security Enforcement in Grid Computing. In Proc. NPC, Wuhan (China), pp. 9-21, 2004.
    • (2004) Proc. NPC , pp. 9-21
    • Song, S.1    Hwang, K.2    Macwan, M.3
  • 227
    • 28844464697 scopus 로고    scopus 로고
    • Trusted grid computing with security binding and trust integration
    • S. Song, K. Hwang, Y.K. Kwok. Trusted Grid Computing with Security Binding and Trust Integration. Journal of Grid Computing, Vol. 3, no. 1, pp. 24-34, 2005.
    • (2005) Journal of Grid Computing , vol.3 , Issue.1 , pp. 24-34
    • Song, S.1    Hwang, K.2    Kwok, Y.K.3
  • 229
    • 0442283424 scopus 로고    scopus 로고
    • Representing e-business rules for the semantic web: Situated courteous logic programs in RuleML
    • New Orleans (LA)
    • B. Grosof. Representing e-business rules for the semantic web: Situated courteous logic programs in RuleML. In Proceedings of the Workshop on Information Technologies and Systems (WITS), New Orleans (LA), 2001.
    • (2001) Proceedings of the Workshop on Information Technologies and Systems (WITS)
    • Grosof, B.1
  • 230
    • 0442330459 scopus 로고    scopus 로고
    • SweetDeal: Representing agent contracts with exceptions using XML rules, ontologies, and process descriptions
    • B Budapest (Hungary)
    • B. Grosof B, T. Poon. SweetDeal: Representing agent contracts with exceptions using XML rules, ontologies, and process descriptions. In WWW12, Budapest (Hungary), 340-349, 2003.
    • (2003) WWW12 , pp. 340-349
    • Grosof, B.1    Poon, T.2
  • 232
    • 0034826560 scopus 로고    scopus 로고
    • Dynamically distributed query evaluation
    • Santa Barbara (CA)
    • J. Trevor, D. Suciu. Dynamically distributed query evaluation. In PODS, Santa Barbara (CA), pp. 28-39, 2001.
    • (2001) PODS , pp. 28-39
    • Trevor, J.1    Suciu, D.2
  • 237
    • 10444275500 scopus 로고
    • Monitoring distributed systems (A survey)
    • Imperial College, London
    • M. Mansouri-Samani. Monitoring Distributed Systems (A Survey). Tech. Rep., DOC92/23, Imperial College, London, 1992.
    • (1992) Tech. Rep., DOC92/23
    • Mansouri-Samani, M.1
  • 238
    • 0002587301 scopus 로고
    • Monitoring distributed systems
    • M. Mansouri-Samani, M. Sloman. Monitoring distributed systems. IEEE Network, Vol. 7, no. 6, pp. 20-30, 1993.
    • (1993) IEEE Network , vol.7 , Issue.6 , pp. 20-30
    • Mansouri-Samani, M.1    Sloman, M.2
  • 241
    • 84889971607 scopus 로고    scopus 로고
    • Protocol operations for version2 of the simple network management protocol (SNMP)
    • J. Case, M. McCloghrie, M. Rose, S. Waldrusser. Protocol Operations for Version2 of the Simple Network Management Protocol (SNMP). IETF RFC 1905, 1996.
    • (1996) IETF RFC 1905
    • Case, J.1    McCloghrie, M.2    Rose, M.3    Waldrusser, S.4
  • 242
    • 84890008753 scopus 로고    scopus 로고
    • th July, 2006
    • th July, 2006.
  • 243
    • 84890007076 scopus 로고    scopus 로고
    • th July, 2006
    • th July, 2006.
  • 244
    • 84889977203 scopus 로고    scopus 로고
    • th, 2006
    • th, 2006.
  • 245
    • 84890005467 scopus 로고    scopus 로고
    • th, 2006
    • th, 2006.
    • Mon
  • 246
    • 84889961366 scopus 로고    scopus 로고
    • accessed on July 13th, 2006
    • Aide. http://sourceforge.net/projects/aide, accessed on July 13th, 2006.
    • Aide
  • 247
    • 84889970765 scopus 로고    scopus 로고
    • accessed on July 13th, 2006
    • Tripwire. http://sourceforge.net/projects/tripwire, accessed on July 13th, 2006.
    • Tripwire
  • 248
    • 3342966061 scopus 로고    scopus 로고
    • Ganglia distributed monitoring system: Design, implementation, and experience
    • M.L. Massie, B.N. Chun, B.E. Culler. Ganglia Distributed Monitoring System: Design, Implementation, and Experience. Parallel Computing, Vol. 30, pp. 817-840, 2004.
    • (2004) Parallel Computing , vol.30 , pp. 817-840
    • Massie, M.L.1    Chun, B.N.2    Culler, B.E.3
  • 256
    • 84942307718 scopus 로고    scopus 로고
    • A performance study of monitoring and information services for distributed systems
    • IEEE Computer Society Press, Seattle (WA)
    • X. Zhang, J. Freschl, J. Schopf. A performance study of monitoring and information services for distributed systems. In Proc. of the 12th IEEE High Performance Distributed Computing (HPDC), IEEE Computer Society Press, Seattle (WA), pp. 270-282, 2003.
    • (2003) Proc. of the 12th IEEE High Performance Distributed Computing (HPDC) , pp. 270-282
    • Zhang, X.1    Freschl, J.2    Schopf, J.3
  • 257
    • 10444251156 scopus 로고    scopus 로고
    • A taxonomy of grid monitoring systems
    • S. Zalikonas, R. Sakellariou. A Taxonomy of Grid Monitoring Systems. In FGCS, Vol. 21, issue 1, pp. 163-188, 2004.
    • (2004) FGCS , vol.21 , Issue.1 , pp. 163-188
    • Zalikonas, S.1    Sakellariou, R.2
  • 258
    • 84889962869 scopus 로고    scopus 로고
    • The role of IT monitoring, alerting, and reporting in satisfying serbanes-oxley requirements
    • TNT Systems
    • TNT Systems. The Role of IT Monitoring, Alerting, and Reporting in Satisfying Serbanes-Oxley Requirements. TNT White Paper, 2005.
    • (2005) TNT White Paper
  • 261
    • 0037623983 scopus 로고    scopus 로고
    • Identity based encryption from the weil pairing
    • D. Boneh, and M. Franklin. Identity based Encryption from the Weil Pairing. SIAM J. of Computing, Vol. 32, no. 3. pp. 586-615, 2003.
    • (2003) SIAM J. of Computing , vol.32 , Issue.3 , pp. 586-615
    • Boneh, D.1    Franklin, M.2
  • 262
    • 0001827537 scopus 로고
    • Identity-based cryptosystems and signature schemes
    • A. Shamir. Identity-based Cryptosystems and Signature Schemes. In Proc. CRYPTO, pp. 47-53, 1984.
    • (1984) Proc. CRYPTO , pp. 47-53
    • Shamir, A.1
  • 264
    • 84889980515 scopus 로고    scopus 로고
    • th July, 2006
    • th July, 2006.
  • 266
    • 0031077602 scopus 로고    scopus 로고
    • CORBA: Integrating diverse applications within distributed heterogeneous environments
    • S. Vinoski. CORBA: Integrating Diverse Applications Within Distributed Heterogeneous Environments. IEEE Communications Magazine, Vol. 14, no. 2, pp. 46-55, 1997.
    • (1997) IEEE Communications Magazine , vol.14 , Issue.2 , pp. 46-55
    • Vinoski, S.1
  • 267
    • 0003407768 scopus 로고    scopus 로고
    • st Ed., O'Reilly Publishers
    • st Ed., O'Reilly Publishers, 2001.
    • (2001) Java RMI
    • Grosso, W.1
  • 270
    • 0142154760 scopus 로고    scopus 로고
    • O'Reilley, ISBN: 0596004206
    • E.T. Ray. Learning XML, O'Reilley, ISBN: 0596004206, 2001.
    • (2001) Learning XML
    • Ray, E.T.1
  • 272
    • 4544381883 scopus 로고    scopus 로고
    • SOAP version 1.2, Part 0: Primer
    • N. Mitra (Ed). SOAP Version 1.2, Part 0: Primer. W3C Recommendations, 2003.
    • (2003) W3C Recommendations
    • Mitra, N.1
  • 274
    • 84889989377 scopus 로고    scopus 로고
    • Computer Associates ®, IBM®, Microsoft®, Oracle®, SAP®, SeeBeyond Technologies®, Systinet®, and Others OASIS Standard
    • Computer Associates ®, IBM®, Microsoft®, Oracle®, SAP®, SeeBeyond Technologies®, Systinet®, and Others. UDDI v. 3.0. OASIS Standard, 2005.
    • (2005) UDDI V. 3.0


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.