-
1
-
-
84890004308
-
-
th July, 2006
-
th July, 2006
-
-
-
-
2
-
-
84889962858
-
-
th July, 2006
-
th July, 2006
-
-
-
-
3
-
-
84889958610
-
-
th July, 2006
-
th July, 2006
-
-
-
-
5
-
-
84889990952
-
-
th July 2006
-
th July 2006
-
-
-
-
6
-
-
84889983714
-
Streamlining drug discovery research by leveraging grid workflow manager
-
S Singapore
-
A. Ghosh, A. Chakrabarti, R.A. Dheepak, S. Ali S, I. Gupta. Streamlining Drug Discovery Research by Leveraging Grid Workflow Manager. In Life Sciences Grid (LSGrid), Singapore, 2005.
-
(2005)
Life Sciences Grid (LSGrid)
-
-
Ghosh, A.1
Chakrabarti, A.2
Dheepak, R.A.3
Ali, S.4
Gupta, I.5
-
7
-
-
84889958250
-
Financial services grid virtualization for increased business performance and lower TCO
-
NY
-
L. Dimitriou. Financial services Grid virtualization for increased business performance and lower TCO. In Grid in Finance, NY, 2006.
-
(2006)
Grid in Finance
-
-
Dimitriou, L.1
-
8
-
-
84871418151
-
Application of stochastic simulation in automotive industry
-
R Detroit
-
R. Reuter R, R. Hoffmann, J. Kamarajan. Application of stochastic Simulation in Automotive Industry. In Proc. AMERI-PAM, Detroit, 2000.
-
(2000)
Proc. AMERI-PAM
-
-
Reuter, R.1
Hoffmann, R.2
Kamarajan, J.3
-
9
-
-
43149111187
-
Discovering multi-core: Extending the benefits of moore's law
-
G.
-
G. Koch G. Discovering Multi-Core: Extending the Benefits of Moore's Law. In Technology Intel® Magazine, 2005.
-
(2005)
Technology Intel® Magazine
-
-
Koch, G.1
-
10
-
-
33845396619
-
Moore's law vs. storage improvements vs. optical improvements
-
C.
-
C. Vilett C. Moore's Law vs. storage improvements vs. optical improvements. In Scientific American, 2001.
-
(2001)
Scientific American
-
-
Vilett, C.1
-
12
-
-
84890000126
-
-
InfiniBand Trade Association Release 1.1
-
InfiniBand Trade Association. InfiniBand Architecturè Specification, Volume 1, Release 1.1, 2002.
-
(2002)
InfiniBand Architecturè Specification
, vol.1
-
-
-
16
-
-
84889985058
-
Employing grid computing for competitive advantage
-
Sun® Microsystems
-
Sun® Microsystems. Employing Grid Computing for Competitive Advantage. Executive Brief, 2003.
-
(2003)
Executive Brief
-
-
-
18
-
-
84889997948
-
-
IBM® Grid Computing Group White Paper
-
IBM® Grid Computing Group. IBM® and Grid. White Paper, 2003.
-
(2003)
IBM® and Grid
-
-
-
20
-
-
0003635251
-
-
MIT Press
-
A. Geist, A. Beguelin, A. Dongarra, W. Jiang, R. Manchek, V. Sunderam. PVM: Parallel Virtual Machine - A User's Guide and Tutorial for Networked Parallel Computing. MIT Press, 1994.
-
(1994)
PVM: Parallel Virtual Machine - A User's Guide and Tutorial for Networked Parallel Computing
-
-
Geist, A.1
Beguelin, A.2
Dongarra, A.3
Jiang, W.4
Manchek, R.5
Sunderam, V.6
-
21
-
-
84890003551
-
-
th July, 2006
-
th July, 2006.
-
-
-
-
22
-
-
0002245383
-
A scalable peer-to-peer lookup service for internet applications
-
San Diego
-
I. Stoica, R. Morris, D. Karger, M.F. Kaashoek, H. Balakrishnan H. Chord: A Scalable Peer-to-peer Lookup Service for Internet Applications. In Proc. ACM SIGCOMM, San Diego, 2001.
-
(2001)
Proc. ACM SIGCOMM
-
-
Stoica, I.1
Morris, R.2
Karger, D.3
Kaashoek, M.F.4
Balakrishnan, H.5
Chord, H.6
-
24
-
-
84889999444
-
Scorpion: Simplifying the corporate IT infrastructure
-
D. Heap. Scorpion: Simplifying the Corporate IT Infrastructure. IBM® Research White Paper, 2000.
-
(2000)
IBM® Research White Paper
-
-
Heap, D.1
-
25
-
-
0025183708
-
Basic local alignment search tool
-
S.F. Altschul, W. Gish, W. Miller, E.W. Myers, D.J. Lipman. Basic local alignment search tool. J. Mol. Biol, pp. 403-410, 1990.
-
(1990)
J. Mol. Biol
, pp. 403-410
-
-
Altschul, S.F.1
Gish, W.2
Miller, W.3
Myers, E.W.4
Lipman, D.J.5
-
26
-
-
84889964515
-
-
th July, 2006
-
th July, 2006.
-
-
-
-
27
-
-
84889981857
-
-
th July, 2006
-
th July, 2006.
-
-
-
-
28
-
-
0027593363
-
Parallax: A tool for parallel program scheduling
-
T.G. Lewis, H. El-Rewini. Parallax: A Tool for Parallel Program Scheduling. IEEE J. Parallel and Distributed Technology, Vol. 1, No. 3, pp. 62-72, 1993.
-
(1993)
IEEE J. Parallel and Distributed Technology
, vol.1
, Issue.3
, pp. 62-72
-
-
Lewis, T.G.1
El-Rewini, H.2
-
29
-
-
84996622121
-
PYRROS: Static task scheduling and code generation for message-passing multiprocessors
-
ACM Press, New York
-
T. Yang, A. Gerasoulis. PYRROS: Static Task Scheduling and Code Generation for Message-Passing Multiprocessors. In Proc. 6th ACM Int'l Conf. Supercomputing, ACM Press, New York, pp. 428-433, 1992.
-
(1992)
Proc. 6th ACM Int'l Conf. Supercomputing
, pp. 428-433
-
-
Yang, T.1
Gerasoulis, A.2
-
30
-
-
84889982454
-
Parallel grid runtime and application development environment
-
P-Grade Team
-
P-Grade Team. Parallel Grid Runtime and Application Development Environment. User's Manual version. 8.4.2, 2006.
-
(2006)
User's Manual Version. 8.4.2
-
-
-
31
-
-
0034290441
-
CASCH: A tool for computer-aided scheduling
-
W.
-
I. Ahmed, Y-K. Kwok, M-Y. Wu, W. Shu W. CASCH: A Tool for Computer-Aided Scheduling. IEEE Concurrency, Vol. 8, no. 4, pp. 21-33, 2000.
-
(2000)
IEEE Concurrency
, vol.8
, Issue.4
, pp. 21-33
-
-
Ahmed, I.1
Kwok, Y.-K.2
Wu, M.-Y.3
Shu, W.4
-
32
-
-
84889998015
-
-
st July, 2006
-
st July, 2006.
-
-
-
-
33
-
-
84889959066
-
-
st July, 2006
-
st July, 2006.
-
-
-
-
34
-
-
33845339628
-
Scalable enterprise level workflow and infrastructure management in a grid computing environment
-
Cardiff (Wales)
-
K. Gor, R.A. Dheepak, S. Ali, L.D. Alves, N. Arurkar, I. Gupta, A. Chakrabarti, A. Sharma, S. Sengupta. Scalable Enterprise Level Workflow and Infrastructure Management in a Grid Computing Environment. In Proc. CCGrid, Cardiff (Wales), pp. 661-667, 2005.
-
(2005)
Proc. CCGrid
, pp. 661-667
-
-
Gor, K.1
Dheepak, R.A.2
Ali, S.3
Alves, L.D.4
Arurkar, N.5
Gupta, I.6
Chakrabarti, A.7
Sharma, A.8
Sengupta, S.9
-
38
-
-
0017930809
-
A method for obtaining digital signatures and public key cryptosystems
-
R. Rivest, A. Shamir, L. Adleman. A Method for Obtaining Digital Signatures and Public Key Cryptosystems. Communications of the ACM, Vol. 21, no. 2, 120-126, 1978.
-
(1978)
Communications of the ACM
, vol.21
, Issue.2
, pp. 120-126
-
-
Rivest, R.1
Shamir, A.2
Adleman, L.3
-
39
-
-
84874800178
-
A public key cryptosystem and a signature scheme based on discrete logarithms
-
T. El Gamal. A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Transactions on Information Theory, v. IT-31, no. 4, pp. 469-472, 1985.
-
(1985)
IEEE Transactions on Information Theory
, vol.IT-31
, Issue.4
, pp. 469-472
-
-
El Gamal, T.1
-
40
-
-
4344693030
-
A tutorial on linear and differential cryptanalysis
-
Centre for Applied Cryptographic Research, Department of Combinatorics and Optimization, University of Waterloo
-
H.M. Heys. A Tutorial on Linear and Differential Cryptanalysis. Technical Report CORR 2001-17, Centre for Applied Cryptographic Research, Department of Combinatorics and Optimization, University of Waterloo, 2001.
-
(2001)
Technical Report CORR 2001-17
-
-
Heys, H.M.1
-
43
-
-
0003195066
-
MD5 message digest algorithm
-
R. Rivest. MD5 Message Digest Algorithm. IETF RFC 1321, 1992.
-
(1992)
IETF RFC 1321
-
-
Rivest, R.1
-
44
-
-
1542265638
-
US secure hash algorithm 1 (SHA1)
-
D. Eastlake, P. Jones. US Secure Hash Algorithm 1 (SHA1). RFC 3174, 2001.
-
(2001)
RFC 3174
-
-
Eastlake, D.1
Jones, P.2
-
46
-
-
0003308762
-
Internet X.509 public key infrastructure certificate and CRL profile
-
R. Housley, W. Ford, W. Polk, D. Solo. Internet X.509 Public Key Infrastructure Certificate and CRL Profile. IETF RFC 2459, 1999.
-
(1999)
IETF RFC 2459
-
-
Housley, R.1
Ford, W.2
Polk, W.3
Solo, D.4
-
49
-
-
84889998208
-
-
th July, 2006
-
th July, 2006.
-
-
-
-
50
-
-
84889998758
-
-
th July 2006
-
th July 2006.
-
-
-
-
51
-
-
0002548429
-
The evolution of the kerberos authentication system
-
IEEE Computer Society Press
-
J.T. Kohl, B.C. Neuman, T.Y. T'so. The Evolution of the Kerberos Authentication System. Distributed Open Systems, IEEE Computer Society Press, pp. 78-94, 1994.
-
(1994)
Distributed Open Systems
, pp. 78-94
-
-
Kohl, J.T.1
Neuman, B.C.2
T'so, T.Y.3
-
52
-
-
0018048246
-
Using encryption for authentication in large networks of computers
-
R. Needham, M. Schroeder. Using Encryption for Authentication in Large Networks of Computers. Communications of the ACM, Vol. 21, pp. 393-399, 1978.
-
(1978)
Communications of the ACM
, vol.21
, pp. 393-399
-
-
Needham, R.1
Schroeder, M.2
-
53
-
-
0003068282
-
Security architecture for internet protocol
-
S. Kent, R. Atkinson. Security Architecture for Internet Protocol. IETF RFC. 2401, 1998.
-
(1998)
IETF RFC. 2401
-
-
Kent, S.1
Atkinson, R.2
-
56
-
-
0003315821
-
IP encapsulated security payload (ESP)
-
S. Kent, R. Atkinson. IP Encapsulated Security Payload (ESP). IETF RFC 2406, 1998.
-
(1998)
IETF RFC 2406
-
-
Kent, S.1
Atkinson, R.2
-
58
-
-
84890011119
-
-
th July 2006
-
th July 2006.
-
-
-
-
59
-
-
0003918059
-
The physiology of the grid: An open grid services architecture for distributed systems integration
-
I. Foster, C. Kesselman, J. Nick, S. Tuecke. The Physiology of the Grid: An Open Grid Services Architecture for Distributed Systems Integration. Tech Report, Argonne National Lab, 2002.
-
(2002)
Tech Report, Argonne National Lab
-
-
Foster, I.1
Kesselman, C.2
Nick, J.3
Tuecke, S.4
-
60
-
-
0042532233
-
Grid service specification
-
S. Tuecke, K. Czajkowski, I. Foster, J. Frey, S. Graham, C. Kesselman. Grid Service Specification. Tech Report, Argonne National Lab, 2002.
-
(2002)
Tech Report, Argonne National Lab
-
-
Tuecke, S.1
Czajkowski, K.2
Foster, I.3
Frey, J.4
Graham, S.5
Kesselman, C.6
-
61
-
-
84889986610
-
Open grid services infrastructure: V. 1.0
-
S. Tuecke, K. Czajkowski, I. Foster, J. Frey, S. Graham, C. Kesselman, T. Maquire, T. Sandholm, D. Snelling, P. Vanderbilt. Open Grid Services Infrastructure: v. 1.0. GGF Draft, 2003.
-
(2003)
GGF Draft
-
-
Tuecke, S.1
Czajkowski, K.2
Foster, I.3
Frey, J.4
Graham, S.5
Kesselman, C.6
Maquire, T.7
Sandholm, T.8
Snelling, D.9
Vanderbilt, P.10
-
62
-
-
84889982931
-
Modeling stateful resources with web services
-
th July, 2006
-
th July, 2006.
-
(2004)
IB M® Developer Works
-
-
Foster, I.1
Frey, J.2
Graham, S.3
Tuecke, S.4
Czajkowski, K.5
Ferguson, D.6
Leymann, F.7
Nally, M.8
Sedukhin, I.9
Snelling, D.10
Storey, T.11
Vambenepe, W.12
Weerawarana, S.13
-
66
-
-
84889995451
-
-
th July 2006
-
th July 2006.
-
-
-
-
68
-
-
84890002418
-
-
Documentation Team accessed on 13th July 2006
-
Documentation Team. GT4 toolkit, 2006, available at, http://www-unix. globus.org/toolkit/docs/4.0/admin/docbook, accessed on 13th July 2006.
-
(2006)
GT4 Toolkit
-
-
-
70
-
-
85084164300
-
Kerberized credential translation: A solution to web access control
-
Washington
-
O. Kornievskaia, P. Honeyman, B. Doster, K. Coffman. Kerberized Credential Translation: A Solution to Web Access Control. In Proc. USENIX Security Symposium, Washington, pp. 235-249, 2001.
-
(2001)
Proc. USENIX Security Symposium
, pp. 235-249
-
-
Kornievskaia, O.1
Honeyman, P.2
Doster, B.3
Coffman, K.4
-
71
-
-
84949227517
-
Evaluating web services based implementation of GridRPC
-
S. Shirasuna, H. Nakada, S. Matsuoka, S. Sekiguchi. Evaluating Web Services based Implementation of GridRPC. In Proc. IEEE High Perf. Dist. Computing (HPDC), pp. 237-245, 2002.
-
(2002)
Proc. IEEE High Perf. Dist. Computing (HPDC)
, pp. 237-245
-
-
Shirasuna, S.1
Nakada, H.2
Matsuoka, S.3
Sekiguchi, S.4
-
73
-
-
0023859517
-
Using mandatory integrity to enforce "commercial," security
-
Oakland (CA)
-
T. Lee. Using mandatory integrity to enforce "commercial," security. In Proceedings of IEEE Symposium on Security and Privacy, Oakland (CA), pp. 140-146, 1988.
-
(1988)
Proceedings of IEEE Symposium on Security and Privacy
, pp. 140-146
-
-
Lee, T.1
-
75
-
-
0030086382
-
Role-based access control models
-
R. Sandhu, E. Coyne, H. Feinstein, C. Youman. Role-Based Access Control Models. IEEE Computer, Vol. 29, no. 2, pp. 38-47, 1996.
-
(1996)
IEEE Computer
, vol.29
, Issue.2
, pp. 38-47
-
-
Sandhu, R.1
Coyne, E.2
Feinstein, H.3
Youman, C.4
-
76
-
-
0016949746
-
A lattice model of secure information flow
-
D.E. Denning. A Lattice Model of Secure Information Flow. Communications of the ACM, 19 (2), pp. 236-243, 1976.
-
(1976)
Communications of the ACM
, vol.19
, Issue.2
, pp. 236-243
-
-
Denning, D.E.1
-
77
-
-
50249183308
-
Role hierarchies and constraints for lattice-based access controls
-
New York
-
R. Sandhu. Role Hierarchies and Constraints for Lattice-based Access Controls. In Proceedings of the Conference on Computer Security, New York, pp. 65-79, 1996.
-
(1996)
Proceedings of the Conference on Computer Security
, pp. 65-79
-
-
Sandhu, R.1
-
78
-
-
84884311106
-
Configuring role-based access control to enforce mandatory and discretionary access control policies
-
S. Osborn, R. Sandhu, Q. Munawer. Configuring Role-Based Access Control to Enforce Mandatory and Discretionary Access Control Policies. ACM Trans. on Information and System Security, Vol. 3, no. 2, pp. 85-106, 2000.
-
(2000)
ACM Trans. on Information and System Security
, vol.3
, Issue.2
, pp. 85-106
-
-
Osborn, S.1
Sandhu, R.2
Munawer, Q.3
-
79
-
-
84887853842
-
A community authorization service for group collaboration
-
Monterey (CA)
-
L. Pearlman, V. Welch, I. Foster, C. Kesselman, S. Tuecke. A Community Authorization Service for Group Collaboration. In Proceedings of the IEEE 3rd International Workshop on Policies for Distributed Systems and Networks, Monterey (CA), pp 50-59, 2002.
-
(2002)
Proceedings of the IEEE 3rd International Workshop on Policies for Distributed Systems and Networks
, pp. 50-59
-
-
Pearlman, L.1
Welch, V.2
Foster, I.3
Kesselman, C.4
Tuecke, S.5
-
80
-
-
3142653204
-
VOMS: An authorization system for virtual organizations
-
Santiago e Compostella (Spain)
-
R. Alfieri, R. Cecchini, V. Ciaschini, L. dell'Agnello, A. Frohner, A. Gianoli, K. Lorentey, F. Spataro. VOMS: an Authorization System for Virtual Organizations. In 1st European Across Grids Conference, Santiago e Compostella (Spain), 2003.
-
(2003)
1st European Across Grids Conference
-
-
Alfieri, R.1
Cecchini, R.2
Ciaschini, V.3
Dell'Agnello, L.4
Frohner, A.5
Gianoli, A.6
Lorentey, K.7
Spataro, F.8
-
82
-
-
2942654406
-
-
M. Thompson, A. Essiari, S. Mudumbai. ACM Transactions on Information and System Security, (TISSEC), Vol. 6, issue 4, pp: 566-588, 2003.
-
(2003)
ACM Transactions on Information and System Security, (TISSEC)
, vol.6
, Issue.4
, pp. 566-588
-
-
Thompson, M.1
Essiari, A.2
Mudumbai, S.3
-
83
-
-
0002817535
-
The PERMIS X.509 role based privilege management infrastructure
-
Lake Tahoe (CA)
-
D. Chadwick, O. Otenko. The PERMIS X.509 Role Based Privilege Management Infrastructure. In ACM SACMAT, Lake Tahoe (CA), pp. 135-140, 2002.
-
(2002)
ACM SACMAT
, pp. 135-140
-
-
Chadwick, D.1
Otenko, O.2
-
84
-
-
84889987096
-
-
th July, 2006
-
th July, 2006.
-
-
-
-
87
-
-
84889994672
-
-
th July 2006
-
th July 2006.
-
-
-
-
88
-
-
84889991278
-
-
th July, 2006
-
th July, 2006.
-
-
-
-
89
-
-
0003976889
-
Trends in denial of service attack technology
-
v1.0
-
K.J. Houle, G.M. Weaver. Trends in Denial of Service Attack Technology. CERT Advisory, v1.0, 2001.
-
(2001)
CERT Advisory
-
-
Houle, K.J.1
Weaver, G.M.2
-
92
-
-
0008723266
-
-
Department of Energy Computer Incident Advisory Capability (CIAC), UCRL-ID-136939, Rev. 1., Lawrence Livermore National Laboratory
-
P.J. Criscuolo. Distributed Denial of Service Trin00, Tribe Flood Network, Tribe Flood Network 2000, and Stacheldraht CIAC-2319. Department of Energy Computer Incident Advisory Capability (CIAC), UCRL-ID-136939, Rev. 1., Lawrence Livermore National Laboratory, 2000.
-
(2000)
Distributed Denial of Service Trin00, Tribe Flood Network, Tribe Flood Network 2000, and Stacheldraht CIAC-2319
-
-
Criscuolo, P.J.1
-
96
-
-
0034776786
-
On the effectiveness of route-based packet filtering for distributed DoS attack prevention in power-law internet
-
San Diego (CA)
-
K. Park, H. Lee. On the Effectiveness of Route-Based Packet Filtering for Distributed DoS Attack Prevention in Power-Law Internet. In Proc. ACM SIGCOMM, San Diego (CA), pp. 15-26, 2001.
-
(2001)
Proc. ACM SIGCOMM
, pp. 15-26
-
-
Park, K.1
Lee, H.2
-
98
-
-
0038404196
-
Defending against distributed denial of service attacks with max-min fair server-centric router throttles quality of service
-
Miami (FL)
-
D.K. Yau, J.C.S. Lui, F. Liang. Defending Against Distributed Denial of Service Attacks with Max-min Fair Server-centric Router Throttles Quality of Service. Tenth IEEE International Workshop on QoS (IWQoS), Miami (FL), pp. 35-44, 2002.
-
(2002)
Tenth IEEE International Workshop on QoS (IWQoS)
, pp. 35-44
-
-
Yau, D.K.1
Lui, J.C.S.2
Liang, F.3
-
99
-
-
0003914522
-
State of the practice: Intrusion detection technologies
-
J. Allen. State of The Practice: Intrusion Detection Technologies. Carnegie Mellon, SEI, Tech, Report CMU/SEI-99-TR-028, ESC-99-028, 2000.
-
(2000)
Carnegie Mellon, SEI, Tech, Report CMU/SEI-99-TR-028, ESC-99-028
-
-
Allen, J.1
-
100
-
-
0003516333
-
Intrusion detection systems: A survey and taxonomy
-
Dept. of Computer Engineering, Chalmers University of Technology, Goteborg (Sweden)
-
S. Axelsson. Intrusion Detection Systems: A Survey and Taxonomy. Technical report 99-15, Dept. of Computer Engineering, Chalmers University of Technology, Goteborg (Sweden), 2000.
-
(2000)
Technical Report 99-15
-
-
Axelsson, S.1
-
101
-
-
84889961228
-
-
th July, 2006
-
th July, 2006.
-
-
-
-
104
-
-
84889958843
-
-
th July, 2006
-
th July, 2006.
-
-
-
-
106
-
-
85011016678
-
Tracing anonymous packets to their approximate sources
-
New Orleans (LA)
-
H. Burch, B. Cheswick. Tracing anonymous packets to their approximate sources. In Proc. USENIX LISA Conf., New Orleans (LA), pp. 319-327, 2000.
-
(2000)
Proc. USENIX LISA Conf.
, pp. 319-327
-
-
Burch, H.1
Cheswick, B.2
-
108
-
-
0034775309
-
Hash-based IP traceback
-
San Diego (CA)
-
A.C. Snoeren, C. Partridge, L.A. Sanchez, C.E. Jones, F. Tchakountio, T. Kent, T. Strayer. Hash-Based IP Traceback. In Proc. ACM SIGCOMM, San Diego (CA), pp. 3-14, 2001.
-
(2001)
Proc. ACM SIGCOMM
, pp. 3-14
-
-
Snoeren, A.C.1
Partridge, C.2
Sanchez, L.A.3
Jones, C.E.4
Tchakountio, F.5
Kent, T.6
Strayer, T.7
-
109
-
-
0004075434
-
ICMP traceback messages
-
S.M. Bellovin. ICMP Traceback Messages. Internet Draft, 2000. draft-bellovin-itrace-00.txt.
-
(2000)
Internet Draft
-
-
Bellovin, S.M.1
-
110
-
-
0035361712
-
Network support for IP traceback
-
S. Savage, D. Wetherall, A. Karlin, T. Anderson. Network Support for IP Traceback. IEEE Trans. on Networking, Vol. 1, no. 3, pp. 226-237, 2001.
-
(2001)
IEEE Trans. on Networking
, vol.1
, Issue.3
, pp. 226-237
-
-
Savage, S.1
Wetherall, D.2
Karlin, A.3
Anderson, T.4
-
111
-
-
0034997397
-
Advanced and authenticated marking schemes for IP traceback
-
Alaska
-
D.X. Song, A. Perrig. Advanced and Authenticated Marking Schemes for IP Traceback. In Proc. INFOCOM, Alaska, pp. 878-886, 2001.
-
(2001)
Proc. INFOCOM
, pp. 878-886
-
-
Song, D.X.1
Perrig, A.2
-
112
-
-
0037457637
-
On detecting service violations and bandwidth theft in QoS network domains
-
Elsevier
-
A. Habib, S. Fahmy, S.R. Avasarala, V. Prabhakar, B. Bhargava. On Detecting Service Violations and Bandwidth Theft in QoS Network Domains. Computer Communications, Elsevier, Vol. 26, issue 8, pp. 861-871, 2003.
-
(2003)
Computer Communications
, vol.26
, Issue.8
, pp. 861-871
-
-
Habib, A.1
Fahmy, S.2
Avasarala, S.R.3
Prabhakar, V.4
Bhargava, B.5
-
113
-
-
0035009495
-
Efficiently monitoring bandwidth and latency in IP networks
-
Alaska
-
Y. Breitbart et al. Efficiently monitoring bandwidth and latency in IP networks. In Proc. IEEE INFOCOM, Alaska, pp. 933-942, 2001.
-
(2001)
Proc. IEEE INFOCOM
, pp. 933-942
-
-
Breitbart, Y.1
-
116
-
-
0035012692
-
Inferring link loss using striped unicast probes
-
Alaska
-
N.G. Duffield, F.L. Presti, V. Paxson, D. Towsley. Inferring link loss using striped unicast probes. In Proc. IEEE INFOCOM, Alaska, pp. 915-923, 2001.
-
(2001)
Proc. IEEE INFOCOM
, pp. 915-923
-
-
Duffield, N.G.1
Presti, F.L.2
Paxson, V.3
Towsley, D.4
-
117
-
-
0031703272
-
Detecting disruptive routers: A distributed network monitoring approach
-
Oakland (CA)
-
K.A. Bradley, S. Cheung, N. Puketza, B. Mukherjee, R.A. Olsson. Detecting Disruptive Routers: A Distributed Network Monitoring Approach. In Symp. on Security and Privacy, Oakland (CA), pp. 115-124, 1998.
-
(1998)
Symp. on Security and Privacy
, pp. 115-124
-
-
Bradley, K.A.1
Cheung, S.2
Puketza, N.3
Mukherjee, B.4
Olsson, R.A.5
-
120
-
-
80054992065
-
Extensibility, safety, and performance, in the SPIN operating system
-
Copper Mountain (CO)
-
B. Bershad, S. Savage, P. Pardyak, E.G. Sirer, D. Becker, M. Fiuczynski, C. Chambers, S. Eggers. Extensibility, Safety, and Performance, in the SPIN Operating System. In ACM Symp. On Operating Systems Principles (SOSP), Copper Mountain (CO), pp. 267-283, 1995.
-
(1995)
ACM Symp. on Operating Systems Principles (SOSP)
, pp. 267-283
-
-
Bershad, B.1
Savage, S.2
Pardyak, P.3
Sirer, E.G.4
Becker, D.5
Fiuczynski, M.6
Chambers, C.7
Eggers, S.8
-
122
-
-
84889985554
-
-
th July, 2006
-
th July, 2006.
-
-
-
-
123
-
-
21644433634
-
Xen and the art of virtualization
-
NY
-
P. Barham, B. Dragovic, K. Fraser, S. Hand, T. Harris, A. Ho, R. Neugebauer, I. Pratt, A. Warfield. Xen and the Art of Virtualization. In ACM Proc. Symp. On Operating Systems Principles (SOSP), NY, pp. 164-177, 2003.
-
(2003)
ACM Proc. Symp. on Operating Systems Principles (SOSP)
, pp. 164-177
-
-
Barham, P.1
Dragovic, B.2
Fraser, K.3
Hand, S.4
Harris, T.5
Ho, A.6
Neugebauer, R.7
Pratt, I.8
Warfield, A.9
-
124
-
-
84889984454
-
A complete server virtualization and automation solution
-
Virtuozzo Team
-
Virtuozzo Team. A Complete Server Virtualization and Automation Solution. Virtuozzo White Paper and Data Sheet, 2005.
-
(2005)
Virtuozzo White Paper and Data Sheet
-
-
-
125
-
-
84889995648
-
-
th July, 2006
-
th July, 2006.
-
-
-
-
126
-
-
20344391930
-
Intel® virtualization technology
-
R. Uhlig, G. Neiger, D. Rodgers, A.L. Santoni, F.C.M. Martins, A.V. Anderson, S.M. Bennett, A. Kagi, SF.H. Leung, L. Smith. Intel® Virtualization Technology. IEEE Computer, Vol. 38, no. 5, pp. 48-56, 2005.
-
(2005)
IEEE Computer
, vol.38
, Issue.5
, pp. 48-56
-
-
Uhlig, R.1
Neiger, G.2
Rodgers, D.3
Santoni, A.L.4
Martins, F.C.M.5
Anderson, A.V.6
Bennett, S.M.7
Kagi, A.8
Leung, S.F.H.9
Smith, L.10
-
127
-
-
84889989919
-
-
th July 2006
-
th July 2006.
-
-
-
-
129
-
-
33751086179
-
Nova: An approach to on-demand virtual execution environments for grids
-
Singapore
-
S. Sundarrajan, H. Nellitheertha, S. Bhattacharya, N. Arurkar. Nova: An Approach to On-Demand Virtual Execution Environments for Grids. In Proc. CCGrid, Singapore, pp. 544-547, 2006.
-
(2006)
Proc. CCGrid
, pp. 544-547
-
-
Sundarrajan, S.1
Nellitheertha, H.2
Bhattacharya, S.3
Arurkar, N.4
-
130
-
-
84889987887
-
Container-based operating system virtualization: A scalable, high-performance alternative to hypervisors
-
S. Soltesz, H. Potzl, M.E. Fiuczynski, A. Bavier, L. Peterson. Container-based Operating System Virtualization: A Scalable, High-performance Alternative to Hypervisors. Princeton White Paper, 2005.
-
(2005)
Princeton White Paper
-
-
Soltesz, S.1
Potzl, H.2
Fiuczynski, M.E.3
Bavier, A.4
Peterson, L.5
-
131
-
-
0345968382
-
On reliable and extendable operating systems
-
Infotech
-
B.W. Lampson. On reliable and extendable operating systems. State of the Art Report, Infotech, 1, 1971.
-
(1971)
State of the Art Report
, pp. 1
-
-
Lampson, B.W.1
-
133
-
-
0016069660
-
HYDRA: The kernel of a multiprocessor operating system
-
W. Wulf, E. Cohen, W. Corwin, A. Jones, R. Levin, C. Pierson, F. Pollack. HYDRA: The Kernel of a Multiprocessor Operating System. Communications of the ACM, Vol. 17, no. 6, pp. 337-344, 1974.
-
(1974)
Communications of the ACM
, vol.17
, Issue.6
, pp. 337-344
-
-
Wulf, W.1
Cohen, E.2
Corwin, W.3
Jones, A.4
Levin, R.5
Pierson, C.6
Pollack, F.7
-
135
-
-
85059232140
-
Cmmp - A multi-mini-processor
-
AFIPS Press
-
W. Wulf, C.G. Bell. C.mmp - a multi-mini-processor. In Proc. AFIPS, FJCJ, Vol. 41, AFIPS Press, pp. 765-777, 1972.
-
(1972)
Proc. AFIPS, FJCJ
, vol.41
, pp. 765-777
-
-
Wulf, W.1
Bell, C.G.2
-
136
-
-
85084162735
-
A secure environment for untrusted helper applications: Confining the wiley hacker
-
San Jose (CA)
-
I. Goldberg, D. Wagner, R. Thomas, E.A. Brewer. A Secure Environment for Untrusted Helper Applications: Confining the Wiley Hacker. In USENIX Security Symposium, San Jose (CA), 1996.
-
(1996)
USENIX Security Symposium
-
-
Goldberg, I.1
Wagner, D.2
Thomas, R.3
Brewer, E.A.4
-
137
-
-
84867854789
-
REMUS: A security-enhanced operating system
-
M. Bernaschi, E. Gabrielli, L.V. Mancini. REMUS: a Security-Enhanced Operating System. ACM Transactions on Information and System Security, Vol. 5, no. 1, pp. 36-6, 2002.
-
(2002)
ACM Transactions on Information and System Security
, vol.5
, Issue.1
, pp. 36-36
-
-
Bernaschi, M.1
Gabrielli, E.2
Mancini, L.V.3
-
141
-
-
84889963078
-
Advanced reservation: State of the art
-
GGF Document
-
GGF Document. Advanced Reservation: State of the Art. GGF Draft, ggf-draft-sched-graap-2.0, 2003.
-
(2003)
GGF Draft
-
-
-
143
-
-
0036788946
-
A computational economy for grid computing and its implementation in the nimrod-G resource broker
-
J.
-
D. Abramson, R. Buyya, J. Giddy J. A Computational Economy for Grid Computing and its Implementation in the Nimrod-G Resource Broker. Future Generation Computer Systems, Vol. 18, issue 8, pp. 1061-1074, 2002.
-
(2002)
Future Generation Computer Systems
, vol.18
, Issue.8
, pp. 1061-1074
-
-
Abramson, D.1
Buyya, R.2
Giddy, J.3
-
144
-
-
0036871268
-
Internet infrastructure security: A taxonomy
-
A. Chakrabarti, G. Manimaran. Internet Infrastructure Security: A Taxonomy. IEEE Networks, Vol. 16, no. 6, pp. 13-21, 2002.
-
(2002)
IEEE Networks
, vol.16
, Issue.6
, pp. 13-21
-
-
Chakrabarti, A.1
Manimaran, G.2
-
146
-
-
84889969553
-
-
Cisco® Systems White Paper, Cisco® Systems
-
Cisco® Systems. Evolution of Firewall Industry. White Paper, Cisco® Systems, 2002.
-
(2002)
Evolution of Firewall Industry
-
-
-
147
-
-
70449654066
-
-
Master's Thesis, Technical University of Denmark
-
T.D. Yao. Adaptive Firewalls for the Grid. Master's Thesis, Technical University of Denmark, 2005.
-
(2005)
Adaptive Firewalls for the Grid
-
-
Yao, T.D.1
-
151
-
-
3543129528
-
An XML-based approach to combine firewalls and web services security specifications
-
P. Fairfax (Virginia)
-
M. Cremonini, E. Damiani, S. De Capitani di Vimercati, P. Samarati P. An XML-based Approach to Combine Firewalls and Web Services Security Specifications. ACM Workshop on XML Security, Fairfax (Virginia), pp. 69-78, 2003.
-
(2003)
ACM Workshop on XML Security
, pp. 69-78
-
-
Cremonini, M.1
Damiani, E.2
De Capitani Di Vimercati, S.3
Samarati, P.4
-
153
-
-
84889970006
-
Service requirements for layer 2 provider provisioned virtual private networks
-
W. Augustyn, Y. Serbest. Service requirements for layer 2 provider provisioned virtual private networks. Internet Draft, 2003, draft-augustyn- ppvpn-l2vpn-requirements-02.txt.
-
(2003)
Internet Draft
-
-
Augustyn, W.1
Serbest, Y.2
-
155
-
-
84890008098
-
Network based IP VPN architecture using virtual routers
-
H. OuldBrahim, G. Wright, B. Gleeson, T. Sloane, R.B.C. Sargor, I. Nehusse, J. Yu, R. Bach, A. Young, L. Fang, C. Weber. Network based IP VPN architecture using virtual routers. Internet Draft, 2003, draft-ietf-ppvpn-vpn- vr-03.txt.
-
(2003)
Internet Draft
-
-
OuldBrahim, H.1
Wright, G.2
Gleeson, B.3
Sloane, T.4
Sargor, R.B.C.5
Nehusse, I.6
Yu, J.7
Bach, R.8
Young, A.9
Fang, L.10
Weber, C.11
-
157
-
-
0033204537
-
A flexible model for resource management in virtual private networks
-
ACM Press
-
N.G. Duffield, P. Goyal Greenberg, P. Mishra, K.K. Ramakrishnan, J.E. van der Merive. A flexible model for resource management in virtual private networks. In Proc. of the Conference on Applications, Technologies, Architectures, and Protocols. Computer Communication, ACM Press, pp. 95-108, 1999.
-
(1999)
Proc. of the Conference on Applications, Technologies, Architectures, and Protocols. Computer Communication
, pp. 95-108
-
-
Duffield, N.G.1
Goyal Greenberg, P.2
Mishra, P.3
Ramakrishnan, K.K.4
Van Der Merive, J.E.5
-
163
-
-
0033743163
-
Secure border gateway protocol (S-BGP)
-
K.
-
S. Kent, C. Lynn, K. Seo K. Secure Border Gateway Protocol (S-BGP). IEEE J of Selected Areas of Comm. (JSAC), Vol. 18, no. 4, pp. 582-592, 2000.
-
(2000)
IEEE J of Selected Areas of Comm. (JSAC)
, vol.18
, Issue.4
, pp. 582-592
-
-
Kent, S.1
Lynn, C.2
Seo, K.3
-
164
-
-
84966276701
-
Intrusion detection for link state routing protocol through integrated network management
-
Boston (MA)
-
F. Wang, F. Gong, F.S. Wu, R. Narayan. Intrusion Detection for Link State Routing Protocol Through Integrated Network Management. In Proc. ICCCN, Boston (MA), pp. 694-699, 1999.
-
(1999)
Proc. ICCCN
, pp. 694-699
-
-
Wang, F.1
Gong, F.2
Wu, F.S.3
Narayan, R.4
-
167
-
-
84890002512
-
An efficient algorithm for routing update detection & recovery in distance vector protocols
-
Alaska
-
A. Chakrabarti, G. Manimaran. An Efficient Algorithm for Routing Update Detection & Recovery in Distance Vector Protocols. In Proc. ICC, Alaska, 2003.
-
(2003)
Proc. ICC
-
-
Chakrabarti, A.1
Manimaran, G.2
-
168
-
-
0031120164
-
Multipoint communications: A survey of protocols, functions and mechanisms
-
C. Diot, W. Dabbous, J. Crowcroft. Multipoint communications: A survey of protocols, functions and mechanisms. IEEE J. Select. Areas Communications (JSAC), Vol. 15, no. 3, pp. 277-290, 1997.
-
(1997)
IEEE J. Select. Areas Communications (JSAC)
, vol.15
, Issue.3
, pp. 277-290
-
-
Diot, C.1
Dabbous, W.2
Crowcroft, J.3
-
169
-
-
0033909171
-
Multicast routing and its QoS extension: Problems, algorithms and protocols
-
J. Hou, B. Wang. Multicast routing and its QoS extension: Problems, algorithms and Protocols. IEEE Networks, pp. 22-36, 2000.
-
(2000)
IEEE Networks
, pp. 22-36
-
-
Hou, J.1
Wang, B.2
-
170
-
-
0033900912
-
Multicast routing algorithms and protocols: A tutorial
-
L. Sahasrabuddhe, B. Mukherjee. Multicast routing algorithms and protocols: A tutorial. IEEE Network, pp. 90-102, 2000.
-
(2000)
IEEE Network
, pp. 90-102
-
-
Sahasrabuddhe, L.1
Mukherjee, B.2
-
171
-
-
0001901221
-
The multimedia multicasting problem
-
J.C. Pasquale, G.C. Polyzos, G. Xylomenos. The multimedia multicasting problem. Multimedia Systems, Vol. 6, no. 1, pp. 43-59, 1998.
-
(1998)
Multimedia Systems
, vol.6
, Issue.1
, pp. 43-59
-
-
Pasquale, J.C.1
Polyzos, G.C.2
Xylomenos, G.3
-
172
-
-
0002413598
-
Intra- and interdomain multicast routing protocols: A survey and taxonomy
-
M. Ramalho. Intra- and Interdomain multicast routing protocols: A survey and taxonomy. IEEE Communications Surveys and Tutorials, Vol. 3, no. 1, pp. 2-25, 2000.
-
(2000)
IEEE Communications Surveys and Tutorials
, vol.3
, Issue.1
, pp. 2-25
-
-
Ramalho, M.1
-
174
-
-
0030609312
-
Iolus: A framework for scalable secure multicasting
-
Cannes (France)
-
S. Mittra. Iolus: A Framework for Scalable Secure Multicasting. In Proc. ACM SIGCOMM, Cannes (France), pp. 277-288, 1997.
-
(1997)
Proc. ACM SIGCOMM
, pp. 277-288
-
-
Mittra, S.1
-
175
-
-
84961917665
-
Key establishment for IGMP authentication in IP multicast
-
Colmar (France)
-
T. Hardjono, B. Cain. Key establishment for IGMP authentication in IP multicast. In Proc. IEEE ECUMN, Colmar (France), 2000.
-
(2000)
Proc. IEEE ECUMN
-
-
Hardjono, T.1
Cain, B.2
-
176
-
-
0003308056
-
Scalable multicast key distribution
-
A. Ballardie. Scalable Multicast Key Distribution. RFC 1949, 1996.
-
(1996)
RFC 1949
-
-
Ballardie, A.1
-
177
-
-
0033204997
-
KHIP - A scalable protocol for secure multicast routing
-
Cambridge (MA)
-
C. Shields, J.J. Garcia-Luna-Aceves. KHIP - A Scalable Protocol for Secure Multicast Routing. In Proc. ACM SIGCOMM, Cambridge (MA), pp. 53-64, 1999.
-
(1999)
Proc. ACM SIGCOMM
, pp. 53-64
-
-
Shields, C.1
Garcia-Luna-Aceves, J.J.2
-
179
-
-
0033893174
-
Secure group communications using key graphs
-
C. Wong, M. Gouda, S. Lam. Secure Group Communications Using Key Graphs. IEEE/ACM Trans. On Networking (ToN), Vol. 8, issue 1, pp. 16-30, 1998.
-
(1998)
IEEE/ACM Trans. on Networking (ToN)
, vol.8
, Issue.1
, pp. 16-30
-
-
Wong, C.1
Gouda, M.2
Lam, S.3
-
180
-
-
0006513010
-
Reliable group rekey: A performance analysis
-
San Diego (CA)
-
Y.R. Yand, X.S. Li, X.B. Zhang, S.S. Lam. Reliable Group Rekey: A Performance Analysis. In Proc. ACM SIGCOMM, San Diego (CA), pp. 27-38, 2001.
-
(2001)
Proc. ACM SIGCOMM
, pp. 27-38
-
-
Yand, Y.R.1
Li, X.S.2
Zhang, X.B.3
Lam, S.S.4
-
181
-
-
84889351757
-
How to sign digital streams
-
Santa Barbara (CA), Springer-Verlag
-
R. Gennaro, P. Rahtogi. How to sign digital streams. In Proc. CRYPTO, Santa Barbara (CA), Springer-Verlag, pp. 180-197, 1997.
-
(1997)
Proc. CRYPTO
, pp. 180-197
-
-
Gennaro, R.1
Rahtogi, P.2
-
182
-
-
0032594123
-
Digital signatures for flows and multicasts
-
C.K. Wong. Digital Signatures for Flows and Multicasts. IEEE/ACM Trans. on Networking, Vol. 7, no. 4, pp. 502-513, 1999.
-
(1999)
IEEE/ACM Trans. on Networking
, vol.7
, Issue.4
, pp. 502-513
-
-
Wong, C.K.1
-
183
-
-
4344573426
-
Integrating wireless sensor networks into the grid
-
M. Gaynor, S. Moulton, M. Welsh, E. LaCombe, A. Rowan, J. Wynne. Integrating Wireless Sensor Networks into the Grid. IEEE Internet Computing, Vol. 8, no. 4, pp. 32-39, 2004.
-
(2004)
IEEE Internet Computing
, vol.8
, Issue.4
, pp. 32-39
-
-
Gaynor, M.1
Moulton, S.2
Welsh, M.3
LaCombe, E.4
Rowan, A.5
Wynne, J.6
-
184
-
-
84890009675
-
Hourglass: A stream-based overlay network for sensor applications
-
P. Pietzuch, J. Shneidman, J. Ledlie, M. Welsh, M. Seltzer, M. Roussopoulos. Hourglass: A Stream-Based Overlay Network for Sensor Applications. Harvard Industrial Partnership (HIP'04), 2004.
-
(2004)
Harvard Industrial Partnership (HIP'04)
-
-
Pietzuch, P.1
Shneidman, J.2
Ledlie, J.3
Welsh, M.4
Seltzer, M.5
Roussopoulos, M.6
-
185
-
-
0003597249
-
Wormhole detection in wireless ad hoc networks
-
Department of Computer Science, Rice University
-
Y.C. Hu, A. Perrig, D.B. Johnson. Wormhole detection in wireless ad hoc networks. Tech. Rep. TR01-384, Department of Computer Science, Rice University, 2002.
-
(2002)
Tech. Rep. TR01-384
-
-
Hu, Y.C.1
Perrig, A.2
Johnson, D.B.3
-
186
-
-
0036738266
-
SPINS: Security protocols for sensor networks
-
D.
-
A. Perrig, P. Szewczyk, J.D. Tygar, V. Wen, D. Culler D. SPINS: Security Protocols for Sensor Networks. Wireless Networks, Vol. 8, no. 5, pp. 521-534, 2002.
-
(2002)
Wireless Networks
, vol.8
, Issue.5
, pp. 521-534
-
-
Perrig, A.1
Szewczyk, P.2
Tygar, J.D.3
Wen, V.4
Culler, D.5
-
187
-
-
26444574670
-
TinySec: A link layer security architecture for wireless sensor networks
-
Baltimore (MD)
-
C. Karlof, N. Sastry, D. Wagner. TinySec: A Link Layer Security Architecture for Wireless Sensor Networks. In Proc. ACM SenSys, Baltimore (MD), 2004.
-
(2004)
Proc. ACM SenSys
-
-
Karlof, C.1
Sastry, N.2
Wagner, D.3
-
188
-
-
50149104236
-
Head-to-toe evaluation of high performance sockets over protocol offload engines
-
Cardiff (Wales)
-
P. Balaji, W. Feng, Q. Gao, R. Noronha, W. Yu, D.K. Panda. Head-to-Toe Evaluation of High Performance Sockets over Protocol Offload Engines. In Proc. Cluster Computing and Grid (CCGrid), Cardiff (Wales), 2005.
-
(2005)
Proc. Cluster Computing and Grid (CCGrid)
-
-
Balaji, P.1
Feng, W.2
Gao, Q.3
Noronha, R.4
Yu, W.5
Panda, D.K.6
-
189
-
-
0006290405
-
Challenges and new technologies for addressing security in high performance distributed environments
-
Arlington (Virginia)
-
R. Dimitrov, M. Gleeson. Challenges and New Technologies for Addressing Security in High Performance Distributed Environments. In Proc. of the 21st National Information Systems Security Conference, Arlington (Virginia), pp. 457-468, 1998.
-
(1998)
Proc. of the 21st National Information Systems Security Conference
, pp. 457-468
-
-
Dimitrov, R.1
Gleeson, M.2
-
190
-
-
33746298446
-
Security enhancements in infiniband architecture
-
Denver (CO)
-
M. Lee, E.J. Kim, M. Yousif. Security Enhancements in Infiniband Architecture. In Proc. IPDPS, Denver (CO), 2005.
-
(2005)
Proc. IPDPS
-
-
Lee, M.1
Kim, E.J.2
Yousif, M.3
-
191
-
-
27744489607
-
CYSEP - A cyber security processor for 10 gbps networks and beyond
-
Monterey (CA)
-
H.J. Chao, R. Karri, W.C. Lau. CYSEP - A Cyber Security Processor for 10 Gbps Networks and Beyond. In IEEE MILCOM, Monterey (CA), pp. 1114-1122, 2004.
-
(2004)
IEEE MILCOM
, pp. 1114-1122
-
-
Chao, H.J.1
Karri, R.2
Lau, W.C.3
-
192
-
-
84889957412
-
Credential wallets: A classification of credential repositories, highlighting MyProxy
-
Arlington (Virginia)
-
st Annual TPRC, Research Conference on Communication, Information, and Internet Policy, Arlington (Virginia), 2006.
-
(2006)
st Annual TPRC, Research Conference on Communication, Information, and Internet Policy
-
-
Basney, J.1
Yurcik, W.2
Bonilla, R.3
Slagell, A.4
-
194
-
-
84889987435
-
Securely available credentials (SACRED) - Credential server framework
-
D. Gustafson, M. Just, M. Nystrom. Securely Available Credentials (SACRED) - Credential Server Framework. IETF RFC 3760, 2004.
-
(2004)
IETF RFC 3760
-
-
Gustafson, D.1
Just, M.2
Nystrom, M.3
-
195
-
-
84889965701
-
An introduction to smart cards
-
S. Petri. An Introduction to Smart Cards. Messaging Magazine, Sep. Issue, 1999.
-
(1999)
Messaging Magazine
, Issue.SPEC. ISSUE
-
-
Petri, S.1
-
196
-
-
0007608299
-
Breaking up is hard to do: Modeling security threats for smart cards
-
Chicago (IL)
-
B. Schneier, A. Shostack. Breaking Up is Hard to Do: Modeling Security Threats for Smart Cards. In USENIX Workshop on Smart Card Technology, Chicago (IL), pp. 175-185, 1999.
-
(1999)
USENIX Workshop on Smart Card Technology
, pp. 175-185
-
-
Schneier, B.1
Shostack, A.2
-
197
-
-
4544363068
-
Password-enabled PKI: Virtual smartcards versus virtual soft tokens
-
R. Sandhu, M. Bellare, R. Ganesan. Password-Enabled PKI: Virtual Smartcards versus Virtual Soft Tokens. In 1st Annual PKI Workshop, pp. 89-96, 2002.
-
(2002)
1st Annual PKI Workshop
, pp. 89-96
-
-
Sandhu, R.1
Bellare, M.2
Ganesan, R.3
-
198
-
-
22144453211
-
The MyProxy online credential repository
-
J. Basney, M. Humphrey, V. Welch. The MyProxy Online Credential Repository. IEEE Software Practice and Experience, Vol. 35, issue 9, pp. 801-816, 2005.
-
(2005)
IEEE Software Practice and Experience
, vol.35
, Issue.9
, pp. 801-816
-
-
Basney, J.1
Humphrey, M.2
Welch, V.3
-
204
-
-
0001698236
-
Cooperation and trust: Some theoretical notes
-
M. R. Jones, Nebraska University Press
-
M. Deutsch. Cooperation and Trust: Some Theoretical Notes. Nebraska Symposium on Motivation, M. R. Jones, Nebraska University Press, pp. 279-319, 1962.
-
(1962)
Nebraska Symposium on Motivation
, pp. 279-319
-
-
Deutsch, M.1
-
207
-
-
0009481412
-
A survey of trust in internet applications
-
T. Grandison, M. Sloman. A Survey Of Trust in Internet Applications. IEEE Communications Surveys, Vol. 3, no. 4, pp. 2-16, 2000.
-
(2000)
IEEE Communications Surveys
, vol.3
, Issue.4
, pp. 2-16
-
-
Grandison, T.1
Sloman, M.2
-
208
-
-
33646702918
-
A survey of trust management and resource discovery technologies in peer-to-peer applications
-
G. Suryanarayan, R.N. Taylor. A Survey of Trust Management and Resource Discovery Technologies in Peer-to-Peer Applications. ISR Technical Report, UCI-ISR-04-6, 2004.
-
(2004)
ISR Technical Report, UCI-ISR-04-6
-
-
Suryanarayan, G.1
Taylor, R.N.2
-
210
-
-
69949178749
-
A classification scheme for trust functions in reputation-based trust management
-
Hiroshima (Japan)
-
Q. Zhang, T. Yu, K. Irwin. A Classification Scheme for Trust Functions in Reputation-Based Trust Management. Workshop on Trust, Security, and Reputation on the Semantic Web, Hiroshima (Japan), 2004.
-
(2004)
Workshop on Trust, Security, and Reputation on the Semantic Web
-
-
Zhang, Q.1
Yu, T.2
Irwin, K.3
-
219
-
-
3142738238
-
PeerTrust: Supporting reputation-based trust for peer-to-peer electronic communities
-
L. Xiong, L. Liu. PeerTrust: Supporting Reputation-Based Trust for Peer-to-Peer Electronic Communities. IEEE Transactions of Knowledge and Data Engineering, Vol. 16, no. 7, pp. 179-194, 2004.
-
(2004)
IEEE Transactions of Knowledge and Data Engineering
, vol.16
, Issue.7
, pp. 179-194
-
-
Xiong, L.1
Liu, L.2
-
220
-
-
34547509462
-
P-grid: A self-organizing access structure for P2P information systems
-
Springer-Verlag
-
K. Aberer. P-Grid: A Self-Organizing Access Structure for P2P Information Systems. In Proc. Ninth Int'l Conf. Cooperative Information Systems, Springer-Verlag, pp. 179-194, 2001.
-
(2001)
Proc. Ninth Int'l Conf. Cooperative Information Systems
, pp. 179-194
-
-
Aberer, K.1
-
221
-
-
57349142855
-
Pastry: Scalable, decentralized object location and routing for large-scale peer-to-peer systems
-
Heidelberg (Germany), SpringerVerlag
-
A. Rowstron, P. Druschel. Pastry: Scalable, Decentralized Object Location and Routing for Large-Scale Peer-to-Peer Systems. In Proc. IFIP/ACM Intl. Conf. on Dist. Systems and Platforms, Heidelberg (Germany), SpringerVerlag, pp. 329-350, 2001.
-
(2001)
Proc. IFIP/ACM Intl. Conf. on Dist. Systems and Platforms
, pp. 329-350
-
-
Rowstron, A.1
Druschel, P.2
-
226
-
-
35048858013
-
Fuzzy trust integration for security enforcement in grid computing
-
Wuhan (China)
-
S. Song, K. Hwang, M. Macwan. Fuzzy Trust Integration for Security Enforcement in Grid Computing. In Proc. NPC, Wuhan (China), pp. 9-21, 2004.
-
(2004)
Proc. NPC
, pp. 9-21
-
-
Song, S.1
Hwang, K.2
Macwan, M.3
-
227
-
-
28844464697
-
Trusted grid computing with security binding and trust integration
-
S. Song, K. Hwang, Y.K. Kwok. Trusted Grid Computing with Security Binding and Trust Integration. Journal of Grid Computing, Vol. 3, no. 1, pp. 24-34, 2005.
-
(2005)
Journal of Grid Computing
, vol.3
, Issue.1
, pp. 24-34
-
-
Song, S.1
Hwang, K.2
Kwok, Y.K.3
-
229
-
-
0442283424
-
Representing e-business rules for the semantic web: Situated courteous logic programs in RuleML
-
New Orleans (LA)
-
B. Grosof. Representing e-business rules for the semantic web: Situated courteous logic programs in RuleML. In Proceedings of the Workshop on Information Technologies and Systems (WITS), New Orleans (LA), 2001.
-
(2001)
Proceedings of the Workshop on Information Technologies and Systems (WITS)
-
-
Grosof, B.1
-
230
-
-
0442330459
-
SweetDeal: Representing agent contracts with exceptions using XML rules, ontologies, and process descriptions
-
B Budapest (Hungary)
-
B. Grosof B, T. Poon. SweetDeal: Representing agent contracts with exceptions using XML rules, ontologies, and process descriptions. In WWW12, Budapest (Hungary), 340-349, 2003.
-
(2003)
WWW12
, pp. 340-349
-
-
Grosof, B.1
Poon, T.2
-
232
-
-
0034826560
-
Dynamically distributed query evaluation
-
Santa Barbara (CA)
-
J. Trevor, D. Suciu. Dynamically distributed query evaluation. In PODS, Santa Barbara (CA), pp. 28-39, 2001.
-
(2001)
PODS
, pp. 28-39
-
-
Trevor, J.1
Suciu, D.2
-
233
-
-
0036871183
-
Negotiating trust on the web
-
M. Winslett, T. Yu, K.E. Seamons, A. Hess, J. Jacobson, R. Jarvis, B. Smith, L. Yu. Negotiating Trust on the Web. IEEE Internet Computing, Vol. 7, no. 6, pp. 45-52, 2002.
-
(2002)
IEEE Internet Computing
, vol.7
, Issue.6
, pp. 45-52
-
-
Winslett, M.1
Yu, T.2
Seamons, K.E.3
Hess, A.4
Jacobson, J.5
Jarvis, R.6
Smith, B.7
Yu, L.8
-
234
-
-
85180810679
-
Advanced client/server authentication in TLS
-
A. Hess, J. Jacobson, H. Mills, R. Wamsley, K.E. Seamons, B. Smith. Advanced client/server authentication in TLS. In NDSS, 2002.
-
(2002)
NDSS
-
-
Hess, A.1
Jacobson, J.2
Mills, H.3
Wamsley, R.4
Seamons, K.E.5
Smith, B.6
-
235
-
-
84889995011
-
Negotiation trust on the grid
-
NY
-
J. Basney, W. Nejdl, D. Olmedilla, V. Welch, M. Winslett. Negotiation Trust on the Grid. In Workshop on Semantics in P2P and Grid Computing, NY, 2004.
-
(2004)
Workshop on Semantics in P2P and Grid Computing
-
-
Basney, J.1
Nejdl, W.2
Olmedilla, D.3
Welch, V.4
Winslett, M.5
-
237
-
-
10444275500
-
Monitoring distributed systems (A survey)
-
Imperial College, London
-
M. Mansouri-Samani. Monitoring Distributed Systems (A Survey). Tech. Rep., DOC92/23, Imperial College, London, 1992.
-
(1992)
Tech. Rep., DOC92/23
-
-
Mansouri-Samani, M.1
-
238
-
-
0002587301
-
Monitoring distributed systems
-
M. Mansouri-Samani, M. Sloman. Monitoring distributed systems. IEEE Network, Vol. 7, no. 6, pp. 20-30, 1993.
-
(1993)
IEEE Network
, vol.7
, Issue.6
, pp. 20-30
-
-
Mansouri-Samani, M.1
Sloman, M.2
-
239
-
-
4644359568
-
A grid monitoring architecture
-
Global Grid Forum, August
-
B. Tierney, R. Aydt, D. Gunter, W. Smith, M. Swany, V. Taylor, R. Wolski. A Grid Monitoring Architecture, GWDPerf. 16-3, Global Grid Forum, August 2002.
-
(2002)
GWDPerf
, vol.16
, Issue.3
-
-
Tierney, B.1
Aydt, R.2
Gunter, D.3
Smith, W.4
Swany, M.5
Taylor, V.6
Wolski, R.7
-
241
-
-
84889971607
-
Protocol operations for version2 of the simple network management protocol (SNMP)
-
J. Case, M. McCloghrie, M. Rose, S. Waldrusser. Protocol Operations for Version2 of the Simple Network Management Protocol (SNMP). IETF RFC 1905, 1996.
-
(1996)
IETF RFC 1905
-
-
Case, J.1
McCloghrie, M.2
Rose, M.3
Waldrusser, S.4
-
242
-
-
84890008753
-
-
th July, 2006
-
th July, 2006.
-
-
-
-
243
-
-
84890007076
-
-
th July, 2006
-
th July, 2006.
-
-
-
-
244
-
-
84889977203
-
-
th, 2006
-
th, 2006.
-
-
-
-
245
-
-
84890005467
-
-
th, 2006
-
th, 2006.
-
Mon
-
-
-
246
-
-
84889961366
-
-
accessed on July 13th, 2006
-
Aide. http://sourceforge.net/projects/aide, accessed on July 13th, 2006.
-
Aide
-
-
-
247
-
-
84889970765
-
-
accessed on July 13th, 2006
-
Tripwire. http://sourceforge.net/projects/tripwire, accessed on July 13th, 2006.
-
Tripwire
-
-
-
248
-
-
3342966061
-
Ganglia distributed monitoring system: Design, implementation, and experience
-
M.L. Massie, B.N. Chun, B.E. Culler. Ganglia Distributed Monitoring System: Design, Implementation, and Experience. Parallel Computing, Vol. 30, pp. 817-840, 2004.
-
(2004)
Parallel Computing
, vol.30
, pp. 817-840
-
-
Massie, M.L.1
Chun, B.N.2
Culler, B.E.3
-
251
-
-
14244258507
-
Distributed computing in practice: The condor experience
-
D. Thain, T. Tannenbaum, M. Livny. Distributed Computing in Practice: The Condor Experience. Concurrency and Computation: Practice and Experience, Vol. 17, no. 2-4, pp. 323-356, 2005.
-
(2005)
Concurrency and Computation: Practice and Experience
, vol.17
, Issue.2-4
, pp. 323-356
-
-
Thain, D.1
Tannenbaum, T.2
Livny, M.3
-
253
-
-
84889993251
-
Monitoring and discovery in web services framework: Functionalities and performance of globus toolkit's MDS4
-
J.M. Schopf, M.D. Arcy, N. Miller, L. Pearlman, I. Foster, C. Kasselman. Monitoring and Discovery in Web Services Framework: Functionalities and Performance of Globus Toolkit's MDS4. Tech. Report, #ANL/MCS-P1248-0405, 2005.
-
(2005)
Tech. Report, #ANL/MCS-P1248-0405
-
-
Schopf, J.M.1
Arcy, M.D.2
Miller, N.3
Pearlman, L.4
Foster, I.5
Kasselman, C.6
-
254
-
-
33845339628
-
Scalable enterprise level workflow and infrastructure management in a grid computing environment
-
Cardiff (Wales)
-
K. Gor, R.A. Dheepak, S. Ali, L.D. Alves, N. Arurkar, I. Gupta, A. Chakrabarti, A. Sharma, S. Sengupta. Scalable Enterprise Level Workflow and Infrastructure Management in a Grid Computing Environment. In Proc. Cluster Computing and Grid (CCGrid), Cardiff (Wales), pp. 661-667, 2005.
-
(2005)
Proc. Cluster Computing and Grid (CCGrid)
, pp. 661-667
-
-
Gor, K.1
Dheepak, R.A.2
Ali, S.3
Alves, L.D.4
Arurkar, N.5
Gupta, I.6
Chakrabarti, A.7
Sharma, A.8
Sengupta, S.9
-
255
-
-
84890005701
-
Issues about the integration of passive and active monitoring for grid networks
-
Pisa (Italy)
-
S. Andreozzi, D. Antoniades, A. Ciuffoletti, A. Ghiselli, E.P. Markatos, M. Polychronakis, P. Trimintzios. Issues about the Integration of Passive and Active Monitoring for Grid Networks. In Proc. CoreGrid Integration Workshop, Pisa (Italy), 2005.
-
(2005)
Proc. CoreGrid Integration Workshop
-
-
Andreozzi, S.1
Antoniades, D.2
Ciuffoletti, A.3
Ghiselli, A.4
Markatos, E.P.5
Polychronakis, M.6
Trimintzios, P.7
-
256
-
-
84942307718
-
A performance study of monitoring and information services for distributed systems
-
IEEE Computer Society Press, Seattle (WA)
-
X. Zhang, J. Freschl, J. Schopf. A performance study of monitoring and information services for distributed systems. In Proc. of the 12th IEEE High Performance Distributed Computing (HPDC), IEEE Computer Society Press, Seattle (WA), pp. 270-282, 2003.
-
(2003)
Proc. of the 12th IEEE High Performance Distributed Computing (HPDC)
, pp. 270-282
-
-
Zhang, X.1
Freschl, J.2
Schopf, J.3
-
257
-
-
10444251156
-
A taxonomy of grid monitoring systems
-
S. Zalikonas, R. Sakellariou. A Taxonomy of Grid Monitoring Systems. In FGCS, Vol. 21, issue 1, pp. 163-188, 2004.
-
(2004)
FGCS
, vol.21
, Issue.1
, pp. 163-188
-
-
Zalikonas, S.1
Sakellariou, R.2
-
258
-
-
84889962869
-
The role of IT monitoring, alerting, and reporting in satisfying serbanes-oxley requirements
-
TNT Systems
-
TNT Systems. The Role of IT Monitoring, Alerting, and Reporting in Satisfying Serbanes-Oxley Requirements. TNT White Paper, 2005.
-
(2005)
TNT White Paper
-
-
-
260
-
-
84889974243
-
Security in multidomain grid environments
-
Kluwer Academic Press
-
L.A. Cornwall, J. Jensen, D.P. Kelsey, A. Frohner, D. Kouril, F. Bonnassieux, S. Nicoud, J. Hahkala, M. Silander, R. Cecchini, V. Ciaschini, L. dell'Agnello F. Spataro, D. O'Callaghan, O. Mulmo, G.L. Volpato, D. Groep, M. Steenbakkers, A. McNab. Security in Multidomain Grid Environments. In Journal of Grid Computing, Kluwer Academic Press, 2004.
-
(2004)
Journal of Grid Computing
-
-
Cornwall, L.A.1
Jensen, J.2
Kelsey, D.P.3
Frohner, A.4
Kouril, D.5
Bonnassieux, F.6
Nicoud, S.7
Hahkala, J.8
Silander, M.9
Cecchini, R.10
Ciaschini, V.11
Dell'Agnello, L.12
Spataro, F.13
O'Callaghan, D.14
Mulmo, O.15
Volpato, G.L.16
Groep, D.17
Steenbakkers, M.18
McNab, A.19
-
261
-
-
0037623983
-
Identity based encryption from the weil pairing
-
D. Boneh, and M. Franklin. Identity based Encryption from the Weil Pairing. SIAM J. of Computing, Vol. 32, no. 3. pp. 586-615, 2003.
-
(2003)
SIAM J. of Computing
, vol.32
, Issue.3
, pp. 586-615
-
-
Boneh, D.1
Franklin, M.2
-
262
-
-
0001827537
-
Identity-based cryptosystems and signature schemes
-
A. Shamir. Identity-based Cryptosystems and Signature Schemes. In Proc. CRYPTO, pp. 47-53, 1984.
-
(1984)
Proc. CRYPTO
, pp. 47-53
-
-
Shamir, A.1
-
264
-
-
84889980515
-
-
th July, 2006
-
th July, 2006.
-
-
-
-
266
-
-
0031077602
-
CORBA: Integrating diverse applications within distributed heterogeneous environments
-
S. Vinoski. CORBA: Integrating Diverse Applications Within Distributed Heterogeneous Environments. IEEE Communications Magazine, Vol. 14, no. 2, pp. 46-55, 1997.
-
(1997)
IEEE Communications Magazine
, vol.14
, Issue.2
, pp. 46-55
-
-
Vinoski, S.1
-
267
-
-
0003407768
-
-
st Ed., O'Reilly Publishers
-
st Ed., O'Reilly Publishers, 2001.
-
(2001)
Java RMI
-
-
Grosso, W.1
-
270
-
-
0142154760
-
-
O'Reilley, ISBN: 0596004206
-
E.T. Ray. Learning XML, O'Reilley, ISBN: 0596004206, 2001.
-
(2001)
Learning XML
-
-
Ray, E.T.1
-
271
-
-
0003355701
-
Hypertext transfer protocol - HTTP 1.1
-
R. Fielding, J. Gettys, J. Mogul, H. Frystyk, L. Masintere, P. Leach, T. Berners-Lee. Hypertext Transfer Protocol - HTTP 1.1. IETF RFC 2616, 1999.
-
(1999)
IETF RFC 2616
-
-
Fielding, R.1
Gettys, J.2
Mogul, J.3
Frystyk, H.4
Masintere, L.5
Leach, P.6
Berners-Lee, T.7
-
272
-
-
4544381883
-
SOAP version 1.2, Part 0: Primer
-
N. Mitra (Ed). SOAP Version 1.2, Part 0: Primer. W3C Recommendations, 2003.
-
(2003)
W3C Recommendations
-
-
Mitra, N.1
-
274
-
-
84889989377
-
-
Computer Associates ®, IBM®, Microsoft®, Oracle®, SAP®, SeeBeyond Technologies®, Systinet®, and Others OASIS Standard
-
Computer Associates ®, IBM®, Microsoft®, Oracle®, SAP®, SeeBeyond Technologies®, Systinet®, and Others. UDDI v. 3.0. OASIS Standard, 2005.
-
(2005)
UDDI V. 3.0
-
-
-
281
-
-
34648851578
-
-
OASIS Specification accessed on July 13th, 2006
-
S. Anderson, J. Bohren, T. Boubez, et al. Web Services Secure Conversation Language (WS-SecureConversation). OASIS Specification, 2005, available at http://specs.xmlsoap.org/ws/2005/02/sc/WS-SecureConversation.pdf, accessed on July 13th, 2006.
-
(2005)
Web Services Secure Conversation Language (WS-SecureConversation)
-
-
Anderson, S.1
Bohren, J.2
Boubez, T.3
|