메뉴 건너뛰기




Volumn 2003-January, Issue , 2003, Pages 194-204

Using views for customizing reusable components in component-based frameworks

Author keywords

Access control; Application software; Authentication; Authorization; Communication switching; Computer science; Cryptography; Energy management; Power system management; Runtime

Indexed keywords

APPLICATION PROGRAMS; AUTHENTICATION; COMPUTER CONTROL SYSTEMS; COMPUTER SCIENCE; COMPUTER SOFTWARE REUSABILITY; CRYPTOGRAPHY; DISTRIBUTED COMPUTER SYSTEMS; ELECTRIC SWITCHBOARDS; ENERGY MANAGEMENT;

EID: 84942314325     PISSN: 10828907     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/HPDC.2003.1210029     Document Type: Conference Paper
Times cited : (3)

References (34)
  • 1
    • 84942356096 scopus 로고    scopus 로고
    • A practical distributed authorization system for GARA
    • Center for Information Technology Integration, University of Michigan
    • W. Adamson and O. Kornievskaia. A Practical Distributed Authorization System for GARA. Technical Report 01-14, Center for Information Technology Integration, University of Michigan, 2001.
    • (2001) Technical Report 01-14
    • Adamson, W.1    Kornievskaia, O.2
  • 3
    • 84958048748 scopus 로고    scopus 로고
    • Compliance checking in the policymaker trust management system
    • M. Blaze, J. Feigenbaum, and M. Strauss. Compliance checking in the policymaker trust management system. In Financial Cryptography, pages 254-274, 1998.
    • (1998) Financial Cryptography , pp. 254-274
    • Blaze, M.1    Feigenbaum, J.2    Strauss, M.3
  • 4
    • 12444294228 scopus 로고    scopus 로고
    • Active streams: An approach to adaptive distributed systems
    • F. Bustamante and K. Schwan. Active Streams: An Approach to Adaptive Distributed Systems. In HotOS, 2001.
    • (2001) HotOS
    • Bustamante, F.1    Schwan, K.2
  • 5
    • 84942356097 scopus 로고    scopus 로고
    • DRBAC: Distributed role-based access control for dynamic coalition environments
    • E. Freudenthal et al. dRBAC: Distributed Role-based Access Control for Dynamic Coalition Environments. In ICDCS, 2001.
    • (2001) ICDCS
    • Freudenthal, E.1
  • 6
    • 84942356098 scopus 로고    scopus 로고
    • Switchboard: Secure, monitored connections for client-server communication
    • E. Freudenthal et al. Switchboard: Secure, Monitored Connections for Client-Server Communication. In RESH, 2002.
    • (2002) RESH
    • Freudenthal, E.1
  • 8
    • 84956859986 scopus 로고    scopus 로고
    • A flexible security system for metacomputing environments
    • A. Ferrari, F. Knabe, M. Humphrey, S. Chapin, and A. Grimshaw. A Flexible Security System for Metacomputing Environments. In HPCN, pages 370-380, 1999.
    • (1999) HPCN , pp. 370-380
    • Ferrari, A.1    Knabe, F.2    Humphrey, M.3    Chapin, S.4    Grimshaw, A.5
  • 10
    • 0032218229 scopus 로고    scopus 로고
    • A security architecture for computational grids
    • I. T. Foster, C. Kesselman, G. Tsudik, and S. Tuecke. A security architecture for computational grids. In ACM CCS, pages 83-92, 1998.
    • (1998) ACM CCS , pp. 83-92
    • Foster, I.T.1    Kesselman, C.2    Tsudik, G.3    Tuecke, S.4
  • 12
    • 84945272430 scopus 로고    scopus 로고
    • CANS: Composable, adaptive network services infrastructure
    • X. Fu, W. Shi, A. Akkerman, and V. Karamcheti. CANS: Composable, Adaptive Network Services Infrastructure. USITS, 2001.
    • (2001) USITS
    • Fu, X.1    Shi, W.2    Akkerman, A.3    Karamcheti, V.4
  • 13
    • 0003313661 scopus 로고    scopus 로고
    • Java security: Present and near future
    • L. Gong. Java security: present and near future. IEEE Micro, 17(3):14-19, 1997.
    • (1997) IEEE Micro , vol.17 , Issue.3 , pp. 14-19
    • Gong, L.1
  • 14
    • 0032625454 scopus 로고    scopus 로고
    • Wide-area computing: Resource sharing on a large scale
    • A. Grimshaw, A. Ferrari, F. Knabe, and M. Humphrey. Wide-Area Computing: Resource Sharing on a Large Scale. Computer, 32(5):29-37, 1999.
    • (1999) Computer , vol.32 , Issue.5 , pp. 29-37
    • Grimshaw, A.1    Ferrari, A.2    Knabe, F.3    Humphrey, M.4
  • 16
    • 84949192371 scopus 로고    scopus 로고
    • Partitionable services: A framework for seamlessly adapting distributed applications to heterogenous environments
    • A. Ivan, J. Harman, M. Allen, and V. Karamcheti. Partitionable Services: A Framework for Seamlessly Adapting Distributed Applications to Heterogenous Environments. In HPDC, 2002.
    • (2002) HPDC
    • Ivan, A.1    Harman, J.2    Allen, M.3    Karamcheti, V.4
  • 17
  • 18
    • 84947218130 scopus 로고    scopus 로고
    • Constrained component deployment in wide-area networks using AI planning techniques
    • T. Kichkaylo, A. Ivan, and V. Karamcheti. Constrained Component Deployment in Wide-Area Networks Using AI Planning Techniques. In IPDPS, 2003.
    • (2003) IPDPS
    • Kichkaylo, T.1    Ivan, A.2    Karamcheti, V.3
  • 21
  • 22
    • 17144404242 scopus 로고    scopus 로고
    • Object views: Language support for intelligent object caching in parallel and distributed computations
    • I. Lipkind, I. Pechtchanski, and V. Karamcheti. Object Views: Language Support for Intelligent Object Caching in Parallel and Distributed Computations. In OOPSLA, pages 447-460, 1999.
    • (1999) OOPSLA , pp. 447-460
    • Lipkind, I.1    Pechtchanski, I.2    Karamcheti, V.3
  • 23
    • 12444319716 scopus 로고    scopus 로고
    • Support for interactive heavyweight services
    • J. Lopez and D. O'Hallaron. Support for Interactive Heavyweight Services. In HPDC, 2001.
    • (2001) HPDC
    • Lopez, J.1    O'Hallaron, D.2
  • 25
    • 12444335060 scopus 로고    scopus 로고
    • Object Management Group. CORBA Component Model. http://www.omg.org/, 2003.
    • (2003) CORBA Component Model
  • 26
    • 0034502932 scopus 로고    scopus 로고
    • A national-scale authentication infrastructure
    • R. Butler et al. A National-Scale Authentication Infrastructure. IEEE Computer, 33(12):60-66, 2000.
    • (2000) IEEE Computer , vol.33 , Issue.12 , pp. 60-66
    • Butler, R.1
  • 28
    • 85094635733 scopus 로고    scopus 로고
    • An architecture for a secure service discovery service
    • S. Czerwinski et al. An architecture for a secure service discovery service. In Mobile Computing and Networking, pages 24-35, 1999.
    • (1999) Mobile Computing and Networking , pp. 24-35
    • Czerwinski, S.1
  • 32
    • 3342902457 scopus 로고
    • A new model of security for distributed systems
    • CS Department, University of Virginia
    • W. Wulf, C. Wang, and D. Kienzle. A New Model of Security for Distributed Systems. Technical Report CS-95-34, CS Department, University of Virginia, 1995.
    • (1995) Technical Report CS-95-34
    • Wulf, W.1    Wang, C.2    Kienzle, D.3
  • 33
    • 84981249592 scopus 로고    scopus 로고
    • Eager handlers - Communication optimization in Java-based distributed applications with reconfigurable fine-grained code migration
    • D. Zhou and K. Schwan. Eager Handlers - Communication Optimization in Java-based Distributed Applications with Reconfigurable Fine-grained Code Migration. 3rd Intl. Workshop on Java for Parallel and Distributed Computing, 2001.
    • (2001) 3rd Intl. Workshop on Java for Parallel and Distributed Computing
    • Zhou, D.1    Schwan, K.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.