|
Volumn 2002-January, Issue , 2002, Pages 47-54
|
Integrating trust into grid resource management systems
|
Author keywords
Access control; Authentication; Control systems; Cryptography; Grid computing; Performance evaluation; Processor scheduling; Resource management; Scheduling algorithm; Security
|
Indexed keywords
ACCESS CONTROL;
AUTHENTICATION;
CONTROL SYSTEMS;
CRYPTOGRAPHY;
NATURAL RESOURCES MANAGEMENT;
RESOURCE ALLOCATION;
SCHEDULING;
SCHEDULING ALGORITHMS;
AUTHENTICATION MECHANISMS;
GRID COMPUTING SYSTEMS;
GRID RESOURCE MANAGEMENT;
PERFORMANCE EVALUATION;
PROCESSOR SCHEDULING;
RESOURCE MANAGEMENT;
SCHEDULING HEURISTICS;
SECURITY;
GRID COMPUTING;
|
EID: 84948464190
PISSN: 01903918
EISSN: None
Source Type: Conference Proceeding
DOI: 10.1109/ICPP.2002.1040858 Document Type: Conference Paper |
Times cited : (160)
|
References (13)
|