Publisher
Springer Science and Business Media LLC
Subject
Computational Theory and Mathematics,Computer Science Applications,Hardware and Architecture,Theoretical Computer Science,Software
Reference16 articles.
1. Czajkowski K, Foster I, Karonis Net al. A resource management architecture for metacomputing systems. InProc. IPPS/SPDP '98 Workshop on Job Scheduling Strategies for Parallel Processing, 1998.
2. Ferrari A, Knabe F, Humphrey Met al. A flexible security system for metacomputing environments.High Performance Computing and Networking Europe, Apr., 1999.
3. Foster I, Kesselman C, Tsudik G, Tuecke S. A security architecture for computational grids. InProc. 5th ACM Conference on Computer and Communications Security, NY, 1998, pp.83–92.
4. Gheorghiu G, Ryutov T, Neuman B C. Authorization for metacomputing application. InProc. the 7th IEEE International Symposium on High Performance Distributed Computing, July 28–31, 1998.
5. International Standard, Evaluation Criteria for IT Security Part 1: Introduction and General Model ISO/IEC 15408-1, First Edition, Dec., 1999.
Cited by
3 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献