1. Necula, G., Proof-carrying code, Conference Record of POPL’97: The 24th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, 1997, 106–119.
2. Lohr, H., Ramasamy, H.V., Sadeghi, A., Schulz, S., Schunter, M., and Stuble, C., Enhancing Grid Security Using Trusted Virtualization, Springer, 2007.
3. Yao, D., Adaptive firewalls for grid computing, in Informatics and Mathematical Modelling, Technical University of Denmark, 2005.
4. Kumar, M., Hanumanthappa, M., and Kumar, T.V.S., Intrusion detection system for grid computing using SNORT, IEEE 2012 International Conference on Computing, Communication and Applications, 2012, pp. 1–6.
5. Sciaba, A., Burke, S., Campana, S., Lanciotti, E., Litmaath, M., Lorenzo, P.M., Miccio, V., Nater, C., and Santinelli, R., Glite 3.2 User Guide, CERN, 2011.