Subject
Computer Networks and Communications,Hardware and Architecture,Software
Reference23 articles.
1. A national-scale authentication infrastructure;Butler;IEEE Comput,2000
2. K. Czajkowski, S. Fitzgerald, I. Foster, C. Kesselman, Grid information services for distributed resource sharing, in: Proceedings of the 10th IEEE International Symposium on High Performance Distributed Computing (HPDC), August 2001, pp. 181–194.
3. K. Czajkowski, I. Foster, N. Karonis, C. Kesselman, S. Martin, W. Smith, S. Tuecke, A resource management architecture for metacomputing systems, in: Proceedings of the Fourth Workshop on Job Scheduling Strategies for Parallel Processing at IPPS/SPDP’98, March 1998, pp. 62–82.
4. D. Ferraiolo, R. Kuhn, Role-based access control, in: Proceedings of the 15th National Computer Security Conference, October 1992, pp. 554–563.
5. S. Fitzgerald, I. Foster, C. Kesselman, G. von Laszewski, W. Smith, S. Tuecke, A directory service for configuring high-performance distributed computations, in: Proceedings of the Sixth IEEE Symposium on High Performance Distributed Computing (HPDC), August 1997, pp. 365–375.
Cited by
4 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献