1. The anatomy of the grid: enabling scalable virtual organizations;Foster;IJHPCA,2001
2. Vulnerabilities leading to denial of services attacks in grid computing systems: a survey;Lee,2010
3. Classification of attacks on cryptographic protocols;Spalazzi,2009
4. Formal methods for cryptographic protocol analysis: emerging issues and trends;Meadows;IEEE Journal on Selected Areas in Communications,2003
5. Grid Computing Security;Chakrabarti,2007