Information Technology Reference
In-Depth Information
3. K. Brodlie, D. Duce, J. Gallop, M. Sagar, J. Walton, and J. Wood, “Visualization
in grid computing environments,” in Proceedings of IEEE Visualization , Austin,
Texas, October 10-15, 2004, pp. 155-162.
4. H. Sun, W. Liu, T. Wo, and C. Hu, “CROWN Node Server: An enhanced grid
service container based on GT4 WSRF core,” in Proceedings of the Fifth
International Conference on Grid and Cooperative Computing Workshops ,
Changsha, China, October 21-23, 2006, pp. 510-517.
5. J. Huai, T. Wo, and Y. Liu, “Resource management and organization in
CROWN grid,” in Proceedings of the First International Conference on Scalable
Information Systems , 2006, p. 10.
6. J. Huai, H. Sun, C. Hu, Y. Zhu, Y. Liu, and J. Li, “ROST: Remote and hot serv-
ice deployment with trustworthiness in CROWN grid,” Future Generation
Computer Systems, 23 (6), 825-835, 2007.
7. J. Frey and T. Tannenbaum, “Condor-G: A computation management agent
for multi-institutional grids,” Journal of Cluster Computing , 5, 237, 2002.
8. W. Hong, M. Lim, E. Kim, J. Lee, and H. Park, “GAIS: Grid advanced infor-
mation service based on P2P mechanism,” in Proceedings of the 13th IEEE
International Symposium on High Performance Distributed Computing (HPDC-13) ,
Honolulu, Hawaii, June 4-6, 2004, pp. 276-277.
9. A. Iamnitchi, I. Foster, and D.C. Nurmi, “A peer-to-peer approach to resource
location in grid environments,” in Proceedings of the 11th IEEE International
Symposium on High Performance Distributed Computing (HPDC-11) , 2002.
10. R. Housley, W. Ford, T. Polk, and D. Solo, “Internet X.509 public key infra-
structure certii cate and CRL proi le,” IEEE Request for Comments (IEEE
RFC 2459), 1999.
11. S. Anderson, J. Bohren, and T. Boubez, “Web services secure conversation
language,” XMLSOAP.org Specii cations, specs.xmlsoap.org/ws/2004/04/
sc/ws-secureconversation.pdf, 2005.
12. J. Linn, “Generic security service application program interface, version 2,”
IEEE Request for Comments (IEEE RFC 2078), 1997.
13. J. Basney, M. Humphrey, and V. Welch, “The MyProxy online credential
repository,” Software: Practice and Experience , 35, 801-816, 2005.
14. S. Anderson, J. Bohren, and T. Boubez, “Web services trust language,”
XMLSOAP.org Specii cations, specs.xmlsoap.org/ws/2005/02/trust/WS-
Trust.pdf, 2005.
15. C. Neuman, T. Yu, S. Hartman, and K. Raeburn, “The Kerberos network
authentication service (V5),” IEEE Request for Comments (IEEE RFC 4120),
2005. Available at: http://www.ietf.org/rfc/rfc4120.txt.
16. H. Sun, Y. Zhu, C. Hu, J. Huai, Y. Liu, and J. Li, “Early experience of remote
and hot service deployment with trustworthiness in CROWN grid,” in
Proceedings of Sixth International Workshop on Advanced Parallel Processing
Technologies , (APPT 2005): 301-302, Hong Kong, China, October 27-28, 2005.
17. S. Bajaj, D. Box, and D. Chappell, “Web services policy framework,” World
Wide Web Consortium (W3C) Specii cation. Available at: http://www.w3.
org/Submission/WS-Policy/, 2005.
18. A. Nadalin, M. Goodner. et al., WS-Trust, version 1.3. OASIS standard.
http://docs.oasis-open.org/ws-sx/ws-trust/200512/ws-trust-1.3-os.html.
19. T.M. Simon Godik, “OASIS eXtensible Access Control Markup Language
(XACML),” 2003.
 
Search WWH ::




Custom Search