Information Technology Reference
In-Depth Information
Arends, R., Austein, R., Larson, M., Massey, D.,
& Rose, S. (2005). DNS security introduction and
requirements. RFC 4033. Internet Engineering
Task Force . IETF.
Gulbrandsen, A., Vixie, P., & Esibov, L. (2000).
A DNS RR for specifying the location of services
(DNS SRV). RFC 2782. Internet Engineering Task
Force . IETF.
Arnold, K. (2000). The Jini specification (2nd
ed.). Addison-Wesley.
Guttman, E. (1999). Service location proto-
col: Automatic discovery of IP network ser-
vices. IEEE Internet Computing , 3 (4), 71-80.
doi:10.1109/4236.780963
Chadwick, D. W. (2007). Use of WebDAV for
certificate publishing and revocation. Internet
Engineering Task . IETF.
Guttman, E., Perkins, C., & Kempf, J. (1999).
Service templates and schemes. Internet Engineer-
ing Task Force . IETF.
Chinnici, R., Gudgin, M., Moreau, J.-J., & Weer-
awarana, S. (2005). Web services description lan-
guage (WSDL) version 2.0 part 1: Core language.
Retrieved from http://www.w3.org/TR/wsdl20
Guttman, E., Perkins, C., Veizades, J., & Day,
M. (1999). Service location protocol, version 2.
Internet Engineering Task Force . IETF.
Christensen, E., Curbera, F., Meredith, G., &
Weerawarana, S. (2001). Web services descrip-
tion language (WSDL) 1.1. Retrieved from http://
www.w3.org/TR/2001/NOTE-wsdl-20010315
Housley, R., Polk, W., Ford, W., & Solo, D. (2002).
Certificate and certificate revocation list (CRL)
profile . RFC 3280. Internet Engineering Task
Force (IETF).Jenronimo, M., & Weast, J. (2003).
UPnP design by example: A software developer's
guide to universal plug and play. Intel Press. ,
ISBN-13 , 978-0971786110.
Ciaschini, V. (2004). A VOMS attribute certificate
profile for authorization. Retrieved from http://
grid-auth.infn.it/docs/AC-RFC.pdf
Clement, L., Hately, A., von Riegen, C., & Rogers,
T. (2004). UDDI version 3.0.2. Retrieved from
http://uddi.org/pubs/uddi v3.htm
Karmarkar, A., Hadley, M., Mendolsohn, N.,
Lafon, Y., Gudgin, M., Moreau, J. J., & Nielsen,
H. (2007). SOAP version 1.2 part 1: Messaging
framework (2 nd ed.). Retrieved from http://www.
w3.org/TR/2007/REC-soap12-part1-20070427/
Curbera, F., Duftler, M., Khalaf, R., Nagy, W.,
Mukhi, N., & Weerawarana, S. (2002). Unraveling
the Web services Web: An introduction to SOAP,
WSDL, and UDDI. IEEE Internet Computing , 6 ,
86-93. doi:10.1109/4236.991449
Maymounkov, P., & Mazieres, D. (2002). Kadem-
lia: A peer-to-peer Information System based on
the XOR metric .
Deering, S., & Hinden, R. (1998). Internet pro-
tocol, version 6 (IPv6) specification. Internet
Engineering Task Force . IETF.
Microsoft. (n.d.). Peer name resolution protocol .
Retrieved from http://technet.microsoft.com/en-
us/library/bb726971.aspx
Edwards, W. (2000). Core Jini (2nd ed.). Prentice-
Hall.
Mockapetris, P. (1987). Domain names - imple-
mentation and specification. RFC 1035. Internet
Engineering Task Force . IETF.
Foster. (2002). What is the Grid? A three point
checklist. GRIDtoday, 1 (6).
Myers, M., & Schaad, J. (2007). Certificate man-
agement over CMS (CMC) transport protocols.
Internet Engineering Task Force . IETF.
GLOBUS. (2008). Overview of the Grid security
infrastructure. Retrieved from http://www.globus.
org/security/overview.html
Search WWH ::




Custom Search