Information Technology Reference
In-Depth Information
Arends, R., Austein, R., Larson, M., Massey, D.,
& Rose, S. (2005).
DNS security introduction and
requirements. RFC 4033. Internet Engineering
Task Force
. IETF.
Gulbrandsen, A., Vixie, P., & Esibov, L. (2000).
A DNS RR for specifying the location of services
(DNS SRV). RFC 2782. Internet Engineering Task
Force
. IETF.
Arnold, K. (2000).
The Jini specification
(2nd
ed.). Addison-Wesley.
Guttman, E. (1999). Service location proto-
col: Automatic discovery of IP network ser-
vices.
IEEE Internet Computing
,
3
(4), 71-80.
doi:10.1109/4236.780963
Chadwick, D. W. (2007).
Use of WebDAV for
certificate publishing and revocation. Internet
Engineering Task
. IETF.
Guttman, E., Perkins, C., & Kempf, J. (1999).
Service templates and schemes. Internet Engineer-
ing Task Force
. IETF.
Chinnici, R., Gudgin, M., Moreau, J.-J., & Weer-
awarana, S. (2005).
Web services description lan-
guage (WSDL) version 2.0 part 1: Core language.
Retrieved from http://www.w3.org/TR/wsdl20
Guttman, E., Perkins, C., Veizades, J., & Day,
M. (1999).
Service location protocol, version 2.
Internet Engineering Task Force
. IETF.
Christensen, E., Curbera, F., Meredith, G., &
Weerawarana, S. (2001).
Web services descrip-
tion language (WSDL) 1.1.
Retrieved from http://
www.w3.org/TR/2001/NOTE-wsdl-20010315
Housley, R., Polk, W., Ford, W., & Solo, D. (2002).
Certificate and certificate revocation list (CRL)
profile
. RFC 3280. Internet Engineering Task
Force (IETF).Jenronimo, M., & Weast, J. (2003).
UPnP design by example: A software developer's
guide to universal plug and play.
Intel Press.
,
ISBN-13
, 978-0971786110.
Ciaschini, V. (2004).
A VOMS attribute certificate
profile for authorization.
Retrieved from http://
grid-auth.infn.it/docs/AC-RFC.pdf
Clement, L., Hately, A., von Riegen, C., & Rogers,
T. (2004).
UDDI version 3.0.2.
Retrieved from
http://uddi.org/pubs/uddi v3.htm
Karmarkar, A., Hadley, M., Mendolsohn, N.,
Lafon, Y., Gudgin, M., Moreau, J. J., & Nielsen,
H. (2007).
SOAP version 1.2 part 1: Messaging
framework
(2
nd
ed.). Retrieved from http://www.
w3.org/TR/2007/REC-soap12-part1-20070427/
Curbera, F., Duftler, M., Khalaf, R., Nagy, W.,
Mukhi, N., & Weerawarana, S. (2002). Unraveling
the Web services Web: An introduction to SOAP,
WSDL, and UDDI.
IEEE Internet Computing
,
6
,
86-93. doi:10.1109/4236.991449
Maymounkov, P., & Mazieres, D. (2002).
Kadem-
lia: A peer-to-peer Information System based on
the XOR metric
.
Deering, S., & Hinden, R. (1998).
Internet pro-
tocol, version 6 (IPv6) specification. Internet
Engineering Task Force
. IETF.
Microsoft. (n.d.).
Peer name resolution protocol
.
Retrieved from http://technet.microsoft.com/en-
us/library/bb726971.aspx
Edwards, W. (2000).
Core Jini
(2nd ed.). Prentice-
Hall.
Mockapetris, P. (1987).
Domain names - imple-
mentation and specification. RFC 1035. Internet
Engineering Task Force
. IETF.
Foster. (2002). What is the Grid? A three point
checklist.
GRIDtoday, 1
(6).
Myers, M., & Schaad, J. (2007).
Certificate man-
agement over CMS (CMC) transport protocols.
Internet Engineering Task Force
. IETF.
GLOBUS. (2008).
Overview of the Grid security
infrastructure.
Retrieved from http://www.globus.
org/security/overview.html
Search WWH ::
Custom Search