Information Technology Reference
In-Depth Information
Kumar, A., & Qureshi, S. R. (2008, March 29). In-
tegration of mobile computing with Grid comput-
ing: A middleware architecture . Paper presented
at the 2nd National Conference on Challenges &
Opportunities in Information Technology (COIT-
2008), Mandi Gobindgarh, India.
Pitzmann, A., & Köhntopp, M. (2001). Anonymity,
unobservability, and pseudonymity — a proposal
for terminology. Designing Privacy Enhancing
Technologies (pp. 1-9). LNCS.
Popp, G., Jürjens, J., Wimmel, G., & Breu, R.
(2003). Security-critical system development with
extended use cases . Paper presented at the Tenth
Asia-Pacific Software Engineering Conference
(APSEC'03).
Kwok-Yan, L., Xi-Bin, Z., Siu-Leung, C., Gu, M.,
& Jia-Guang, S. (2004). Enhancing Grid security
infrastructure to support mobile computing nodes.
Lecture Notes in Computer Science , 2908 , 42-54.
doi:10.1007/978-3-540-24591-9_4
Rosado, D. G., Fernández-Medina, E., & López,
J. (2009a). Applying a UML extension to build
use cases diagrams in a secure mobile Grid
application . Paper presented at the 5th Interna-
tional Workshop on Foundations and Practices of
UML, in conjunction with the 28th International
Conference on Conceptual Modelling, ER 2009,
Gramado, Brasil.
Litke, A., Skoutas, D., & Varvarigou, T. (2004).
Mobile Grid computing: Changes and challenges
of resource management in a mobile Grid envi-
ronment . Paper presented at the 5th International
Conference on Practical Aspects of Knowledge
Management (PAKM 2004).
Mouratidis, H. (2004). A security oriented ap-
proach in the development of multiagent systems:
Applied to the management of the health and social
are needs of older people in England . University
of Sheffield.
Rosado, D. G., Fernández-Medina, E., & López,
J. (2009b). Obtaining security requirements for
a mobile Grid system. International Journal of
Grid and High Performance Computing , 1 (3),
1-17. doi:10.4018/jghpc.2009070101
Mouratidis, H., & Giorgini, P. (2006). Integrating
security and software engineering: Advances and
future vision . Hershey, PA: IGI Global.
Rosado, D. G., Fernández-Medina, E., & López,
J. (2009c). Reusable security use cases for mo-
bile Grid environments . Paper presented at the
Workshop on Software Engineering for Secure
Systems, in conjunction with the 31st International
Conference on Software Engineering, Vancouver,
Canada.
Nagaratnam, N., Janson, P., J. Dayka, Nadalin, A.,
Siebenlist, F., Welch, V., et al. (2003). The security
architecture for open Grid services .
Open Grid Forum. (2006). The open Grid services
architecture , version 1.5 o.
Rosado, D. G., Fernández-Medina, E., & López,
J. (2011a). Towards an UML extension of reus-
able secure use cases for mobile Grid systems.
IEICE Transactions on Information and Systems ,
94-D (2), 243-254.
Open Group. (2009). TOGAF™ version 9 - the
open group architecture framework . Retrieved
from http://www.opengroup.org/architecture/
togaf9-doc/arch/
Rosado, D. G., Fernández-Medina, E., & López,
J. (2011b). Security services architecture for
secure mobile Grid systems. Journal of Systems
Architecture. Special Issue on Security and De-
pendability Assurance of Software Architectures ,
57 (3), 240-258.
Phan, T., Huang, L., Ruiz, N., & Bagrodia, R.
(2005). Integrating mobile wireless devices into
the computational Grid. In Ilyas, M., & Mahgoub,
I. (Eds.), Mobile computing handbook . Auerbach
Publications.
Search WWH ::




Custom Search