Information Technology Reference
In-Depth Information
Foster, I., Kesselman, C., & Tuecke, S. (2001).
The anatomy of the grid: Enabling scalable virtual
organizations.
Int'l J. Supercomputer Applica-
tions, 15
(3).
Olabarriaga, S. D., Nederveen, A. J., Snel, J. G., &
Belleman, R. G. (2006).
Towards a virtual labo-
ratory for FMRI data management and analysis.
Proc. HealthGrid 2006
(
Vol. 120
, pp. 43-54).
Amsterdam, The Netherlands: IOS Press.
Glite. (n.d.).
Glite middleware
. Retrieved from
http://glite.web.cern.ch/glite
Scarfone, K., & Mell, P. (2009) An analysis of
CVSS version 2 vulnerability scoring.
Proceed-
ings of the 3rd. Int'l Symposium on Empirical Soft-
ware Engineering and Measurement (ESEM'09),
(pp. 516-525).
Globus. (n.d.).
Globus alliance toolkit homepage
.
Retrieved from http://www.globus.org/toolkit/
Herveg, J. (2006).
The ban on processing medical
data in European law: Consent and alternative
solutions to legitimate processing of medical
data in healthgrid. Proc. Healthgrid
(
Vol. 120
,
pp. 107-116). Amsterdam, The Netherlands:
IOS Press.
Sweeney, L. (2002). K-anonymity: A model
for protecting privacy.
International Journal
of Uncertainty
.
Fuzziness and Knowledge-
Based Systems
,
10
(5), 557-570. doi:10.1142/
S0218488502001648
JSDL. (n.d.).
Job submission description language
(jsdl) specification, v.1.0
. Retrieved from http://
www.gridforum.org/documents/GFD.56.pdf
Travostino, F., Daspit, P., Gommans, L., Jog, C., de
Laat, C. T. A. M., & Mambretti, J. (2006).
S
eam-
less live migration of virtual machines over the
man/wan.
Future Generation Computer Systems
,
22
(8), 901-907. doi:10.1016/j.future.2006.03.007
Kalra, D., Singleton, P., Ingram, D., Milan, J.,
MacKay, J., Detmer, D., & Rector, A. (2005).
Security and confidentiality approach for the
clinical e-science framework (clef).
Methods of
Information in Medicine
,
44
(2), 193-197.
U.S. Congress (1996).
Health insurance portabil-
ity and accountability act,
1996.
U.S. Safe Harbor Framework
. (n.d.). Retrieved
from http://www.export.gov/safeharbor/
LHC. (n.d.).
LHC computing grid project
. Re-
trieved from http://lcg.web.cern.ch/LCG
Van 't Noordende, G., Balogh, A., Hofman, R.,
Brazier, F. M. T., & Tanenbaum, A. S. (2007).
A secure jailing system for confining untrusted
applications
. 2nd Int'l Conf. on Security and
Cryptography (SECRYPT), (pp. 414-423). Bar-
celona, Spain.
Malin, B. (2002).
Compromising privacy with
trail re-identification: The Reidit algorithms.
(CMU Technical Report, CMU-CALD-02-108),
Pittsburgh.
Montagnat, J., Frohner, A., Jouvenot, D., Pera,
C., Kunszt, P., & Koblitz, B. (2007). A secure
grid medical data manager interfaced to the glite
middleware.
Journal of Grid Computing
,
6
(1).
Van 't Noordende, G. J., Brazier, F. M. T., &
Tanenbaum, A. S. (2004).
Security in a mobile
agent system
. 1st IEEE Symp. on Multi-Agent
Security and Survivability, Philadelphia.
NIST. (2007).
Special publication 800-88: Guide-
lines for media sanitization by the national institute
of standards and technology
. Retrieved from http://
csrc.nist.gov/publications/nistpubs/#sp800-88
WGBO. (1994).
Dutch ministry of health, welfare
and sport - WGBO
. Retrieved from http://www.
hulpgids.nl/wetten/wgbo.htm
Search WWH ::
Custom Search