Information Technology Reference
In-Depth Information
Foster, I., Kesselman, C., & Tuecke, S. (2001).
The anatomy of the grid: Enabling scalable virtual
organizations. Int'l J. Supercomputer Applica-
tions, 15 (3).
Olabarriaga, S. D., Nederveen, A. J., Snel, J. G., &
Belleman, R. G. (2006). Towards a virtual labo-
ratory for FMRI data management and analysis.
Proc. HealthGrid 2006 ( Vol. 120 , pp. 43-54).
Amsterdam, The Netherlands: IOS Press.
Glite. (n.d.). Glite middleware . Retrieved from
http://glite.web.cern.ch/glite
Scarfone, K., & Mell, P. (2009) An analysis of
CVSS version 2 vulnerability scoring. Proceed-
ings of the 3rd. Int'l Symposium on Empirical Soft-
ware Engineering and Measurement (ESEM'09),
(pp. 516-525).
Globus. (n.d.). Globus alliance toolkit homepage .
Retrieved from http://www.globus.org/toolkit/
Herveg, J. (2006). The ban on processing medical
data in European law: Consent and alternative
solutions to legitimate processing of medical
data in healthgrid. Proc. Healthgrid ( Vol. 120 ,
pp. 107-116). Amsterdam, The Netherlands:
IOS Press.
Sweeney, L. (2002). K-anonymity: A model
for protecting privacy. International Journal
of Uncertainty . Fuzziness and Knowledge-
Based Systems , 10 (5), 557-570. doi:10.1142/
S0218488502001648
JSDL. (n.d.). Job submission description language
(jsdl) specification, v.1.0 . Retrieved from http://
www.gridforum.org/documents/GFD.56.pdf
Travostino, F., Daspit, P., Gommans, L., Jog, C., de
Laat, C. T. A. M., & Mambretti, J. (2006). S eam-
less live migration of virtual machines over the
man/wan. Future Generation Computer Systems ,
22 (8), 901-907. doi:10.1016/j.future.2006.03.007
Kalra, D., Singleton, P., Ingram, D., Milan, J.,
MacKay, J., Detmer, D., & Rector, A. (2005).
Security and confidentiality approach for the
clinical e-science framework (clef). Methods of
Information in Medicine , 44 (2), 193-197.
U.S. Congress (1996). Health insurance portabil-
ity and accountability act, 1996.
U.S. Safe Harbor Framework . (n.d.). Retrieved
from http://www.export.gov/safeharbor/
LHC. (n.d.). LHC computing grid project . Re-
trieved from http://lcg.web.cern.ch/LCG
Van 't Noordende, G., Balogh, A., Hofman, R.,
Brazier, F. M. T., & Tanenbaum, A. S. (2007).
A secure jailing system for confining untrusted
applications . 2nd Int'l Conf. on Security and
Cryptography (SECRYPT), (pp. 414-423). Bar-
celona, Spain.
Malin, B. (2002). Compromising privacy with
trail re-identification: The Reidit algorithms.
(CMU Technical Report, CMU-CALD-02-108),
Pittsburgh.
Montagnat, J., Frohner, A., Jouvenot, D., Pera,
C., Kunszt, P., & Koblitz, B. (2007). A secure
grid medical data manager interfaced to the glite
middleware. Journal of Grid Computing , 6 (1).
Van 't Noordende, G. J., Brazier, F. M. T., &
Tanenbaum, A. S. (2004). Security in a mobile
agent system . 1st IEEE Symp. on Multi-Agent
Security and Survivability, Philadelphia.
NIST. (2007). Special publication 800-88: Guide-
lines for media sanitization by the national institute
of standards and technology . Retrieved from http://
csrc.nist.gov/publications/nistpubs/#sp800-88
WGBO. (1994). Dutch ministry of health, welfare
and sport - WGBO . Retrieved from http://www.
hulpgids.nl/wetten/wgbo.htm
Search WWH ::




Custom Search