Grid-computing portals and security issues.
From MaRDI portal
Recommendations
Cited in
(17)- scientific article; zbMATH DE number 1966243 (Why is no real title available?)
- Compromised resources tolerance in grid computing systems
- scientific article; zbMATH DE number 1966248 (Why is no real title available?)
- Towards formal interaction-based models of grid computing infrastructures
- Overhead verification for cryptographically secured transmission on the Grid
- A fair, secure and trustworthy peer-to-Peer based cycle-sharing system
- Grid Computing Security
- Coordination Models and Languages
- scientific article; zbMATH DE number 1756083 (Why is no real title available?)
- Countering security threats in service-oriented on-demand grid computing using sandboxing and trusted computing techniques
- The Trellis security infrastructure for overlay metacomputers and bridged distributed file systems
- scientific article; zbMATH DE number 1948426 (Why is no real title available?)
- scientific article; zbMATH DE number 2080713 (Why is no real title available?)
- Computational Science – ICCS 2005
- Computational Science – ICCS 2005
- Authentication and authorization mechanisms for multi-domain grid environments
- A theorem on grid access control
This page was built for publication: Grid-computing portals and security issues.
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q1414731)