[1]
|
Foster, I., Siebenlist, F., Tereche, S. and Welch, V. (2002) Security and Certification Issues in Grid Computing. Argonne National Laboratory, University of Chicago, Chicago.
|
[2]
|
Welch, V., Siebenlist, F., Foster, I., et al. (2006) Security for Grid Services. Argonne National Laboratory, University of Chicago, Chicago.
|
[3]
|
Anitha, A. and Mujumdar, C. (2013) Hybrid Security Techniques for Grid/Cloud Computing Environment Using Identity Based Cryptography Advances. International Journal of Computers, Electrical and Advanced Communications Engineering, 2,
|
[4]
|
Foster, I., Kesselman, K. and Tzudik, G. (1998) A Security Architecture for Computational Grids. Proceedings of the 5th ACM Conference on Computer and Communication Security, San Francisco, 83-92. http://dx.doi.org/10.1145/288090.288111
|
[5]
|
Grimshaw, A.S., Humphrey, A.S. and Natrajan, A. (2004) A Phylosophical and Technical Comparison of Legion and Globus. IBM Journal of Research and Development, 48, 233-254. http://dx.doi.org/10.1147/rd.482.0233
|
[6]
|
Cody, E., Sharman, R., Atkar, N., Rao, R.H. and Upadhyay, S. (2008) Security in Grid Computing: A Review and Synthesis. Decision Support Systems, 44, 749-764. http://dx.doi.org/10.1016/j.dss.2007.09.007
|
[7]
|
Kamvar, S.D., Schlosser, M.T. and Molina, H.G. (2003) The Eigen Trust Algorithm for Reputation Management in P2P Networks. Proceedings of the 12th International World Wide Web Conference, Budapest, 20-24 May 2003, 12 p.
|
[8]
|
Roxburgh, A., Pawlikowski, K. and McNickle, D.C. (2004) Grid Computing: the Current State and Future Trends (in General and from the University of Canterbury’s Perspective), University of Canterbury, Christchurch.
|
[9]
|
Wolski, R., Brevik, J., Krintz, C., Obertelli, G., Spring, N. and Su, A. (1999) Running Every Ware on the Computational Grid. Proceedings of the 1999 ACM/IEEE conference on Supercomputing, Article No. 6, ISBN: 1-58113-091-0. http://dx.doi.org/10.1145/331532.331538
|
[10]
|
Krauter, K., Buyya, R. and Maheswaran, M. (2001) A taxonomy and Survey of Grid Resource Management Systems for Distributed Computing. Software: Practical Experience, 32, 135-164. http://dx.doi.org/10.1002/spe.432
|
[11]
|
Mattmann, C.A., Garcia, J., Krka, I., Popescu, D. and Medvidovic, N. (2015) Revisiting the Anatomy and Physiology of the Grid. Journal of Grid Computing, 13, 19-34. http://dx.doi.org/10.1007/s10723-015-9324-0
|
[12]
|
Srinivasan, R. and Srivaramangai, P. (2010) A Comprehensive Trust Model for Improved Reliability in Grid. International Journal of Computer Application, 5, 1-4.
|
[13]
|
Meng, W., Xia, H. and Song, H. (2009) A Dynamic Trust Model Based on Recommendation Credibility in Grid Domain. International Conference CiSE, Wuhan, 11-13 December 2009, 1-4. http://dx.doi.org/10.1109/cise.2009.5363348
|
[14]
|
Farouk, A., Fouad, M.M. and Abdelhafez, A.A. (2014) Cross Domain Identity Trust Management for Grid Computing. International Journal of Security, Privacy and Trust Management, 3, 11-21.
|
[15]
|
Ashrafijoo, B., Navin, A.H., Mir Nia, M.K. and Abedini, S. (2010) Trust Management in Grid Computing Systems Based on Probability Theory. 2nd International Conference on Educational Technology and Computer (ICETC), 4, 316-320. http://dx.doi.org/10.1109/icetc.2010.5529674
|
[16]
|
Anderson, D.P., Cobb, J., Korpela, E., Lebofsky, M. and Werthimer, D. (2002) Seti@home: An Experiment in Public-Resource Computing. Communications of the ACM, 45, 56-61. http://dx.doi.org/10.1145/581571.581573
|
[17]
|
Gong, L. (1997) Java Security: Present and Near Future. IEEE Micro, 17, 14-19. http://dx.doi.org/10.1109/40.591650
|