[HTML][HTML] Survey of research towards robust peer-to-peer networks: Search methods
J Risson, T Moors - 2007 - rfc-editor.org
RFC 4981: Survey of Research towards Robust Peer-to-Peer Networks: Search Methods [RFC
Home] [TEXT|PDF|HTML] [Tracker] [IPR] [Info page] INFORMATIONAL Network Working Group …
Home] [TEXT|PDF|HTML] [Tracker] [IPR] [Info page] INFORMATIONAL Network Working Group …
Trusted grid computing with security binding and trust integration
Trusted Grid computing demands robust resource allocation with security assurance at all
resource sites. Large-scale Grid applications are being hindered by lack of security …
resource sites. Large-scale Grid applications are being hindered by lack of security …
A virtual network (ViNe) architecture for grid computing
This paper describes a virtual networking approach for grids called ViNe. It enables
symmetric connectivity among grid resources and allows existing applications to run …
symmetric connectivity among grid resources and allows existing applications to run …
[PDF][PDF] Peer to peer security
J Van Vroonhoven - 4th Twente Student Conference on IT, 2006 - Citeseer
With the increasing popularity of peer-to-peer networks, new problems arise. One of those
problems is the security of such networks. In the area of peer-to-peer security there are five …
problems is the security of such networks. In the area of peer-to-peer security there are five …
Grid system integrated with trusted computing platform
ZD Shen, F Yan, WZ Qiang, XP Wu… - First International Multi …, 2006 - ieeexplore.ieee.org
Grid provides people the way to share large mount of distributed resources and services that
belong to different local organizations. That is a good way to share many kinds of distributed …
belong to different local organizations. That is a good way to share many kinds of distributed …
A semantic access control model for grid services
J Luo, X Wang, A Song - Proceedings of the Ninth International …, 2005 - ieeexplore.ieee.org
Grid computing is appropriate for supporting cooperative work Many designers and
engineers from different companies or institutions can dynamically form a virtual …
engineers from different companies or institutions can dynamically form a virtual …
Beyond file sharing–commerce in peer-to-peer networks: surveying the landscape
J Spencer - Journal of Internet commerce, 2006 - Taylor & Francis
ABSTRACT Peer-to-peer (P2P) networks have become ubiquitous due to their synonymous
association with illicit file sharing. Although P2P networks offer the unique ability for users to …
association with illicit file sharing. Although P2P networks offer the unique ability for users to …
[BOEK][B] Security analysis of a cyber physical system: a car example
J Madden - 2012 - search.proquest.com
Abstract Deeply embedded Cyber Physical Systems (CPS) are infrastructures that have
significant cyber and physical components that interact with each other in complex ways …
significant cyber and physical components that interact with each other in complex ways …
Secure service-oriented grid computing with public virtual worker nodes
Cloud computing uses virtualization technologies to offer a non-shared use rental of
computer resources with publicly accessible worker nodes. However, unlike grid computing …
computer resources with publicly accessible worker nodes. However, unlike grid computing …
AT-RBAC: An Authentication Trustworthiness-Based RBAC Model
L Wang, L Wei, X Liao, H Wang - International Conference on Grid and …, 2004 - Springer
In current operating systems, the strength of authentication mechanism does not work on the
authorization of the user, which leaves the system security compromise that the user who …
authorization of the user, which leaves the system security compromise that the user who …