[HTML][HTML] Survey of research towards robust peer-to-peer networks: Search methods

J Risson, T Moors - 2007 - rfc-editor.org
RFC 4981: Survey of Research towards Robust Peer-to-Peer Networks: Search Methods [RFC
Home] [TEXT|PDF|HTML] [Tracker] [IPR] [Info page] INFORMATIONAL Network Working Group …

Trusted grid computing with security binding and trust integration

S Song, K Hwang, YK Kwok - Journal of Grid computing, 2005 - Springer
Trusted Grid computing demands robust resource allocation with security assurance at all
resource sites. Large-scale Grid applications are being hindered by lack of security …

A virtual network (ViNe) architecture for grid computing

M Tsugawa, JAB Fortes - Proceedings 20th IEEE International …, 2006 - ieeexplore.ieee.org
This paper describes a virtual networking approach for grids called ViNe. It enables
symmetric connectivity among grid resources and allows existing applications to run …

[PDF][PDF] Peer to peer security

J Van Vroonhoven - 4th Twente Student Conference on IT, 2006 - Citeseer
With the increasing popularity of peer-to-peer networks, new problems arise. One of those
problems is the security of such networks. In the area of peer-to-peer security there are five …

Grid system integrated with trusted computing platform

ZD Shen, F Yan, WZ Qiang, XP Wu… - First International Multi …, 2006 - ieeexplore.ieee.org
Grid provides people the way to share large mount of distributed resources and services that
belong to different local organizations. That is a good way to share many kinds of distributed …

A semantic access control model for grid services

J Luo, X Wang, A Song - Proceedings of the Ninth International …, 2005 - ieeexplore.ieee.org
Grid computing is appropriate for supporting cooperative work Many designers and
engineers from different companies or institutions can dynamically form a virtual …

Beyond file sharing–commerce in peer-to-peer networks: surveying the landscape

J Spencer - Journal of Internet commerce, 2006 - Taylor & Francis
ABSTRACT Peer-to-peer (P2P) networks have become ubiquitous due to their synonymous
association with illicit file sharing. Although P2P networks offer the unique ability for users to …

[BOEK][B] Security analysis of a cyber physical system: a car example

J Madden - 2012 - search.proquest.com
Abstract Deeply embedded Cyber Physical Systems (CPS) are infrastructures that have
significant cyber and physical components that interact with each other in complex ways …

Secure service-oriented grid computing with public virtual worker nodes

M Schmidt, N Fallenbeck, M Smith… - 2009 35th Euromicro …, 2009 - ieeexplore.ieee.org
Cloud computing uses virtualization technologies to offer a non-shared use rental of
computer resources with publicly accessible worker nodes. However, unlike grid computing …

AT-RBAC: An Authentication Trustworthiness-Based RBAC Model

L Wang, L Wei, X Liao, H Wang - International Conference on Grid and …, 2004 - Springer
In current operating systems, the strength of authentication mechanism does not work on the
authorization of the user, which leaves the system security compromise that the user who …