1 |
Randy Butler Von Welch, Douglas Engert, Ian Foster, Steven Tuecke, John Volmer, Garl Kesselman, 'A National-Scale Authentication Infrastructure', IEEE, December. 2000. pp. 60-6
|
2 |
IETF, 'GSS-API Extensions', Internet Draft, February 2002
|
3 |
http://www.gridforum.org/2_SEC/SEC.htm
|
4 |
Foster, I., C. Kesselman, and S. Tuecke, 'The Anatomy of the Grid: Enabling Scalable Virtual Organizations,' International Journal of Supercomputer Applications, 2001
|
5 |
Ravi S. Sandhu, 'Role-Based Access Control Features in Commercial Database Management Systems', Proceedings of NISSC, 1998
|
6 |
Czajkowski, K., Fitzgerald, S., Foster, I. and Kesselman, C. 'Grid Information Services for Distributed Resource Sharing', 2001
|
7 |
IETF, 'Internet X.509 Public Key Infrastructure Certificate Management Protocol', RFC 2510, March 1999
|
8 |
http://www-unix.globus.org/toolkit/
|
9 |
IETF, 'Internet X.509 Public Key Infrastructure Proxy Certificate Profile', RFC 2459, August 2001
|
10 |
Gyung-Woo Kang, Hyung-Woo Park, 'A Trends of Research and Implementation in Grid', Communication of the Korea Information Science Society, Vol 20, No.2 pp.27, 2002. 2
|
11 |
Ravi S. Sandhu, Edward J. Coyne, Hal L. Feinstein, and Charles E. Youman 'Role-Based Access Control Models', IEEE Computer, vol. 29, no. 2, Feb. 1996
|