1 |
David Barkai, Peer-to-Peer Architecture Group, Microcomputer Research Lab andIntel Corporation, 'An Introduction toPeer-to-Peer Computing', Inte1RDev1oper-UPDATE Magazine, pp.1-7, February 2000
|
2 |
I. Foster, C. Kesselman, G. Tsudik, S.Tuecke. 'A Security Architecture forComputational Grids.' Prpc. 5th ACMComference on Computer andCommunications Security Conference, pp.83-92, 1998
|
3 |
Kant, K., lyer, R., and Tewari, V.;'Aframework for dassifying peer-to-peertechnologies', Cluster Computing and theGrid 2nd IEEE/ACM InternationalSymposium CCGRID2002, 21-24, pp. 338-345,May 2002
|
4 |
Azzedin, F.; Maheswaran, M.; 'Towardstrust-aware resourece management in Gridcomputing systems,' Cluster Computing andthe Grid 2nd IEEE/ACM InternationalSymposium CCGRID2002, 21-24, pp. 419-424,May 2002
|
5 |
J. Kohl and C. Neuman, 'The KerberosNetwork Authentication Service(V5),' RFC1510, September, 1993
|