Sciweavers

287 search results - page 6 / 58
» A Foundation for Defining Security Requirements in Grid Comp...
Sort
View
SIGCSE
2008
ACM
155views Education» more  SIGCSE 2008»
14 years 9 months ago
Towards a top-down approach to teaching an undergraduate grid computing course
Early undergraduate Grid computing courses generally took a bottom-up approach to Grid computing education starting with network protocols, client-server concepts, creating Web an...
Barry Wilkinson, Clayton Ferner
I3E
2003
133views Business» more  I3E 2003»
14 years 10 months ago
Inter-Organizational E-Services Accounting Management on Computational Grids
Abstract Accounting management is of strategic importance for a successful uptake of computational Grid technology within the user community. Computational Grid is one the most imp...
Franco Arcieri, Fabio Fioravanti, Enrico Nardelli,...
CCGRID
2006
IEEE
15 years 3 months ago
An Extensible Resource Discovery Mechanism for Grid Computing Environments
Grid computing is emerging as a new infrastructure to provide collaborative and secure resource sharing over multiple geographically distributed organizations. In this scenario, r...
Tania Gomes Ramos, Alba Cristina Magalhaes Alves d...
GRID
2004
Springer
15 years 2 months ago
From Sandbox to Playground: Dynamic Virtual Environments in the Grid
Much experience has been gained with the protocols and mechanisms needed for discovery and allocation of remote computational resources. However, the preparation of a remote compu...
Katarzyna Keahey, Karl Doering, Ian T. Foster
ACSAC
2004
IEEE
15 years 1 months ago
Extracting Attack Manifestations to Determine Log Data Requirements for Intrusion Detection
Log data adapted for intrusion detection is a little explored research issue despite its importance for successful and efficient detection of attacks and intrusions. This paper pr...
Emilie Lundin Barse, Erland Jonsson