Citation: | Liu Yiwen, Li Weiqin, Wei Weiet al. Study of grid security architecture[J]. Journal of Beijing University of Aeronautics and Astronautics, 2003, 29(7): 631-635. (in Chinese) |
[1] Foster I, Kesselman C. Globus project. [2] Tuecke S. Grid security infrastructure(GSI) roadmap. [3] Foster I, Kesselman C, Tsudik G, et al. A security architecture for computational grids. In:Reiter M, ed. Proceedings of the 5th ACM conference on computer and communications security. New York:ACM Press,1998.83~91[4] Jackson K, Tuecke S, Engert D. TLS delegation protocol. [5] Tuecke S, Engert D, Foster I. Internet X.509 public key infrastructure proxy certificate profile. [6] Wong C, Gouda M, Lam S. Secure group communications using key graphs.
|