Citation: | Liu Yiwen, Li Weiqin, Wei Weiet al. Study of grid security architecture[J]. Journal of Beijing University of Aeronautics and Astronautics, 2003, 29(7): 631-635. (in Chinese) |
[1] Foster I, Kesselman C. Globus project. http://www.globus.org. 2001 [2] Tuecke S. Grid security infrastructure(GSI) roadmap. http://www.gridforum.org/security/ggf1-2001-03/drafts/ draft-gridforum-gsi-roadmap-02.txt. 2001 [3] Foster I, Kesselman C, Tsudik G, et al. A security architecture for computational grids. In:Reiter M, ed. Proceedings of the 5th ACM conference on computer and communications security. New York:ACM Press,1998.83~91 [4] Jackson K, Tuecke S, Engert D. TLS delegation protocol. http://www.gridforum.org/security/ggf1-2001-03/drafts/draft-ggf-tls-delegation-09.txt, 2001 [5] Tuecke S, Engert D, Foster I. Internet X.509 public key infrastructure proxy certificate profile. http://caops.es.net/documents/certprofile.doc,2001 [6] Wong C, Gouda M, Lam S. Secure group communications using key graphs. http://www.acm.org/sigcomm/sigcomm98/ tp/paper06.pdf, 1998
|