VIII.
Referências
• Foster, Ian ; Kesselman, Carl; Tsudik, Gene; Tuecke, Steven. “A
Security Architecture for Computational Grids”, 1998.
Disponível em: ‘A
Security Architecture for Computational Grids’ (em
17/10/2007).
• Butler, R.; Welch, V.; Engert, D.; Foster, I.; Tuecke, S.; Volmer,
J.; Kesselman, C. “A national-scale authentication infrastructure”,
Computer , Volume: 33 Issue: 12 ,Dez. 2000, Page(s): 60 -66.
Disponível em: ‘A
Nationa-scale authentication infrastructure’ (em
17/10/2007).
• Jones, Mike. “Grid Security – An overview of the
methods used to create a secure grid”, 2004.
Disponível em: ‘Grid Security An overview of the methods used to create a secure grid’
(em
17/10/2007).
• Humphrey, Marty; Thompson, Mary. “Security Implications
of Typical Grid Computing Usage Scenarios”, 2000.
Disponível em: ‘Security Implications of Typical Grid Computing Usage Scenarios’
(em
17/10/2007).
• Dwoskin, Jeffrey; Basu, Sujoy; Talwar, Vanish; Kumar, Raj; Kitson,
Fred; Lee, Ruby. “Scoping Security Issues for Interactive Grids”,
2003.
Disponível em: ‘Scoping
Security Issues for Interactive Grids’ (em 17/10/2007).
• “Overview of the Grid Security Infrastructure”.
Disponível em: ‘Overview
of the Grid Security Infrastructure’ (em 17/10/2007).
• “Open Grid Forum – Security”.
Disponível em: ‘Open
Grid Forum – Security’ (em
17/10/2007).