VIII. Referências

• Foster, Ian ; Kesselman, Carl; Tsudik, Gene; Tuecke, Steven. “A Security Architecture for Computational Grids”, 1998.

Disponível em: ‘A Security Architecture for Computational Grids’ (em 17/10/2007).

• Butler, R.; Welch, V.; Engert, D.; Foster, I.; Tuecke, S.; Volmer, J.; Kesselman, C. “A national-scale authentication infrastructure”, Computer , Volume: 33 Issue: 12 ,Dez. 2000, Page(s): 60 -66.

Disponível em: ‘A Nationa-scale authentication infrastructure’ (em 17/10/2007).

• Jones, Mike. “Grid Security – An overview of the methods used to create a secure grid”, 2004.

Disponível em: ‘Grid Security An overview of the methods used to create a secure grid

(em 17/10/2007).

• Humphrey, Marty; Thompson, Mary. “Security Implications of Typical Grid Computing Usage Scenarios”, 2000.

Disponível em: ‘Security Implications of Typical Grid Computing Usage Scenarios

(em 17/10/2007).

• Dwoskin, Jeffrey; Basu, Sujoy; Talwar, Vanish; Kumar, Raj; Kitson, Fred; Lee, Ruby. “Scoping Security Issues for Interactive Grids”, 2003.

Disponível em: ‘Scoping Security Issues for Interactive Grids’ (em 17/10/2007).

• “Overview of the Grid Security Infrastructure”.

Disponível em: ‘Overview of the Grid Security Infrastructure’ (em 17/10/2007).

• “Open Grid Forum – Security”.

Disponível em: ‘Open Grid Forum – Security’ (em 17/10/2007).