Author of the publication

Dynamic System-Wide Reconfiguration of Grid Deployments in Response to Intrusion Detections.

, , , , , , , , and . HPCC, volume 4782 of Lecture Notes in Computer Science, page 260-272. Springer, (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A AAAA model to support science gateways with community accounts., , , , and . Concurr. Comput. Pract. Exp., 19 (6): 893-904 (2007)The case for using Bridge Certificate Authorities for Grid computing., , and . Softw. Pract. Exp., 35 (9): 817-826 (2005)Traust: A Trust Negotiation Based Authorization Service., , , and . iTrust, volume 3986 of Lecture Notes in Computer Science, page 458-462. Springer, (2006)Managing Network Resources in Condor., and . HPDC, page 298-299. IEEE Computer Society, (2000)Science gateway security recommendations., and . CLUSTER, page 1-3. IEEE Computer Society, (2013)The Problem Solving Environments of TeraGrid, Science Gateways, and the Intersection of the Two., , , , , , , , , and . eScience, page 725-734. IEEE Computer Society, (2008)A Credential Store for Multi-tenant Science Gateways., , , and . CCGRID, page 445-454. IEEE Computer Society, (2014)Integrating Science Gateways with XSEDE Security: A Survey of Credential Management Approaches., , , , , , and . XSEDE, page 58:1-58:2. ACM, (2014)Use Case Methodology in XSEDE System Integration., , , and . PEARC, page 477-480. ACM, (2020)SciTokens SSH: Token-based Authentication for Remote Login to Scientific Computing Environments., , and . PEARC, page 465-468. ACM, (2020)