Author of the publication

Optimizing Tunneled Grid Connectivity across Firewalls.

, , and . AusGrid, volume 99 of CRPIT, page 21-27. Australian Computer Society, (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Defense Security Approach for Infrastructures against Hacking., , and . TrustCom/ISPA/IUCC, page 1600-1606. IEEE Computer Society, (2013)Executing Large Parameter Sweep Applications on a Multi-VO Testbed., , , , and . CCGRID, page 73-82. IEEE Computer Society, (2007)An Explicit Trust Model Towards Better System Security., , , and . CoRR, (2014)An evolving trust paradigm for enforcing computing system security., , , and . CEC, page 2595-2602. IEEE, (2015)Firewall Traversal in the Grid Architecture., , and . HPCC, page 189-196. IEEE, (2010)Bridging organizational network boundaries on the grid., , and . GRID, page 327-332. IEEE Computer Society, (2005)A Dynamic Security Model for Addressing Hacking Risk Factors., , , and . ISD, University of Economics in Katowice / Association for Information Systems, (2016)Shibboleth and Community Authorization Services: Enabling Role-Based Grid Access., and . ICA3PP (2), volume 7017 of Lecture Notes in Computer Science, page 131-140. Springer, (2011)Optimizing Tunneled Grid Connectivity across Firewalls., , and . AusGrid, volume 99 of CRPIT, page 21-27. Australian Computer Society, (2009)Communication over a Secured Heterogeneous Grid with the GriddLeS Runtime Environment., , and . e-Science, page 21. IEEE Computer Society, (2006)