Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Security and Certification Issues in Grid Computing., , , and . Certification and Security in E-Services, volume 255 of IFIP Conference Proceedings, page 47-55. Kluwer, (2002)Model Formulation: caGrid 1.0: An Enterprise Grid Infrastructure for Biomedical Research., , , , , , , , , and 2 other author(s). J. Am. Medical Informatics Assoc., 15 (2): 138-149 (2008)Challenges and opportunities for virtualized security in the clouds.. SACMAT, page 1-2. ACM, (2009)Grid security: requirements, plans and ongoing efforts.. XML Security, page 38. ACM, (2003)Definition and Implementation of a SAML-XACML Profile for Authorization Interoperability Across Grid Middleware in OSG and EGEE., , , , , , , , , and 15 other author(s). J. Grid Comput., 7 (3): 297-307 (2009)Policy-Driven Negotiation for Authorization in the Grid., , and . POLICY, page 211-220. IEEE Computer Society, (2007)Security for Grid Services., , , , , , , , , and . HPDC, page 48-57. IEEE Computer Society, (2003)Dorian: Grid Service Infrastructure for Identity Management and Federation., , , , , and . CBMS, page 756-761. IEEE Computer Society, (2006)Security for Virtual Organizations., , , and . The Grid 2, 2nd Edition, Morgan Kaufmann, (2004)Security and dynamics in customer controlled virtual workspace organisation., , , , , and . HPDC, page 231-232. ACM, (2007)