Practical Authentication for Distributed Computing.
J. LinnPublished in: IEEE Symposium on Security and Privacy (1990)
Keyphrases
- distributed computing
- distributed environment
- distributed systems
- fault tolerance
- mobile agents
- grid computing
- cloud computing
- geographically distributed
- mobile communications
- distributed computing systems
- computing devices
- peer to peer
- distributed computing environment
- virtual machine
- computing platform
- information systems
- resource discovery
- fault tolerant
- real world
- resource sharing
- cooperative
- provide efficient solutions