Automating security configuration for the Grid.
Brian C. ClaytonThomas B. QuillinanSimon N. FoleyPublished in: Sci. Program. (2005)
Keyphrases
- security issues
- security requirements
- information security
- security problems
- access control
- grid computing
- security policies
- security vulnerabilities
- information assurance
- security systems
- data security
- computer security
- statistical databases
- security mechanisms
- grid environment
- security properties
- network security
- security protocols
- functional requirements
- security level
- malware detection
- network management
- security management
- grid points