共 3 条
[1]
Design and deployment of a national -scale authentication infrastructure. Butler R,Engert D,Foster I,et al. IEEE Computer . 2000
[2]
A security architecture for computational grids. Foster I,Kesselman C,Tsudik G,et al. In ACM Conference on Computer and Communications Security Conference . 1998
[3]
The anatomy of the grid. Foster I,Kesselman C,Tuecke S. I ntl J Supercomputer Applications . 2001