

Security in Mobile Grid Systems: A Review
Abstract
Keywords
References
Andrew Martin, Po-Wah Yau, “Grid security: Next steps”, Elsevier, pp. 113-122, 2007.
Globus Project, Grid Security Infrastructure (GSI), 2005. .
EGEE Middleware Design Team, EGEE Middleware Architecture, 2004. .
Enterprise Grid Alliance Security Working Group, Enterprise Grid Security Requirements Version 1.0, 2005.
Brian Clarke and Marty Humphrey, “Beyond the “Device as Portal”: Meeting the Requirements of Wireless and Mobile Devices in the Legion Grid Computing System”, IEEE, 2002.
David G. Rosado, Eduardo Fernández-Medina, Javier López, “Security services architecture for Secure Mobile Grid Systems”, Elsevier, pp. 240-258, Vol. 57, No. 3, 2010.
David G. Rosado, Eduardo Fernández-Medina, Javier López, Mario Piattini, “Analysis of Secure Mobile Grid Systems: A systematic approach”, Elsevier, pp. 517-536, Vol. 52, Issue 5, 2010.
David G. Rosado, Eduardo Fernández-Medina, Javier López, Mario Piattini, ”Systematic design of secure Mobile Grid systems”, Elsevier, pp. 1168-1183, Vol. 34, Issue 4, 2011.
David G. Rosado, Eduardo Fernández-Medina, Javier López, “Reusable Security Use Cases for Mobile Grid environments”, IEEE, pp. 1-8, 2009.
Adam Hahn, Manimaran Govindarasu, “Cyber Attack Exposure Evaluation Framework for the Smart Grid”, IEEE transactions on SMART GRID, VOL. 2, NO. 4, , pp. 835-843, DECEMBER 2011.
Shanshan Song, Kai Hwang and Yu-Kwong Kwok, “Trusted Grid Computing with Security Binding and Trust Integration”, Springer, pp. 53-73, Vol. 3, Issue 1-2, 2005.
Shanshan Song, Kai Hwang, Runfang Zhou, Yu-Kwong Kwok, “Trusted P2P Transactions with Fuzzy Reputation Aggregation”, IEEE INTERNET COMPUTING, pp. 24-34, Vol. 9, Issue 6, 2005.
Chunling Zhu, Xiaoyong Tang, Kenli Li, Xiao Han, Xilu Zhu, and Xuesheng Qi, “Integrating Trust into Grid Economic Model Scheduling Algorithm”, Springer, pp. 1263-1272, 2006.
Li Lin and Jinpeng Huai, “QGrid: An Adaptive Trust Aware Resource Management Framework”, IEEE SYSTEMS JOURNAL, pp. 78-90, VOL. 3, NO. 1, MARCH 2009.
Matthew Smith, Thomas Friese, Michael Engel, Bernd Freisleben, “Countering security threats in service-oriented on-demand grid computing using sandboxing and trusted computing techniques”, Elsevier, pp. 1189-1204, Vol. 66, Issue 9, 2006.
Erin Cody, Raj Sharman, Raghav H. Rao , Shambhu Upadhyaya, “Security in grid computing: A review and synthesis”, Elsevier, pp. 749-764, Vol. 44, Issue 4, 2007.
Farag Azzedin and Muthucumaru Maheswaran, “Towards Trust-Aware Resource Management in Grid Computing Systems”, 2nd IEEE/ACM international symposium, pp. 452-460, 2002.
Kai Hwang and Sapon Tanachaiwiwat, “Trust Models and NetShield Architecture for Securing Grid Computing”, Journal of Grid Computing 2003.
Anupam Das and Mohammad Mahfuzul Islam, “SecuredTrust: A Dynamic Trust Computation Model for Secured Communication in Multiagent Systems”, IEEE transactions on dependable and secure computing, pp. 261-274, Vol. 9, Issue 2, MARCH/APRIL 2012.
Runfang Zhou, Kai Hwang, “PowerTrust: A Robust and Scalable Reputation System for Trusted Peer-to-Peer Computing”, IEEE Transactions on Parallel and Distributed Systems, 2006.
Patricio Dominguesa, Bruno Sousab, Luis Moura Silvab, “Sabotage-tolerance and trust management in desktop grid computing”, Elsevier, pp. 904-912, 2006.
Wang Xinhua, Gui Xiaolin, Chen Feifei, “A Trust and Reputation Model of Grid Resources for Cooperating Application”, Proceedings of the First International Conference on Semantics, Knowledge, and Grid, IEEE 2006.
H.Parveen Begam and Maluk Mohamed.M.A, “Secured Data Management Paradigm for Mobile Grid Environment using Surrogate Objects”, IEEE 13th International Conference on Mobile Data Management, pp. 380-384, 2012.
Refbacks
- There are currently no refbacks.

This work is licensed under a Creative Commons Attribution 3.0 License.