


default search action
ACSW Frontiers 2006: Hobart, Tasmania, Australia
- Rajkumar Buyya, Tianchi Ma, Reihaneh Safavi-Naini, Chris Steketee, Willy Susilo:

The proceedings of the Fourth Australasian Symposium on Grid Computing and e-Research (AusGrid 2006) and the Fourth Australasian Information Security Workshop (Network Security) (AISW 2006), Hobart, Tasmania, Australia, January 2006. CRPIT 54, Australian Computer Society 2006, ISBN 1-920-68236-8 - Laurent Lefèvre, Paul Roe:

Improving the flexibility of active grids through web services. 3-8 - A. B. M. Russel, Asad I. Khan:

Towards dynamic data grid framework for eResearch. 9-16 - Xiujun Gong, Kensuke Nakamura, Kei Yura, Nobuhiro Go:

Toward building grid applications in bioinformatics. 17-23 - Kris Bubendorfer:

Improving resource utilisation in market oriented grid management and scheduling. 25-31 - Jia Tang, Minjie Zhang:

An agent-based peer-to-peer grid computing architecture: convergence of grid and peer-to-peer computing. 33-39 - Leili Mohammad Khanli, Morteza Analoui:

Grid-JQA: grid Java based quality of service management by active database. 41-45 - Baden Hughes:

Building computational grids with apple's Xgrid middleware. 47-54 - Avinash Shankaranarayanan, Frank K. H. A. Dehne, Andrew Lewis:

A template based static coalition protocol: a3P viGrid. 55-62 - Kenneth A. Hawick, Heath A. James:

Simulating a computational grid with networked animat agents. 63-70 - Raghuvel S. Bhuvaneswaran, Yoshiaki Katayama, Naohisa Takahashi:

Redundant parallel data transfer schemes for the grid environment. 71-78 - Peter M. Kelly, Paul D. Coddington, Andrew L. Wendelborn:

A simplified approach to web service development. 79-88 - Jacob Zimmermann, George M. Mohay:

Distributed intrusion detection in clusters based on non-interference. 89-95 - Jinjun Chen, Yun Yang:

Key research issues in grid workflow verification and validation. 97-104 - Rüdiger Berlich, Markus Hardt, Marcel Kunze, Malcolm P. Atkinson, David Fergusson:

EGEE: building a pan-European grid training organisation. 105-111 - Udaya Kiran Tupakula, Vijay Varadharajan:

Analysis of traceback techniques. 115-124 - Jason Smith, Juan Manuel González Nieto, Colin Boyd:

Modelling denial of service attacks on JFK with Meadows's cost-based framework. 125-134 - David Duncombe, George M. Mohay, Andrew J. Clark:

Synapse: auto-correlation and dynamic attack redirection in an immunologically-inspired IDS. 135-144 - Tamas Abraham:

Event sequence mining to develop profiles for computer forensic investigation purposes. 145-153 - Rong Du, Ernest Foo, Colin Boyd, Kim-Kwang Raymond Choo:

Formal analysis of secure contracting protocol for e-tendering. 155-164 - Audun Jøsang, Dieter Gollmann, Richard Au:

A method for access authorisation through delegation networks. 165-174 - Michael Hilker, Christoph Schommer:

Description of bad-signatures for network intrusion detection. 175-182 - Robert Dawson, Colin Boyd, Ed Dawson, Juan Manuel González Nieto:

SKMA: a key management architecture for SCADA systems. 183-192 - Duncan Cook, Jacky Hartnett, Kevin Manderson, Joel Scanlan:

Catching spam before it arrives: domain specific dynamic blacklists. 193-202 - Jason E. Holt:

Logcrypt: forward security and public verification for secure audit logs. 203-211 - Vijayakrishnan Pasupathinathan, Josef Pieprzyk, Huaxiong Wang, Joo Yeon Cho:

Formal analysis of card-based payment systems in mobile devices. 213-220 - Rupinder Gill, Jason Smith, Andrew J. Clark:

Experiences in passively detecting session hijacking attacks in IEEE 802.11 networks. 221-230

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














