Professional Documents
Culture Documents
R. Ramanujam and S. Ramaswamy (Eds.): ICDCIT 2012, LNCS 7154, pp. 253–254, 2012.
c Springer-Verlag Berlin Heidelberg 2012
254 M.L. Das
References
1. Foster, I., Kesselman, C., Tsudik, G., Tuecke, S.: A security architecture for compu-
tational grids. In: Proc. of the ACM Conference on Computer and Communications
Security, pp. 83–92 (1998)
2. The Globus Alliance. The Globus Project, http://www.globus.org/
3. Grid Software security. Components for Grid security,
http://www.globus.org/grid_software/security/
4. Chang, Y., Chang, C., Liu, Y.: Password authentication without the server public
key. IEICE Transactions on Communications E87-B(10), 3088–3091 (2004)
5. Yoon, E., Yoo, K.: An Efficient Password Authentication Scheme Without Using
the Server Public Key for Grid Computing. In: Zhuge, H., Fox, G.C. (eds.) GCC
2005. LNCS, vol. 3795, pp. 149–154. Springer, Heidelberg (2005)