共 50 条
- [2] Strong authentication over Lock-Keeper [J]. SOFSEM 2008: THEORY AND PRACTICE OF COMPUTER SCIENCE, 2008, 4910 : 572 - 584
- [3] Implementing IDS Management on Lock-Keeper [J]. INFORMATION SECURITY PRACTICE AND EXPERIENCE, PROCEEDINGS: 5TH INTERNATIONAL CONFERENCE, ISPEC 2009, 2009, 5451 : 360 - 371
- [4] Design of Lock-Keeper Federated Authentication Gateway [J]. 11TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY, VOLS I-III, PROCEEDINGS,, 2009, : 1041 - 1046
- [5] A Specialized Tool for Simulating Lock-Keeper Data Transfer [J]. 2010 24TH IEEE INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS (AINA), 2010, : 182 - 189
- [6] A secure web services providing framework based on lock-keeper [J]. MANAGING NEXT GENERATION NETWORKS AND SERVICES, PROCEEDINGS, 2007, 4773 : 375 - +
- [7] A Theoretical Model of Lock-Keeper Data Exchange and its Practical Verification [J]. 2009 6TH IFIP INTERNATIONAL CONFERENCE ON NETWORK AND PARALLEL COMPUTING, 2009, : 190 - 196
- [8] A complete solution for highly secure data exchange: Lock-keeper and its advancements [J]. PARALLEL AND DISTRIBUTED COMPUTING, APPLICATIONS AND TECHNOLOGIES, PDCAT'2003, PROCEEDINGS, 2003, : 201 - 205
- [9] Scaling the Deployment of Virtual Machines in UnaCloud [J]. HIGH PERFORMANCE COMPUTING, 2018, 796 : 399 - 413
- [10] Elastic Provisioning of Virtual Machines for Container Deployment [J]. ICPE'17: COMPANION OF THE 2017 ACM/SPEC INTERNATIONAL CONFERENCE ON PERFORMANCE ENGINEERING, 2017, : 5 - 10