Author of the publication

Towards a Grid-wide Intrusion Detection System.

, and . EGC, volume 3470 of Lecture Notes in Computer Science, page 275-284. Springer, (2005)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On-demand Trust Evaluation., and . GRID, page 144-151. IEEE Computer Society, (2006)The Back-End of a Two-Layer Model for a Federated National Datastore for Academic Research VOs that Integrates EGEE Data Management., , , , , , , , and . J. Grid Comput., 8 (2): 341-364 (2010)International Grid CA Interworking, Peer Review and Policy Management Through the European DataGrid Certification Authority Coordination Group., , , , , , , , , and 16 other author(s). EGC, volume 3470 of Lecture Notes in Computer Science, page 285-295. Springer, (2005)Evaluating trust in grid certificates., , and . SAC, page 1449-1450. ACM, (2010)A Transparent Grid Filesystem., , , , , , and . PARA, volume 4699 of Lecture Notes in Computer Science, page 309-318. Springer, (2006)The next generation Grid: an infrastructure for global business systems., and . IJBIS, 6 (1): 95-110 (2010)A prototype of a social and economic based resource allocation system in grid computing., , and . ISPDC, page 77-84. IEEE Computer Society, (2007)Stable Disk - A Fault Tolerant Cached RAID Subsystem., and . Hardware and Software Architectures for Fault Tolerance, volume 774 of Lecture Notes in Computer Science, page 78-90. Springer, (1993)Optimal Performance State Estimation of Compute Systems., and . MASCOTS, page 511-516. IEEE Computer Society, (2005)R-GMA: First results after deployment, , , , , , , , , and 11 other author(s). CoRR, (2003)