Legion: A Worldwide Virtual Computer
Home General Documentation Software Testbeds Et Cetera Map/Search
 

Security
References

[1] E. Belani, A. Vahdat, T. Anderson, and M. Dahlin. CRISIS: A wide area security architecture. In Seventh USENIX Security Symposium, January 1998.

[2] Adam Ferrari, Frederick Knabe, Marty Humphrey, Steve Chapin, and Andrew Grimshaw. A flexible security system for metacomputing environments. Technical Report CS-98-36, Department of Computer Science, University of Virginia, Charlottesville, Virginia, December 1998.

[3] Ian Foster, Carl Kesselman, Gene Tsudik, and Steven Tuecke. A security architecture for computational grids. In Fifth ACM Conference on Computers and Communications Security, November 1998.

[4] Li Gong, Marianne Mueller, Hemma Prafullchandra, and Roland Schemers. Going beyond the sandbox: An overview of the new security architecture in the Java development kit 1.2. In USENIX Symposium on Internet Technologies and Systems, pages 103--112, December 1997.

[5] Andrew S. Grimshaw and William A. Wulf. Legion: A view from 50,000 feet. In Fifth IEEE Symposium on High Performance Distributed Computing, August 1996.

[6] Andrew S. Grimshaw and William A. Wulf. The Legion vision of a worldwide virtual computer. Communications of the ACM, 40(1):39--45, January 1997.

[7] Mike Lewis and Andrew Grimshaw. The core Legion object model. In Fifth IEEE Symposium on High Performance Distributed Computing, August 1996.

[8] Object Management Group. CORBAservices: Common object services specification, security service specification. Version 97-12-12, 1998.

[9] C.L. Viles, M.J. Lewis, A.J. Ferrari, A. Nguyen-Tuong, and A.S. Grimshaw. Enabling flexibility in the legion run-time library. In International Conference on Parallel and Distributed Processing Techniques and Applications, pages 265--274, June 1997.

[10] William A. Wulf, Chenxi Wang, and Darrell Kienzle. A new model of security for distributed systems. Technical Report CS-95-34, Department of Computer Science, University of Virginia, Charlottesville, Virginia, August 1995.

Link Description
Introduction Introduction to the Legion security model
Architecture The fundamental elements of Legion architecture
Policy Examples Meeting site and application needs
Conclusions Summary
References List of references


 

[Home] [General] [Documentation] [Software]
[Testbeds] [Et Cetera] [Map/Search]

This work partially supported by DOE grant DE-FG02-96ER25290, Logicon (for the DoD HPCMOD/PET program) DAHC 94-96-C-0008, DOE D459000-16-3C, DARPA (GA) SC H607305A, NSF-NGS EIA-9974968, NSF-NPACI ASC-96-10920, and a grant from NASA-IPG.

legion@Virginia.edu
http://legion.virginia.edu/