Security Mechanisms for Legacy Code Applications in GT3 Environment

  • Authors:
  • G. Terstyanszky;T. Delaitre;A. Goyeneche;T. Kiss;K. Sajadah;S. C. Winter;P. Kacsuk

  • Affiliations:
  • University of Westminster, London;University of Westminster, London;University of Westminster, London;University of Westminster, London;University of Westminster, London;University of Westminster, London;University of Westminster, London/ MTA SZTAKI Laboratory of Parallel and Distributed Systems, Hungary

  • Venue:
  • PDP '05 Proceedings of the 13th Euromicro Conference on Parallel, Distributed and Network-Based Processing
  • Year:
  • 2005

Quantified Score

Hi-index 0.00

Visualization

Abstract

The choice of the most suitable middleware technology for a specific problem or domain is sometimes erroneously based on current trends instead of on a thorough comparison of the features offered by the different options. This could be the case of grid ...