A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is
A central security requirement for grid computing can be referred to as behaviour conformity. This is an assurance that ad hoc related principals (users, platforms or instruments) forming a grid virtual organisation (VO) must each act in conformity with the rules for the VO constitution. Existing grid security practice has little means to enforce behaviour conformity and consequently falls short of satisfactory solutions to a number of problems. Trusted Computing (TC) technology can add to griddoi:10.1145/1179474.1179486 dblp:conf/ccs/MaoYC06 fatcat:lzdyiwm4k5dp3opoonhidxrose