REFERENCES
Bhanwar, S. and S. Bawa (2008). Securing a Grid. World
Academy of Science, Engineering and Technology.
Bresciani, P., P. Giorgini, et al. (2004). "TROPOS: An
agent-oriented software development methodology."
Journal of Autonomous Agents and Multi-Agent
Systems 8(3): 203-236.
Bruneo, D., M. Scarpa, et al. (2003). Communication
paradigms for mobile grid users. 3rd IEEE/ACM
International Symposium on Cluster Computing and
the Grid (CCGRID'03).
Chapin, S., C. Wang, et al. (1999). "A New Model of
Security for Metasystems." Future Generation
Computer Systems 15(5-6): 713-722.
Chu, D. and M. Humphrey (2004). Mobile OGSI.NET:
Grid computing on mobile devices. 5th IEEE/ACM
International Workshop on Grid Computing -
Grid2004 (at Supercomputing 2004).
Dail, H., O. Sievert, et al. (2004). Scheduling In The Grid
Application Development Software Project. Grid
resource management: state of the art and future
trends: 73-98.
Devanbu, P. T. and S. G. Stubblebine (2000). Software
engineering for security. 22th International
Conference on Software Engineering, ACM Press.
Enterprise Grid Alliance Security Working Group. (2005,
8 July 2005). "Enterprise Grid Security Requirements
Version 1.0."
Ferrari, A., Knabe, F., Humphrey, M., Chapin, S.,
Grimshaw, A. (1998). A Flexible Security System for
Metacomputing Environments. T. R. CS-98-36,
Department of Computer Science. Univ. of Virginia.
Flechais, I., M. A. Sasse, et al. (2003). Bringing Security
Home: A process for developing secure and usable
systems. New Security Paradigms Workshop
(NSPW'03), Ascona, Switzerland.
Foster, I. and C. Kesselman (2004). The Grid2: Blueprint
for a Future Computing Infrastructure. San Francisco,
CA, Morgan Kaufmann Publishers; 2 edition.
Foster, I., C. Kesselman, et al. (2002). The Physiology of
the Grid: An Open Grid Services Architecture for
Distributed Systems Integration. Open Grid Service
Infrastructure WG, Global Grid Forum.
Foster, I., C. Kesselman, et al. (1998). A Security
Architecture for Computational Grids. 5th Conference
on Computer and Communications Security, San
Francisco, USA, ACM Press.
Giorgini, P., H. Mouratidis, et al. (2007). Modelling
Security and Trust with Secure Tropos. Integrating
Security and Software Engineering: Advances and
Future Visions. H. M. a. P. Giorgini, Idea Group
Publishing: 160-189.
Hans A. Franke, Fernando L. Koch, et al. (2007). Grid-M:
Middleware to Integrate Mobile Devices, Sensors and
Grid Computing. Third International Conference on
Wireless and Mobile Communications (ICWMC'07)
Guadeloupe, French Caribbean.
Jurjens, J. (2001). Towards Development of Secure
Systems Using UMLsec. Fundamental Approaches to
Software Engineering (FASE/ETAPS).
Kitchenham, B. (2007). Guideline for performing
Systematic Literature Reviews in Software
Engineering. Version 2.3, University of Keele
(Software Engineering Group, School of Computer
Science and Mathematics) and Durham (Department
of Conputer Science).
Kolonay, R. and M. Sobolewski (2004). Grid Interactive
Service-oriented Programming Environment.
Concurrent Engineering: The Worldwide Engineering
Grid, Tsinghua, China, Press and Springer Verlag.
Kruchten, P. (2000). The Rational Unified Process: An
Introduction, Addison-Wesley.
Open Grid Forum (2006). The Open Grid Services
Architecture, Version 1.5.
Phan, T., L. Huang, et al. (2005). Chapter 5: Integrating
Mobile Wireless Devices Into the Computational Grid.
Mobile Computing Handbook. M. Ilyas and I.
Mahgoub, Auerbach Publications.
Sajjad, A., H. Jameel, et al. (2005). AutoMAGI - an
Autonomic middleware for enabling Mobile Access to
Grid Infrastructure. Joint International Conference on
Autonomic and Autonomous Systems and International
Conference on Networking and Services.
Sastry, M., R. Krishnan, et al. (2007). A New Modeling
Paradigm for Dynamic Authorization in Multi-Domain
Systems. Fourth International Conference on
Mathematical Methods, Models, and Architectures for
Computer Network Security. Saint Petersburg, Russia.
Steel, C., R. Nagappan, et al. (2005). Chapter 8. The
Alchemy of Security Design Methodology, Patterns,
and Reality Checks. Core Security Patterns:Best
Practices and Strategies for J2EE, Web Services, and
Identity Management, Prentice Hall: 1088.
Talukder, A. and R. Yavagal (2006). Chapter 18: Security
issues in mobile computing. Mobile Computing,
McGraw-Hill Professional.
Trung, T. M., Y.-H. Moon, et al. (2005). A Gateway
Replication Scheme for Improving the Reliability of
Mobile-to-Grid Services. IEEE International
Conference on e-Business Engineering (ICEBE'05).
van Steen, M., P. Homburg, et al. (1999). "Globe: A
Wide-Area Distributed System." IEEE Concurrency:
70-78.
Weippl, E., A. Holzinger, et al. (2006). "Security aspects
of ubiquitous computing in health care."
Elektrotechnik und Informationstechnik 123(4):156-
161.
Welch, V., F. Siebenlist, et al. (2003). Security for Grid
services. 12th IEEE International Symposium on High
Performance Distributed Computing (HPDC-12 '03),
IEEE Computer Society.
ICSOFT 2010 - 5th International Conference on Software and Data Technologies
138