Abstract is missing.
- Improving the flexibility of active grids through web servicesLaurent Lefèvre, Paul Roe. 3-8 [doi]
- Towards dynamic data grid framework for eResearchA. B. M. Russel, Asad I. Khan. 9-16 [doi]
- Toward building grid applications in bioinformaticsXiujun Gong, Kensuke Nakamura, Kei Yura, Nobuhiro Go. 17-23 [doi]
- Improving resource utilisation in market oriented grid management and schedulingKris Bubendorfer. 25-31 [doi]
- An agent-based peer-to-peer grid computing architecture: convergence of grid and peer-to-peer computingJia Tang, Minjie Zhang. 33-39 [doi]
- Grid-JQA: grid Java based quality of service management by active databaseLeili Mohammad Khanli, M. Analoui. 41-45 [doi]
- Building computational grids with apple s Xgrid middlewareBaden Hughes. 47-54 [doi]
- A template based static coalition protocol: a:::3P::: viGridAvinash Shankaranarayanan, Frank K. H. A. Dehne, Andrew Lewis. 55-62 [doi]
- Simulating a computational grid with networked animat agentsKenneth A. Hawick, Heath A. James. 63-70 [doi]
- Redundant parallel data transfer schemes for the grid environmentRaghuvel S. Bhuvaneswaran, Yoshiaki Katayama, Naohisa Takahashi. 71-78 [doi]
- A simplified approach to web service developmentPeter M. Kelly, Paul D. Coddington, Andrew L. Wendelborn. 79-88 [doi]
- Distributed intrusion detection in clusters based on non-interferenceJacob Zimmermann, George M. Mohay. 89-95 [doi]
- Key research issues in grid workflow verification and validationJinjun Chen, Yun Yang. 97-104 [doi]
- EGEE: building a pan-European grid training organisationRüdiger Berlich, Markus Hardt, Marcel Kunze, Malcolm P. Atkinson, David Fergusson. 105-111 [doi]
- Analysis of traceback techniquesUdaya Kiran Tupakula, Vijay Varadharajan. 115-124 [doi]
- Modelling denial of service attacks on JFK with Meadows s cost-based frameworkJason Smith, Juan Manuel González Nieto, Colin Boyd. 125-134 [doi]
- Synapse: auto-correlation and dynamic attack redirection in an immunologically-inspired IDSDavid Duncombe, George M. Mohay, Andrew Clark. 135-144 [doi]
- Event sequence mining to develop profiles for computer forensic investigation purposesTamas Abraham. 145-153 [doi]
- Formal analysis of secure contracting protocol for e-tenderingRong Du, Ernest Foo, Colin Boyd, Kim-Kwang Raymond Choo. 155-164 [doi]
- A method for access authorisation through delegation networksAudun Jøsang, Dieter Gollmann, Richard Au. 165-174 [doi]
- Description of bad-signatures for network intrusion detectionMichael Hilker, Christoph Schommer. 175-182 [doi]
- SKMA: a key management architecture for SCADA systemsRobert Dawson, Colin Boyd, Ed Dawson, Juan Manuel González Nieto. 183-192 [doi]
- Catching spam before it arrives: domain specific dynamic blacklistsDuncan Cook, Jacky Hartnett, Kevin Manderson, Joel Scanlan. 193-202 [doi]
- Logcrypt: forward security and public verification for secure audit logsJason E. Holt. 203-211 [doi]
- Formal analysis of card-based payment systems in mobile devicesVijayakrishnan Pasupathinathan, Josef Pieprzyk, Huaxiong Wang, Joo Yeon Cho. 213-220 [doi]
- Experiences in passively detecting session hijacking attacks in IEEE 802.11 networksRupinder Gill, Jason Smith, Andrew Clark. 221-230 [doi]