[1]
P. Dabas, and A. Arya, "Grid computing: an introduction", Int. J. Adv. Res. Comput. Sci. Softw. Eng., vol. 3, pp. 466-470, 2013.
[2]
R. Buyya, and S. Venugopal, "A gentle introduction to grid computing and technologies", CSI Commun., vol. 29, pp. 9-19, 2005.
[3]
T. Foster, C. Kesselman, and S. Tuecke, "The anatomy of the grid: enabling scalable virtual organizations”, ", Int. J. High Perform. Comput. Appl., vol. 2150, pp. 6-7, 2001.
[4]
D. Olmedilla, O.F. Rana, B. Matthews, and W. Nejd, "Security and trust issues in semantic grids", In Proceedings of the Dagstuhl
Seminar, Semantic Grid: The Convergence of Technologies,
Oktavie-Allee, Germany,, 2005
[5]
S. Seema, A.V. Singh, and D. Sharma, "Classification of authorization systems in grid environment", In: International Advance Computing IEEE Conference IACC-2009 held at Thapar University Thapar , 2009, pp. 309-3098.
[6]
S. Seema, and D. Sharma, "An access control framework for grid environment", Indian J. Comput. Sci. Eng., vol. 2, pp. 937-948, 2012.
[7]
S. Singh, and S. Bawa, "A framework for handling security issues in grid environment using web services security specifications", Second International Conference on semantics, knowledge & Grid(SKG2006).Guilin, China, 2006, pp. 67-68.
[8]
Y. Xia, Y. Zheng, and Y. Li, A public grid computing framework based on a hierarchical combination of middleware.In Advanced Web and Network Technologies, and Applications..H.T. Shen, J. Li,
M. Li, J. Ni, and W. Wang, Ed. Berlin, Heidelberg, Springer, vol.
3842, 2006, pp. 682-689.
[9]
P. Arora, and H. Arora, "A review of various grid middleware technologies", In J. Adv. Res. Comput. Sci. Software Eng.. vol. 2,
pp. 6-11, 2012.
[10]
P. Rosemarry, P. Singhal, and R. Singh, "A study of various job & resource scheduling algorithms in grid computing", Int. J. Comput. Sci. Info. Technol., vol. 3, pp. 5504-5507, 2012.
[11]
R. Wankar, "Grid computing with globus: an overview and research challenges", Int. J. Comput. Sci. Appl., vol. 5, pp. 56-69, 2008.
[12]
M.A. Hussain, M. Naser, A.U. Begum, N. Shaik, and M. Shaik, "Datamining with grid computing concepts", Am. J. Eng. Res., vol. 4, pp. 256-260, 2015.
[13]
K.A. Manjula, and G. Raju, “A study on applications of grid computing in bioinformatics”, JCA Special Issue on Computer Aided Soft Computing Techniques for Imaging and Biomedical Applications., CASCT, 2010, pp. 69-72.
[14]
J.C. Browne, "Grid computing as applied distributed computation: A graduate seminar on Internet and grid computing", In: IEEE International Symposium on Cluster Computing and the Grid.2004, Chicago, IL, USA, 2004, pp. 239-245.
[15]
J. Cheng, and W. Li, "Research of the application of Grid computing on geographical information system", IEEE International Conference on Network Infrastructure and Digital Content.Beijing, China 2009
[16]
J. Andrade, M. Andersen, L. Berglund, and J. Odeberg, "Applications of grid computing in genetics and proteomics", In: Applied Parallel Computing. State of the Art in Scientific Computing..Lecture Notes in Computer Science, B. Kågström, E.
Elmroth, J. Dongarra, J. Waśniewski, Ed. Berlin, Heidelberg:
Springer, vol. 4699, 2006, pp. 791-798.
[17]
B.M. Boghosian, and P.V. Coveney, "Scientific applications of grid computing", Comput. Sci. Eng., vol. 7, pp. 10-13, 2005.
[18]
D. Sharma, S. Singh, and S. Mudgil, "An approach to find trustworthiness among different domains in a grid environment", Int. J. Adv. Res. Comput. Sci., vol. 1, pp. 474-482, 2010.
[19]
D. Sharma, S. Singh, A. Verma, and S. Mudgil, "A comprehensive approach to trust management in grid computing", IEEE International Conference IACC.Thapar University, Patiala, India,, 2009, pp. 3105-3110.
[20]
Z. Yan, and C. Prehofer, Autonomic trust management for a trustworthy system. U.S. Patent 20090049514A1, 2009.
[21]
S.T. Selvi, R. Kumar, P. Balakrishnan, R.A. Balachandar, K. Rajendar, J.S. Swarnapandian, G. Kannan, R. Rajiv, and E. Mahendran, A system and a method to access the trustworthiness of a resource provider.IP Patent 240895, 2010
[22]
P.S. Kumar, and S. Ramachandram, "Recent trust models in grid", J. Theor. Appl. Inf. Technol., vol. 26, pp. 64-68, 2011.
[23]
T. Grandison, and M. Sloman, "A survey of trust in internet applications", IEEE Comm. Surv. Tutor., vol. 3, pp. 2-16, 2000.
[24]
A.A. Rahman, and S. Hailes, "Supporting trust in virtual communities", Hawaii International Conference on System Sciences.Maui, HI, USA 2000, pp. 6007.
[25]
F. Azzedin, and M. Maheswaran, "Trust modeling for peer-to-peer based computing systems", In: Proceedings of the International Parallel and Distributed Processing Symposium.(IPDPS’03),
Linkoping, Sweden, Sweden, 2003, pp. 150.
[26]
S. Lee, R. Sherwood, and B. Bhattacharjee, Cooperative peer groups in NICEIn IEEE Infocom, San Francisco, CA,. 2003, pp.
1-17.
[27]
C. Lin, V. Varadharajan, Y. Wang, and V. Pruthi, "Enhancing grid security with trust management", In Proceedings of the 2004 IEEE International Conference on Services Computing.(SCC’04),
Shanghai, China, 2004, pp. 303-310.
[28]
Z. Liang, and W. Shi, "PET: A personalized trust model with reputation and risk evaluation for P2P resource sharing", In: Proceedings of the 38th Hawaii International Conference on System Sciences, Big Island, HI, USA, 2005, pp. 1-11.
[29]
J.R.D. Dyson, N.E. Griffiths, L.C. Keung, S.A. Jarvis, and G.R. Nudd, "Trusting agents for grid computing", IEEE International Conference on Systems, Man and Cybernetics.The Hague, Netherlands 2004, pp. 3187-3192
[30]
F. Azzedin, and M. Muthucumaru, "Evolving and managing trust in grid computing systems", In: Proceedings of the 2002 IEEE Canadian Conference on Electrical Computer EngineeringWinnipeg, Manitoba, Canada, . 2002, pp. 1-6.
[31]
S. Siadat, A.M. Rahmani, and M. Mohsenzadeh, "Proposed platform for improving grid security by trust management system", Int. J. Comput. Sci. Info. Secur, vol. 6, pp. 143-148, 2009.
[32]
A. Anitha, "Trust management in grid-trust assessment and trust degree calculation of a resource-a novel approach", J. Comput. Mediat. Commun., vol. 3, pp. 34-41, 2015.
[33]
P. Vivekananth, "Eigen trust algorithm for resource selection in grid computing", Int. J. Comput. Appl., vol. 16, pp. 50-54, 2011.
[34]
V. Vijayakumar, and R.S.D. Wahidabanu, "Performance evaluation of grid computing in trust related environment", Int. J. Comput. Sci. Info. Technol., vol. 2, pp. 2503-2506, 2011.
[35]
B.B. Kodada, R. Nayak, R. Prabhu, and D. Suresha, "Intrusion detection system inside grid computing environment (IDS-IGCE)", Int. J. Grid Comput. Appl., vol. 2, pp. 27-35, 2011.
[36]
M. Witold, " and J. lkowicz, “A grid-aware intrusion detection
system”, IMM- thesis, Technical University of Denmark, Kongens
Lyngby", 2007
[37]
T.F. Lunt, "Detecting intruders in computer system", In: Proceedings of the 1993 Conference on Auditing and Computer TechnologyMenlo Park, California, . 1993, pp. 1-17.
[38]
R. Alsoghayer, and K. Djemame, "Probabilistic risk assessment for resource provision in grids", Proceedings of the 25th UK Performance Engineering Workshop.Leeds, UK, 2009, pp. 99-110.
[39]
"C. Carlsson, and R. Fullér, “Risk assessment in grid computing", In Possibility for Decision, Studies in Fuzziness and Soft Computing.. Berlin, Heidelberg: Springer, vol. 270, 2011, pp. 145-165.
[40]
S. Abdelwahab, and A. Abraham, "Risk assessment for Grid Computing using Meta-Learning ensembles", In: Pattern Analysis, Intelligent Security and the Internet of Things, Advances in Intelligent Systems and Computing.. A. Abraham, A. Muda, Y. H.
Choo, Ed. Cham: Springer, vol. 355 2015, pp. 251-260.
[41]
F. Papalilo, Distributed trust management in grid computing environments., Philipps-Universität Marburg: Marburg, 2008.
[42]
J. Kohlas, and P.A. Monney, "Theory of evidence - a survey of its mathematical foundations, applications and computational anaylsis", Math. Methods Oper. Res., vol. 39, pp. 35-68, 1994.
[43]
A. Josang, "A logic for uncertain probabilities", In.J. Uncertain. Fuzz.. vol. 9, pp. 279-311, 2001.
[44]
A. Farouk, M.M. Fouad, and A.A. Abdelhafez, "Cross-domain identity trust management for grid computing", Int. J. Secur. Privacy Trust Manage., vol. 3, pp. 11-21, 2014.
[45]
M. Ashok, and S. Sathiyan, A parameterized framework of trust computation for grid resource broker., In Global Trends in Computing and Communication Systems, Communications in Computer and Information Science..P. V. Krishna, M. R. Babu, E.
Ariwa, Ed. Berlin, Heidelberg: Springer, vol. 269, 2012, pp. 178-
181.
[46]
M.N. Siddiqui, V. Saini, and R. Ahuja, "Trust management for grid environment using rule based fuzzy logic", Adv. Netw. Secur. Appl., vol. 196, pp. 649-657, 2011.