3 globus web site httpwwwglobusorg 4 condor web site 5

Info icon This preview shows pages 10–12. Sign up to view the full content.

View Full Document Right Arrow Icon
[3] Globus web site, http://www.globus.org [4] Condor web site, http://www.cs.wisc.edu/condor [5] Checkpoint web site, http://www.checkpoint.com
Image of page 10

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
[6] Douglas Thain and Miron Livny, "Multiple Bypass: Interposition Agents for Distributed Computing", The Journal of Cluster Computing , Volume 4, 2001, pp 39-47. [7] Douglas Thain and Miron Livny, "Parrot: Transparent User-Level Middleware for Data-Intensive Computing", Workshop on Adaptive Grid Middleware , New Orleans, Louisiana, September 2003. [8] V. Paxson, Bro: a system for detecting network intruders in real-time. Computer Networks, 31(23/24), Dec. 1999. [9] Netfilter web site, http://www.netfilter.org [10] S. Son, M. Livny, “Recovering Internet Symmetry in Distributed Computing.” Proceedings of the 3rd International Symposium on Cluster Computing and the Grid , Tokyo, Japan, May 2003. [11] J. Rosenberg, J. Weinberger, C. Huitema, R. Mahy , “STUN – Simple Traversal of User Data Gram (UDP) Through Network Address Translators (NATs),” IETF RFC 3489 , March 2003. [12] J. Rosenberg, R. Mahy, C. Huitema, “Traversal Using Relay NAT (TURN),” Internet-Draft , July 2004. [13] P. Srisuresh et al., “Middlebox Communication Architecture and Framework,” IETF RFC 3303 , Aug. 2002. [14] M. Leech, M.Ganis, Y. Lee, R. Kuris, D. Koblas, L. Jones, “SOCKS Protocol Version 5,” IETF RFC 1928, March 1996. [15] D. R. Cheriton, M. Gritter, “TRIAD: A New Next Generation Internet Architecture,” March 2000. http://www- dsg.stanford.edu/triad/triad.ps.gz . [16] P. Francis, R. Gummadi, “IPNL: A NAT-Extended Internet Architecture,” SIGCOMM’01 , Aug. 27, 2001. [17] S. Deering, R. Hinden, “Internet Protocol, Version 6 (IPv6) Specification,” IETF RFC 2460 , Dec. 1988. [18] UPnP website, http://www.upnp.org [19] Port Knocking website, http://www.portknocking.org [20] M. S. Borella, G. E. Montenegro, “RSIP: Address Sharing with End-to-End Security”, Special Workshop on Intelligence at the Network Edge, San Francisco, 2000. [21] M. Borella, J. Lo, D. Grabelsky, G. Montenegro, “Realm Specific IP: Framework”, IETF RFC 3102 , July 2000. [22] D. Anderson, et el. “Resilient Overlay Networks,” 18 th ACM Symposium on Operating Systems Principles (SOSP) , Banff, Canada, Oct. 2001.
Image of page 11
Image of page 12
This is the end of the preview. Sign up to access the rest of the document.

{[ snackBarMessage ]}

What students are saying

  • Left Quote Icon

    As a current student on this bumpy collegiate pathway, I stumbled upon Course Hero, where I can find study resources for nearly all my courses, get online help from tutors 24/7, and even share my old projects, papers, and lecture notes with other students.

    Student Picture

    Kiran Temple University Fox School of Business ‘17, Course Hero Intern

  • Left Quote Icon

    I cannot even describe how much Course Hero helped me this summer. It’s truly become something I can always rely on and help me. In the end, I was not only able to survive summer classes, but I was able to thrive thanks to Course Hero.

    Student Picture

    Dana University of Pennsylvania ‘17, Course Hero Intern

  • Left Quote Icon

    The ability to access any university’s resources through Course Hero proved invaluable in my case. I was behind on Tulane coursework and actually used UCLA’s materials to help me move forward and get everything together on time.

    Student Picture

    Jill Tulane University ‘16, Course Hero Intern