Back to Results
First PageMeta Content
Grid computing / GLite / Middleware / Vulnerability / Voms / Secure coding / Defensive programming / Computing / Computer security / Cyberwarfare


Secure Coding Practices for Middleware Barton P. Miller James A. Kupsch Elisa Heymann
Add to Reading List

Document Date: 2012-11-01 12:06:00


Open Document

File Size: 2,98 MB

Share Result on Facebook

Company

ARGUS / Google / San Diego Supercomputing Center / /

Country

United States / /

/

Facility

University of Wisconsin DBMS Storage / University of Wisconsin Batch / Middleware Barton P. Miller James A. Kupsch Elisa Heymann Computer Sciences Department University of Wisconsin Computer Architecture / /

IndustryTerm

cloud/grid software / Web management interface / Web Attacks / Web browser / /

Organization

North Atlantic Treaty Organization / University of Wisconsin DBMS Storage of Condor Operational and Historical Data / University of Wisconsin Batch / Univ. of Wisconsin Restricted Identity Switching Module / National Science Foundation / SWITCH gLite Authorization Service / Spanish Government / Universitat / European Commission / Department of Homeland Security / Universitat Autònoma de Barcelona Resource Mgr / Middleware Barton P. Miller James A. Kupsch Elisa Heymann Computer Sciences Department University of Wisconsin Computer Architecture / /

Person

Karl Mazurak Daniel Crowell Wenbin / Barton P. Miller James / Elisa Heymann Eduardo Cesar Jairo / Manuel Brugnoli Bart Miller Jim / /

Position

SDSC Storage Resource Broker / /

ProgrammingLanguage

Perl / Perl 6 / Bourne Shell / Java / PHP / Python / C++ / /

Technology

PHP / Java / Virtual Organization / wireshark.org Network Protocol / Perl / DBMS / Operating Systems / /

URL

http /

SocialTag