File:Example from "A Security Architecture for Computational Grids".png
Summary
| Description |
English: Example of a large-scale distributed computation:
user initiates a computation that accesses data and comput- ing resources at multiple locations |
| Date | |
| Source | article: A Security Architecture for Computational Grids |
| Author | Ian Foster, Carl Kesselman, Gene Tsudik, Steven Tuecke |
Licensing
This file is licensed under the Creative Commons Attribution-Share Alike 4.0 International license.
- You are free:
- to share – to copy, distribute and transmit the work
- to remix – to adapt the work
- Under the following conditions:
- attribution – You must give appropriate credit, provide a link to the license, and indicate if changes were made. You may do so in any reasonable manner, but not in any way that suggests the licensor endorses you or your use.
- share alike – If you remix, transform, or build upon the material, you must distribute your contributions under the same or compatible license as the original.