We investigate security at the same time as the functional requirements by refining and integrating use, misuse, and mitigation use cases. Security requirements
One of the interesting topics in grid computing systems is resources discovery. After the failure of a resource in a chain of resources made for a specific task