Return to Article Details THE METHODOLOGY FOR PROTECTING GRID ENVIRONMENTS FROM MALICIOUS CODE DURING THE EXECUTION OF COMPUTATIONAL TASKS Download Download PDF