{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T16:12:45Z","timestamp":1725552765737},"publisher-location":"Berlin, Heidelberg","reference-count":12,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540308195"},{"type":"electronic","value":"9783540315988"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1007\/11596981_68","type":"book-chapter","created":{"date-parts":[[2006,6,17]],"date-time":"2006-06-17T14:42:27Z","timestamp":1150555347000},"page":"463-468","source":"Crossref","is-referenced-by-count":0,"title":["A Scheduling Algorithm Based on a Trust Mechanism in Grid"],"prefix":"10.1007","author":[{"given":"Kenli","family":"Li","sequence":"first","affiliation":[]},{"given":"Yan","family":"He","sequence":"additional","affiliation":[]},{"given":"Renfa","family":"Li","sequence":"additional","affiliation":[]},{"given":"Tao","family":"Yang","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"68_CR1","volume-title":"The Grid: Blueprint for a Future Computing Infrastructure","author":"I. Foster","year":"1999","unstructured":"Foster, I., Kesselman, C.: The Grid: Blueprint for a Future Computing Infrastructure. Morgan Kaufmann Publishers, San Francisco (1999)"},{"key":"68_CR2","unstructured":"Lin, C., Varadrajan, V., Wang, Y.: Enhancing Grid Security with Trust Management. In: Proceedings of the 2004 IEEE International Conference on Services Computing (2004)"},{"key":"68_CR3","unstructured":"Buyya, R., Murshed, M.: A Deadline and Budget Constrained Cost-Time Optimisation Algorithm for Scheduling Task. Farming Applications on Global Grids CoRR cs.DC\/0203020 (2002)"},{"key":"68_CR4","volume-title":"Proceedings of the 19th IEEE International Parallel and Distributed Processing Symposium","author":"S. Song","year":"2005","unstructured":"Song, S., Kwok, Y., Hwang, K.: Security-Driven Heuristics and a Fast Genetic Algorithm for Trusted Grid Job Scheduling. In: Proceedings of the 19th IEEE International Parallel and Distributed Processing Symposium. IEEE Computer Society, Los Alamitos (2005)"},{"issue":"10","key":"68_CR5","doi-asserted-by":"publisher","first-page":"1006","DOI":"10.1016\/S0743-7315(03)00100-X","volume":"63","author":"A.R. Butt","year":"2003","unstructured":"Butt, A.R., Adabala, S., Kapadia, N.H., Figueiredo, R., Fortes, J.A.B.: Grid-computing portals and security issues. Journal of Parallel and Distributed Computing\u00a063(10), 1006\u20131014 (2003)","journal-title":"Journal of Parallel and Distributed Computing"},{"key":"68_CR6","doi-asserted-by":"crossref","unstructured":"Butt, A.R., Adabala, S., Kapadia, N.H., Figueiredo, R., Fortes, J.A.B.: Fine-grain access control for securing shared resources in computational grids. In: Proc. of Int. Parallel and Distributed Processing Symposium (IPDPS 2002) (April 2002)","DOI":"10.1109\/IPDPS.2002.1015496"},{"key":"68_CR7","doi-asserted-by":"crossref","unstructured":"Azzedin, F., Maheswaran, M.: Integrating Trust into Grid Resource Management Systems. In: Proceedings of the International Conference on Parallel Processing (2002)","DOI":"10.1109\/ICPP.2002.1040858"},{"key":"68_CR8","volume-title":"Proceedings of IEEE 18th International Parallel & Distributed Processing Symposium","author":"J.H. Abawajy","year":"2004","unstructured":"Abawajy, J.H.: Fault-Tolerant Scheduling Policy for Grid Computing Systems. In: Proceedings of IEEE 18th International Parallel & Distributed Processing Symposium. IEEE Computer Society, Los Alamitos (2004)"},{"key":"68_CR9","doi-asserted-by":"crossref","unstructured":"Azzedin, F., Maheswaran, M.: Towards Trust-Aware Resource Management in Grid Computing Systems. In: Proc. of Int\u2019l Symp. on Cluster Computing and the Grid, Germany (2002)","DOI":"10.1109\/CCGRID.2002.1017189"},{"key":"68_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"9","DOI":"10.1007\/978-3-540-30141-7_6","volume-title":"Network and Parallel Computing","author":"S. Song","year":"2004","unstructured":"Song, S., Hwang, K., Macwan, M.: Fuzzy Trust Integration for Security Enforcement in Grid Computing. In: Jin, H., Gao, G.R., Xu, Z., Chen, H. (eds.) NPC 2004. LNCS, vol.\u00a03222, pp. 9\u201321. Springer, Heidelberg (2004)"},{"key":"68_CR11","first-page":"1273","volume-title":"Proceedings of the 12th Intemational World Wide Web Conference (WWW 2003)","author":"S.D. Kamvar","year":"2003","unstructured":"Kamvar, S.D., Schlosser, M.T., Garcia-Molna, H.: The EigenTrust Algorithm for Reputation Management in P2P Networks. In: Proceedings of the 12th Intemational World Wide Web Conference (WWW 2003), pp. 1273\u20131279. ACM Press, New York (2003)"},{"key":"68_CR12","doi-asserted-by":"crossref","unstructured":"Viswanathan, S., Veeravalli, B.: Design and Analysis of a Dynamic Scheduling Strategy with Resource Estimation for Large-Scale Grid Systems. In: Proceedings of the Fifth IEEE\/ACM International Workshop on Grid Computing (GRID 2004) (2004)","DOI":"10.1109\/GRID.2004.19"}],"container-title":["Lecture Notes in Computer Science","Computational Intelligence and Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11596981_68.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T06:57:32Z","timestamp":1619506652000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11596981_68"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"ISBN":["9783540308195","9783540315988"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/11596981_68","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2005]]}}}