{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T16:06:47Z","timestamp":1725552407964},"publisher-location":"Berlin, Heidelberg","reference-count":5,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540311584"},{"type":"electronic","value":"9783540324355"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11610496_75","type":"book-chapter","created":{"date-parts":[[2005,12,21]],"date-time":"2005-12-21T12:10:24Z","timestamp":1135167024000},"page":"573-582","source":"Crossref","is-referenced-by-count":0,"title":["Model and Simulation on Enhanced Grid Security and Privacy System"],"prefix":"10.1007","author":[{"given":"Jiong","family":"Yu","sequence":"first","affiliation":[]},{"given":"Xianhe","family":"Sun","sequence":"additional","affiliation":[]},{"given":"Yuanda","family":"Cao","sequence":"additional","affiliation":[]},{"given":"Yonggang","family":"Lin","sequence":"additional","affiliation":[]},{"given":"Changyou","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"1","key":"75_CR1","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11390-005-0001-9","volume":"20","author":"A.A. Chien","year":"2005","unstructured":"Chien, A.A., Sun, X.H., Xu, Z.W.: Viewpoints on Grid Standards. Journal of Computer Science & Technology\u00a020(1), 1\u20134 (2005)","journal-title":"Journal of Computer Science & Technology"},{"key":"75_CR2","volume-title":"The Grid 2: Blueprint for a New Computing Infrastructure","author":"K.C. Foster","year":"2004","unstructured":"Foster, K.C.: Concepts and Architecture. In: The Grid 2: Blueprint for a New Computing Infrastructure. Morgan Kaufmann Publishers, San Francisco (2004)"},{"key":"75_CR3","doi-asserted-by":"crossref","unstructured":"Raymond, J.: Traffic Analysis: Protocols, Attacks, Design Issues, and Open Problems. In: Federrath, H. (ed.), Anonymity (2000)","DOI":"10.1007\/3-540-44702-4_2"},{"key":"75_CR4","unstructured":"Song, R.G., Korba, L.: Review of Network-Based Approaches for Privacy. In: Proceedings of the 14th Annual Canadian Information Technology Security Symposium, Ottawa, Canada (2002)"},{"key":"75_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"171","DOI":"10.1007\/3-540-36086-7_16","volume-title":"Mobile Agents for Telecommunication Applications","author":"L. Korba","year":"2002","unstructured":"Korba, L., Song, R.G., Yee, G.: Anonymous Communications for Mobile Agents. In: Karmouch, A., Magedanz, T., Delgado, J. (eds.) MATA 2002. LNCS, vol.\u00a02521, pp. 171\u2013181. Springer, Heidelberg (2002)"}],"container-title":["Lecture Notes in Computer Science","Advanced Web and Network Technologies, and Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11610496_75.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T07:09:06Z","timestamp":1619507346000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11610496_75"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540311584","9783540324355"],"references-count":5,"URL":"https:\/\/doi.org\/10.1007\/11610496_75","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2006]]}}}