{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T17:26:33Z","timestamp":1725470793682},"publisher-location":"Berlin, Heidelberg","reference-count":10,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540459071"},{"type":"electronic","value":"9783540459095"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11881223_14","type":"book-chapter","created":{"date-parts":[[2006,9,22]],"date-time":"2006-09-22T15:45:14Z","timestamp":1158939914000},"page":"110-113","source":"Crossref","is-referenced-by-count":0,"title":["Family Gene Based Grid Trust Model"],"prefix":"10.1007","author":[{"given":"Tiefang","family":"Wang","sequence":"first","affiliation":[]},{"given":"Tao","family":"Li","sequence":"additional","affiliation":[]},{"given":"Xun","family":"Gong","sequence":"additional","affiliation":[]},{"given":"Jin","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Xiaoqin","family":"Hu","sequence":"additional","affiliation":[]},{"given":"Diangang","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Hui","family":"Zhao","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"14_CR1","doi-asserted-by":"crossref","unstructured":"Krauter, R.B.K., Maheswaran, M.: A taxonomy and survey of grid resource management systems software practice and experience\u00a032(2), pp. 135\u2013164 (February 2002)","DOI":"10.1002\/spe.432"},{"key":"14_CR2","doi-asserted-by":"crossref","unstructured":"Foster, C.K.I., Tuecke, S.: The anatomy of the grid: Enabling scalable virtual organizations. International Journal of Supercomputer Applications (2001)","DOI":"10.1177\/109434200101500302"},{"key":"14_CR3","doi-asserted-by":"crossref","unstructured":"Chadwick, D.W., Otenko, A., Ball, E.: Role-based Access Control with X.509 Attribute Certificates. IEEE Internet Computing, 62\u201369 (March-April 2003)","DOI":"10.1109\/MIC.2003.1189190"},{"key":"14_CR4","doi-asserted-by":"crossref","unstructured":"Tuecke, S., et al.: Internet X.509 Public Key Infrastructure (PKI) Proxy Certificate Profile (RFC 3820). IETF Network WG (June 2004), http:\/\/www.ietf.org\/rfc\/rfc3820.txt","DOI":"10.17487\/rfc3820"},{"key":"14_CR5","doi-asserted-by":"publisher","first-page":"1063","DOI":"10.1126\/science.1086743","volume":"301","author":"G.L. Woods","year":"2003","unstructured":"Woods, G.L., et al.: A mule cloned from fetal cells by nuclear transfer. Science\u00a0301, 1063 (2003)","journal-title":"Science"},{"key":"14_CR6","volume-title":"Computer Immunology","author":"T. Li","year":"2004","unstructured":"Li, T.: Computer Immunology. Publishing House of Electronics Industry, Beijing (2004)"},{"key":"14_CR7","doi-asserted-by":"publisher","first-page":"2650","DOI":"10.1360\/982005-62","volume":"50","author":"T. Li","year":"2005","unstructured":"Li, T.: An immune based dynamic intrusion detection model. Chinese Science Bulletin\u00a050, 2650\u20132657 (2005)","journal-title":"Chinese Science Bulletin"},{"key":"14_CR8","doi-asserted-by":"publisher","first-page":"557","DOI":"10.1360\/04yf0140","volume":"48","author":"T. Li","year":"2005","unstructured":"Li, T.: An immunity based network security risk estimation. Science in China Ser. F. Information Sciences\u00a048, 557\u2013578 (2005)","journal-title":"Science in China Ser. F. Information Sciences"},{"key":"14_CR9","doi-asserted-by":"publisher","first-page":"379","DOI":"10.2174\/1566523023347814","volume":"2","author":"O. Mazda","year":"2002","unstructured":"Mazda, O.: Improvement of nonviral gene therapy by Epstein-Barr virus (EBV)-based plasmid vectors. Curr. Gene. Ther.\u00a02, 379\u2013392 (2002)","journal-title":"Curr. Gene. Ther."},{"key":"14_CR10","unstructured":"Murshed, M., Buyya, R., Abramson, D.: GridSim: A Grid Simulation Toolkit for Resource Management and Scheduling in Large-Scale Grid Computing Environments. In: Proc. of the 17th IEEE International Symposium on Parallel and Distributed (2002)"}],"container-title":["Lecture Notes in Computer Science","Advances in Natural Computation"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11881223_14.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,17]],"date-time":"2020-11-17T19:50:44Z","timestamp":1605642644000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11881223_14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540459071","9783540459095"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/11881223_14","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2006]]}}}