{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T09:49:25Z","timestamp":1725875365774},"publisher-location":"London","reference-count":24,"publisher":"Springer London","isbn-type":[{"type":"print","value":"9781447121541"},{"type":"electronic","value":"9781447121558"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-1-4471-2155-8_52","type":"book-chapter","created":{"date-parts":[[2011,9,28]],"date-time":"2011-09-28T14:45:37Z","timestamp":1317221137000},"page":"411-418","source":"Crossref","is-referenced-by-count":4,"title":["Grid Security Loopholes with Proposed Countermeasures"],"prefix":"10.1007","author":[{"given":"Nureni Ayofe","family":"Azeez","sequence":"first","affiliation":[]},{"given":"Tiko","family":"Iyamu","sequence":"additional","affiliation":[]},{"given":"Isabella M.","family":"Venter","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2011,9,29]]},"reference":[{"key":"52_CR1","doi-asserted-by":"crossref","unstructured":"Alfawair, M., Aldabbas, O., Bartels, P., Zedan, H.: Grid Evolution. International, Conference on Computer Engineering and Systems (ICCES\u201907) (2007)","DOI":"10.1109\/ICCES.2007.4447042"},{"key":"52_CR2","volume-title":"Access Control Mechanism for Mobile Ad Hoc Network of Networks (MANoN)","author":"A-B Ali","year":"2009","unstructured":"Ali, A.-B., Hussein, Z., Fran\u00e7ois, S.: Access Control Mechanism for Mobile Ad Hoc Network of Networks (MANoN). Software Technology Research Laboratory De Montfort University, Leicester (2009)"},{"key":"52_CR3","unstructured":"Ayofe A.N., Osunade, O: Towards ameliorating cybercrime and cybersecurity. Int. J. Comput. Sci. Inf. Secur. USA (IJCSIS) 3(1), 153"},{"issue":"1","key":"52_CR4","first-page":"356","volume":"11","author":"N Azeez","year":"2010","unstructured":"Azeez, N., Azeez, R., Sulaimon, B., Atanda, F.: A framework for computer aided investigation of ATM fraud in Nigeria. Pac. J. Sci. Technol. USA 11(1), 356\u2013361 (2010)","journal-title":"Pac. J. Sci. Technol. USA"},{"key":"52_CR5","unstructured":"Benny, P., Tomas, S: Securing passwords against dictionary attacks. Accessed 18 Feb 2011, from \n                  www.pinkas.net\/PAPERS\/pwdweb.pdf"},{"key":"52_CR6","volume-title":"Authorisation in Grid computing Elsevier","author":"D Chadwick","year":"2005","unstructured":"Chadwick, D.: Authorisation in Grid computing Elsevier. University of Salford, UK (2005)"},{"key":"52_CR7","volume-title":"Grid Computing: Making the Global Infrastructure a Reality","author":"B Fran","year":"2005","unstructured":"Fran, B., Geoffrey, F., Anthony, J.G.: Grid Computing: Making the Global Infrastructure a Reality. Wiley and Sons Ltd, West Sussex (2005)"},{"key":"52_CR8","doi-asserted-by":"publisher","first-page":"702","DOI":"10.1016\/j.future.2007.01.002","volume":"23","author":"GGS Laccetti","year":"2007","unstructured":"Laccetti, G.G.S.: A framework model for grid security. ScienceDirect- Future Gener. Comput. Syst. 23, 702\u2013713 (2007)","journal-title":"ScienceDirect- Future Gener. Comput. Syst."},{"key":"52_CR9","doi-asserted-by":"publisher","first-page":"11","DOI":"10.3923\/rjit.2010.11.20","volume":"2","author":"M Hogue","year":"2010","unstructured":"Hogue, M., Avery, V.: Novel strategies to speed-up query response. Res. J. Inform. Technol. 2, 11\u201320 (2010)","journal-title":"Res. J. Inform. Technol."},{"key":"52_CR10","first-page":"70","volume-title":"Attribute-based authorization for grid computing. international conference on intelligent systems, modelling and simulation","author":"K Husam","year":"2010","unstructured":"Husam, K., Taha, O., Nasser, S.: Attribute-based authorization for grid computing. international conference on intelligent systems, modelling and simulation. IEEE Computer society, USA, pp. 70\u201374. (2010)"},{"issue":"2","key":"52_CR11","doi-asserted-by":"publisher","first-page":"115","DOI":"10.1177\/109434209701100205","volume":"11","author":"CK Ian Foster","year":"1997","unstructured":"Ian Foster, C.K., Kesselman, C.: Globus: A metacomputing infrastructure toolkit. 11. Int. J. Supercomput. Appl. High Perform. Comput. 11(2), 115\u2013128 (1997)","journal-title":"Int. J. Supercomput. Appl. High Perform. Comput."},{"key":"52_CR12","unstructured":"IASTED: International Association of Science and Technology for Development. \n                  www.iasted.com\n                  \n                . URL: \n                  http:\/\/www.iasted.org\/conferences\/2004\/Innsbruck\/pdcn.htm\n                  \n                . Accessed 2 Mar 2011 (2004)"},{"key":"52_CR13","unstructured":"Jianying, Z., Robert H., D., Feng, B.: Evolution of fair non-repudiation with TTP.In: ACISP \u201899 Proceedings of the 4th Australasian Conference on Information Security and Privacy. Springer, UK (1999)"},{"key":"52_CR14","unstructured":"Lalanal, K., Hal, A: Access Control is an Inadequate Framework for Privacy Protection MIT Computer Science and Artificial Intelligence lab, Cambridge. URL: \n                  www.w3.org\/2010\/api-privacy-ws\/papers\/privacy-ws-23.pdf\n                  \n                . Accessed 19 Feb 19 2011 (1990)"},{"key":"52_CR15","volume-title":"Hacking Exposed: Network Security secrets and solutions","author":"S McClure","year":"2003","unstructured":"McClure, S., Scambray, J., Kurtz, G.: Hacking Exposed: Network Security secrets and solutions. McGraw Hill, New York (2003)"},{"key":"52_CR16","unstructured":"Mohteshim, H.: Passive and Active attacks against Wireless LANS. URL: \n                  www.designmpire.com\/mohteshim.com\/projects\/anp.pdf\n                  \n                . Accessed 2 Mar 2011 (2005)"},{"key":"52_CR17","unstructured":"MSDN.: Data Confidentiality. Accessed 12 Feb 2011, from \n                  http:\/\/msdn.microsoft.com\/en-us\/library\/ff650720.aspx\n                  \n                 (2005)"},{"key":"52_CR18","unstructured":"Onieva, J.A., Zhou, J.: Secure multi-party non-repudiation protocols and applications. Institute for Infocomm Research, Singerpore. Springer (Security and Cryptology), 43:20. URL: \n                  http:\/\/portal.acm.org\/citation.cfm?id=1481008\n                  \n                . Accessed 28 Feb 2011 (2008)"},{"key":"52_CR19","doi-asserted-by":"publisher","first-page":"115","DOI":"10.3923\/rjit.2009.115.121","volume":"1","author":"V Prasannakumari","year":"2009","unstructured":"Prasannakumari, V.: A robust tamperproof watermarking for data integrity in relational databases. Res. J. Inform. Technol. 1, 115\u2013121 (2009)","journal-title":"Res. J. Inform. Technol."},{"key":"52_CR20","doi-asserted-by":"publisher","first-page":"228","DOI":"10.3923\/rjit.2010.228.234","volume":"2","author":"M Rasheed","year":"2010","unstructured":"Rasheed, M., Ghazali, O., Norwawi, N.: Server scanning worm detection by using intelligent failure connection algorithm. Res. J. Inform. Technol. 2, 228\u2013234 (2010)","journal-title":"Res. J. Inform. Technol."},{"key":"52_CR21","unstructured":"Welch D., Lathrop S.: Wireless security threat taxonomy. In: Proceedings of the 2003 IEEE workshop on information assuarance United States Military Academy West Point. NY URL: \n                  http:\/\/www.eecs.usma.edu\/webs\/people\/lathrop\/publications\/wirelessthreat_IEEE.pdf\n                  \n                . Accessed 8 Jan 2011 (2003)"},{"key":"52_CR22","unstructured":"William, S.: Network Security Essentials: Applicationsand Standards. Pearson Education Inc, \u00a0 (2002)"},{"key":"52_CR23","doi-asserted-by":"publisher","first-page":"86","DOI":"10.3923\/rjit.2009.86.93","volume":"1","author":"M Zanjani","year":"2010","unstructured":"Zanjani, M., Sakhaee, N., Shahbaznezhad, H.: Mechanisms of customer knowledge management in e-commerce websites. Res. J. Inform. Technol. 1, 86\u201393 (2010)","journal-title":"Res. J. Inform. Technol."},{"key":"52_CR24","first-page":"619","volume":"2","author":"S. Zhi-Dong","year":"2006","unstructured":"Zhi-Dong, S., Fei, Y.: Grid system integrated with trusted computing platform. IEEE 2, 619\u2013625 (2006)","journal-title":"IEEE"}],"container-title":["Computer and Information Sciences II"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-1-4471-2155-8_52","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,4,8]],"date-time":"2019-04-08T08:06:17Z","timestamp":1554710777000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-1-4471-2155-8_52"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9781447121541","9781447121558"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-1-4471-2155-8_52","relation":{},"subject":[],"published":{"date-parts":[[2011]]}}}