{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,2]],"date-time":"2025-05-02T09:10:02Z","timestamp":1746177002649,"version":"3.40.4"},"publisher-location":"Cham","reference-count":60,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319066769"},{"type":"electronic","value":"9783319066776"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-06677-6_3","type":"book-chapter","created":{"date-parts":[[2014,4,7]],"date-time":"2014-04-07T03:39:36Z","timestamp":1396841976000},"page":"18-34","source":"Crossref","is-referenced-by-count":0,"title":["User Management in Information Security Engineering Environment ISEE"],"prefix":"10.1007","author":[{"given":"Yuichi","family":"Goto","sequence":"first","affiliation":[]},{"given":"Liqing","family":"Xu","sequence":"additional","affiliation":[]},{"given":"Ning","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Jingde","family":"Cheng","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"3_CR1","unstructured":"Apache Software Foundation: Apache Subversion, http:\/\/subversion.apache.org\/ (accessed at Febraury 19, 2014)"},{"key":"3_CR2","doi-asserted-by":"crossref","unstructured":"Bao, D., Miura, J., Zhang, N., Goto, Y., Cheng, J.: Supporting Verification and Validation of Security Targets with ISO\/IEC 15408. In: The 2nd International Conference on Mechatronic Sciences, Electric Engineering and Computer (MEC 2013), Shenyang, China, pp. 2621\u20132628. IEEE (2013)","DOI":"10.1109\/MEC.2013.6885475"},{"key":"3_CR3","unstructured":"Brown, W.J., Malveau, R.C., McCormick, H.W., Mowbray, T.J.: AntiPatterns: Refactoring Software, Architectures, and Projects in Crisis. John Wiley & Sons, Inc. (1998)"},{"key":"3_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"732","DOI":"10.1007\/978-3-540-24679-4_126","volume-title":"Grid and Cooperative Computing","author":"B. Chen","year":"2004","unstructured":"Chen, B., Chi, X., Wu, H.: A Model for User Management in Grid Computing Environments. In: Li, M., Sun, X., Deng, Q., Ni, J. (eds.) GCC 2003, Part I. LNCS, vol.\u00a03032, pp. 732\u2013737. Springer, Heidelberg (2004)"},{"key":"3_CR5","unstructured":"Cheng, J.: Anticipatory Reasoning-Reacting Systems. In: International Conference on Systems, Development and Self-organization, Beijing, China, pp. 161\u2013165 (2002)"},{"key":"3_CR6","doi-asserted-by":"crossref","unstructured":"Cheng, J.: Temporal Relevant Logic as the Logical Basis of Anticipatory Reasoning-Reacting Systems. In: Dubois, D.M. (ed.) Computing Anticipatory Systems: CASYS 2003 - Sixth International Conference, Liege, Belgium, August 11-16. AIP Conference Proceedings, vol.\u00a0718, pp. 362\u2013375. American Institute of Physics (2004)","DOI":"10.1063\/1.1787339"},{"key":"3_CR7","doi-asserted-by":"crossref","unstructured":"Cheng, J.: Temporal Deontic Relevant Logic as the Logical Basis for Decision Making Based on Anticipatory Reasoning. In: 2006 IEEE International Conference on Systems, Man and Cybernetics, Taipei, Taiwan, pp. 1036\u20131041. IEEE Systems, Man, and Cybernetics Society (2006)","DOI":"10.1109\/ICSMC.2006.384536"},{"key":"3_CR8","doi-asserted-by":"crossref","unstructured":"Cheng, J.: Adaptive Prediction by Anticipatory Reasoning Based on Temporal Relevant Logic. In: 2008 Eighth International Conference on Hybrid Intelligent Systems, Barcelona, Spain, pp. 410\u2013416. IEEE (2008)","DOI":"10.1109\/HIS.2008.118"},{"key":"3_CR9","doi-asserted-by":"crossref","unstructured":"Cheng, J., Goto, Y., Horie, D.: ISEE: An Information Security Engineering Environment. In: International Conference on Security and Cryptography, Milan, Italy, pp. 395\u2013400. INSTICC Press (2009)","DOI":"10.5220\/0002242103950400"},{"key":"3_CR10","doi-asserted-by":"crossref","unstructured":"Cheng, J., Goto, Y., Kitajima, N.: Anticipatory Reasoning about Mobile Objects in Anticipatory Reasoning-Reacting Systems. In: Dubois, D.M. (ed.) Computing Anticipatory Systems: CASYS 2007 - Eighth International Conference. AIP Conference Proceedings, vol.\u00a0718, pp. 244\u2013254. American Institute of Physics (2008)","DOI":"10.1063\/1.3020663"},{"key":"3_CR11","doi-asserted-by":"crossref","unstructured":"Cheng, J., Goto, Y., Morimoto, S., Horie, D.: A Security Engineering Environment Based on ISO\/IEC Standards: Providing Standard, Formal, and Consistent Supports for Design, Development, Operation, and Maintenance of Secure Information Systems. In: The 2nd International Conference on Information Security and Assurance, Busan, Korea, pp. 350\u2013354. IEEE Computer Society (2008)","DOI":"10.1109\/ISA.2008.106"},{"key":"3_CR12","series-title":"Lecture Notes in Artificial Intelligence","doi-asserted-by":"publisher","first-page":"444","DOI":"10.1007\/978-3-540-74827-4_56","volume-title":"Knowledge-Based Intelligent Information and Engineering Systems","author":"J. Cheng","year":"2007","unstructured":"Cheng, J., Nara, S., Goto, Y.: FreeEnCal: A Forward Reasoning Engine with General-Purpose. In: Apolloni, B., Howlett, R.J., Jain, L. (eds.) KES 2007, Part II. LNCS (LNAI), vol.\u00a04693, pp. 444\u2013452. Springer, Heidelberg (2007)"},{"issue":"1","key":"3_CR13","doi-asserted-by":"publisher","first-page":"107","DOI":"10.1145\/1327452.1327492","volume":"51","author":"J. Dean","year":"2008","unstructured":"Dean, J., Ghemawat, S.: MapReduce: Simplified Data Processing on Large Clusters. Communications of the ACM\u00a051(1), 107\u2013113 (2008)","journal-title":"Communications of the ACM"},{"key":"3_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"633","DOI":"10.1007\/11752578_76","volume-title":"Parallel Processing and Applied Mathematics","author":"J. Denemark","year":"2006","unstructured":"Denemark, J., Jankowski, M., K\u0159enek, A., Matyska, L., Meyer, N., Ruda, M., Wolniewicz, P.: Best Practices of User Account Management with Virtual Organization Based Access to Grid. In: Wyrzykowski, R., Dongarra, J., Meyer, N., Wa\u015bniewski, J. (eds.) PPAM 2005. LNCS, vol.\u00a03911, pp. 633\u2013642. Springer, Heidelberg (2006)"},{"key":"3_CR15","doi-asserted-by":"crossref","unstructured":"Dubois, D.M.: Computing Anticipatory Systems with Incursion and Hyperincursion. In: Dubois, D.M. (ed.) The First International Conference on Computing Anticipatory Systems. AIP Conference Proceedings, vol.\u00a0437, pp. 3\u201330. American Institute of Physics (1998)","DOI":"10.1063\/1.56331"},{"key":"3_CR16","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1063\/1.56331","volume":"2","author":"D.M. Dubois","year":"1998","unstructured":"Dubois, D.M.: Introduction to Computing Anticipatory Systems. International Journal of Computing Anticipatory Systems\u00a02, 3\u201314 (1998)","journal-title":"International Journal of Computing Anticipatory Systems"},{"key":"3_CR17","unstructured":"Git: Git, http:\/\/git-scm.com\/ (accessed at Febraury19, 2014)"},{"key":"3_CR18","doi-asserted-by":"crossref","unstructured":"Goto, Y., Gao, H., Tsuji, T., Cheng, J.: Practical Usage of FreeEnCal: An Automated Forward Reasoning Engine for General-Purpose. In: The International Conference on Machine Learning and Cybernetics, Xi\u2019an, China, pp. 1878\u20131883. IEEE (2012)","DOI":"10.1109\/ICMLC.2012.6359662"},{"key":"3_CR19","series-title":"LNAI","doi-asserted-by":"publisher","first-page":"526","DOI":"10.1007\/978-3-540-85565-1_65","volume-title":"Knowledge-Based Intelligent Information and Engineering Systems","author":"Y. Goto","year":"2008","unstructured":"Goto, Y., Koh, T., Cheng, J.: A General Forward Reasoning Algorithm for Various Logic Systems with Different Formalizations. In: Lovrek, I., Howlett, R.J., Jain, L.C. (eds.) KES 2008, Part II. LNCS (LNAI), vol.\u00a05178, pp. 526\u2013535. Springer, Heidelberg (2008)"},{"key":"3_CR20","first-page":"156","volume":"14","author":"Y. Goto","year":"2004","unstructured":"Goto, Y., Nara, S., Cheng, J.: Efficient Anticipatory Reasoning for Anticipatory Systems with Requirements of High Reliability and High Security. International Journal of Computing Anticipatory Systems\u00a014, 156\u2013171 (2004)","journal-title":"International Journal of Computing Anticipatory Systems"},{"key":"3_CR21","unstructured":"Grzonkowski, S., Gzella, A., Krawczyk, H., Kruk, S.R., MartinRecuerda, F., Woroniecki, T.: D-FOAF - Security Aspects in Distributed User Management System. In: The IEEE International Conference on Technologies for Homeland Security and Safety (2005)"},{"key":"3_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"133","DOI":"10.1007\/3-540-45644-9_13","volume-title":"Grid Computing - GRID 2001","author":"T.J. Hacker","year":"2001","unstructured":"Hacker, T.J., Athey, B.D.: A Methodology for Account Management in Grid Computing Environments. In: Lee, C.A. (ed.) GRID 2001. LNCS, vol.\u00a02242, pp. 133\u2013144. Springer, Heidelberg (2001)"},{"key":"3_CR23","unstructured":"Han, J., Kamber, M., Pei, J.: Data Mining: Concepts and Techniques, 3rd edn. Morgan Kaufmann Publishers (2011)"},{"key":"3_CR24","unstructured":"Hogan, M., Sokol, A.: NIST Cloud Computing Standards Roadmap, Version 2 (2013)"},{"key":"3_CR25","doi-asserted-by":"crossref","unstructured":"Horie, D., Goto, Y., Cheng, J.: Development of ISEE: An Information Security Engineering Environment. In: 2009 Second International Symposium on Electronic Commerce and Security, Nanchang, China, pp. 338\u2013342. IEEE (2009)","DOI":"10.1109\/ISECS.2009.243"},{"key":"3_CR26","doi-asserted-by":"crossref","unstructured":"Horie, D., Kasahara, T., Goto, Y., Cheng, J.: A New Model of Software Life Cycle Processes for Consistent Design, Development, Management, and Maintenance of Secure Information Systems. In: 2009 Eighth IEEE\/ACIS International Conference on Computer and Information Science, Shanghai, China, pp. 897\u2013902. IEEE Computer Society (2009)","DOI":"10.1109\/ICIS.2009.175"},{"key":"3_CR27","doi-asserted-by":"crossref","unstructured":"Horie, D., Morimoto, S., Azimah, N., Goto, Y., Cheng, J.: ISEDS: An Information Security Engineering Database System Based on ISO Standards. In: 2008 Third International Conference on Availability, Reliability and Security, Barcelona, Spain, pp. 1219\u20131225. IEEE Computer Society (2008)","DOI":"10.1109\/ARES.2008.76"},{"key":"3_CR28","series-title":"SCI","doi-asserted-by":"publisher","first-page":"149","DOI":"10.1007\/978-3-642-01209-9_14","volume-title":"Computer and Information Science 2009","author":"D. Horie","year":"2009","unstructured":"Horie, D., Yajima, K., Azimah, N., Goto, Y., Cheng, J.: GEST: A Generator of ISO\/IEC 15408 Security Target Templates. In: Lee, R., Hu, G., Miao, H. (eds.) Computer and Information Science 2009. SCI, vol.\u00a0208, pp. 149\u2013158. Springer, Heidelberg (2009)"},{"key":"3_CR29","unstructured":"International Organization for Standardization: ISO\/IEC 15408:2009, Information Technology \u2013 Security Techniques - Evaluation Criteria for IT Security (2009)"},{"key":"3_CR30","unstructured":"International Organization for Standardization: ISO\/IEC 18045:2008 Information Technology \u2013 Security Techniques \u2013 Methodology for IT Security Evaluation (2008)"},{"key":"3_CR31","unstructured":"International Organization for Standardization: ISO\/IEC 27000: Information Technology \u2013 Security Techniques \u2013 Information Security Management Systems \u2013 Overview and Vocabulary (2009)"},{"key":"3_CR32","unstructured":"International Organization for Standardization: ISO\/IEC 27001: Information Technology \u2013 Security Techniques \u2013 Information Security Management Systems \u2013 Requirements (2005)"},{"key":"3_CR33","unstructured":"International Organization for Standardization: ISO\/IEC 27002: Information Technology \u2013 Security Techniques \u2013 Code of Practice for Information Security Management (2005)"},{"key":"3_CR34","unstructured":"International Organization for Standardization: ISO\/IEC 27003: Information Technology \u2013 Security Techniques \u2013 Information Security Management Implementation Guidance (2010)"},{"key":"3_CR35","unstructured":"International Organization for Standardization: ISO\/IEC 27004: Information Technology \u2013 Security Techniques \u2013 Information Security Management \u2013 Measurement (2009)"},{"key":"3_CR36","unstructured":"International Organization for Standardization: ISO\/IEC 27005: Information Technology \u2013 Security Techniques \u2013 Information Security Risk Management (2011)"},{"key":"3_CR37","doi-asserted-by":"crossref","unstructured":"Iqbal, A., Horie, D., Goto, Y., Cheng, J.: A Database System for Effective Utilization of ISO\/IEC 27002. In: 2009 Fourth International Conference on Frontier of Computer Science and Technology, Shanghai, China, pp. 607\u2013612. IEEE Computer Society (2009)","DOI":"10.1109\/FCST.2009.88"},{"key":"3_CR38","doi-asserted-by":"crossref","unstructured":"Kitajima, N., Goto, Y., Cheng, J.: Fast Qualitative Reasoning about Actions for Computing Anticipatory Systems. In: 2008 Third International Conference on Availability, Reliability and Security, Barcelona, Spain, pp. 171\u2013178. IEEE Computer Society (2008)","DOI":"10.1109\/ARES.2008.118"},{"key":"3_CR39","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"68","DOI":"10.1007\/978-3-642-02319-4_9","volume-title":"Hybrid Artificial Intelligence Systems","author":"N. Kitajima","year":"2009","unstructured":"Kitajima, N., Goto, Y., Cheng, J.: Development of a Decision-Maker in an Anticipatory Reasoning-Reacting System for Terminal Radar Control. In: Corchado, E., Wu, X., Oja, E., Herrero, \u00c1., Baruque, B. (eds.) HAIS 2009. LNCS, vol.\u00a05572, pp. 68\u201376. Springer, Heidelberg (2009)"},{"key":"3_CR40","first-page":"177","volume":"20","author":"N. Kitajima","year":"2008","unstructured":"Kitajima, N., Nara, S., Goto, Y., Cheng, J.: A Deontic Relevant Logic Approach to Reasoning. International Journal of Computing Anticipatory Systems\u00a020, 177\u2013190 (2008)","journal-title":"International Journal of Computing Anticipatory Systems"},{"key":"3_CR41","series-title":"LNAI","doi-asserted-by":"publisher","first-page":"499","DOI":"10.1007\/978-3-540-85565-1_62","volume-title":"Knowledge-Based Intelligent Information and Engineering Systems","author":"T. Koh","year":"2008","unstructured":"Koh, T., Goto, Y., Cheng, J.: A Fast Duplication Checking Algorithm for Forward Reasoning Engines. In: Lovrek, I., Howlett, R.J., Jain, L.C. (eds.) KES 2008, Part II. LNCS (LNAI), vol.\u00a05178, pp. 499\u2013507. Springer, Heidelberg (2008)"},{"key":"3_CR42","doi-asserted-by":"crossref","unstructured":"Li, J., Zhang, C.: A Three-Dimensional Role Based User Management Model in Web Information Systems. In: Lu, W., Cai, G., Liu, W., Xing, W. (eds.) Proceedings of the 2012 International Conference on Information Technology and Software Engineering. LNEE, vol.\u00a0210, pp. 657\u2013665. Springer, Heidelberg (2013)","DOI":"10.1007\/978-3-642-34528-9_69"},{"key":"3_CR43","doi-asserted-by":"crossref","unstructured":"Lin, J., Lu, X., Yu, L., Zou, Y., Zha, L.: VegaWarden: A Uniform User Management System for Cloud Applications. In: 2010 IEEE Fifth International Conference on Networking, Architecture, and Storage, Macau, China, pp. 457\u2013464. IEEE (2010)","DOI":"10.1109\/NAS.2010.34"},{"key":"3_CR44","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"88","DOI":"10.1007\/11751632_10","volume-title":"Computational Science and Its Applications - ICCSA 2006","author":"F. Liu","year":"2006","unstructured":"Liu, F., Dogdu, E.: A User Management System for Federated Databases Using Web Services. In: Gavrilova, M.L., et al. (eds.) ICCSA 2006. LNCS, vol.\u00a03983, pp. 88\u201397. Springer, Heidelberg (2006)"},{"key":"3_CR45","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1055","DOI":"10.1007\/978-3-540-24680-0_167","volume-title":"Grid and Cooperative Computing","author":"L.M. Liu","year":"2004","unstructured":"Liu, L.M., Xu, Z., Li, W.: A Layered Grid User Expression Model in Grid User Management 2 The Grid User Expression RUS Model. In: Li, M., Sun, X.H., Deng, Q.N., Ni, J. (eds.) GCC 2003. LNCS, vol.\u00a03033, pp. 1055\u20131058. Springer, Heidelberg (2004)"},{"key":"3_CR46","first-page":"225","volume":"18","author":"S. Nara","year":"2006","unstructured":"Nara, S., Shang, F., Omi, T., Goto, Y., Cheng, J.: An Anticipatory Reasoning Engine for Anticipatory Reasoning-Reacting Systems. International Journal of Computing Anticipatory Systems\u00a018, 225\u2013234 (2006)","journal-title":"International Journal of Computing Anticipatory Systems"},{"key":"3_CR47","unstructured":"Rosen, R.: Anticipatory Systems \u2013 Philosophical, Mathematical and Methodological Foundations. Pergamon Press (1985)"},{"issue":"2","key":"3_CR48","doi-asserted-by":"publisher","first-page":"38","DOI":"10.1109\/2.485845","volume":"29","author":"R.S. Sandhu","year":"1996","unstructured":"Sandhu, R.S., Feinstein, H.L., Youman, C.E.: Role Based Access Control Models. Computer\u00a029(2), 38\u201347 (1996)","journal-title":"Computer"},{"key":"3_CR49","series-title":"CCIS","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1007\/978-3-642-35264-5_5","volume-title":"Computer Applications for Security, Control and System Engineering","author":"A.I.H. Suhaimi","year":"2012","unstructured":"Suhaimi, A.I.H., Goto, Y., Cheng, J.: An Engineering Environment for Supporting Information Security Management Systems. In: Kim, T.H., et al. (eds.) SecTech, CA, CES3 2012. CCIS, vol.\u00a0339, pp. 30\u201337. Springer, Heidelberg (2012)"},{"key":"3_CR50","unstructured":"Suhaimi, A.I.H., Goto, Y., Cheng, J.: An Analysis of Software Supportable Tasks in Information Security Management System Life Cycle Processes. In: International Conference on Information and Social Science, Nagoya, Japan, pp. 29\u201358 (2013)"},{"key":"3_CR51","series-title":"CCIS","doi-asserted-by":"publisher","first-page":"370","DOI":"10.1007\/978-3-642-25327-0_32","volume-title":"Informatics Engineering and Information Science","author":"A.I.H. Suhaimi","year":"2011","unstructured":"Suhaimi, A.I.H., Manji, T., Goto, Y., Cheng, J.: A Systematic Management Method of ISO Information Security Standards for Information Security Engineering Environments. In: Abd Manaf, A., Zeki, A., Zamani, M., Chuprat, S., El-Qawasmeh, E. (eds.) ICIEIS 2011, Part I. CCIS, vol.\u00a0251, pp. 370\u2013384. Springer, Heidelberg (2011)"},{"key":"3_CR52","doi-asserted-by":"crossref","unstructured":"Sun, G., Yajima, K., Miura, J., Goto, Y., Cheng, J.: A Supporting Tool for Creating and Maintaining Security Targets according to ISO\/IEC 15408. In: 2012 IEEE International Conference on Computer Science and Automation Engineering, Beijing, China, pp. 745\u2013749. IEEE (2012)","DOI":"10.1109\/ICSESS.2012.6269574"},{"issue":"1","key":"3_CR53","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s10115-007-0114-2","volume":"14","author":"X. Wu","year":"2008","unstructured":"Wu, X., Kumar, V., Ross Quinlan, J., Ghosh, J., Yang, Q., Motoda, H., McLachlan, G.J., Ng, A., Liu, B., Yu, P.S., Zhou, Z.H., Steinbach, M., Hand, D.J.: Top 10 Algorithms in Data Mining. Knowledge and Information Systems\u00a014(1), 1\u201337 (2008)","journal-title":"Knowledge and Information Systems"},{"key":"3_CR54","doi-asserted-by":"crossref","unstructured":"Xu, L., Shi, K., Goto, Y., Cheng, J.: ISEC: An Information Security Engineering Cloud. In: 2012 IEEE International Conference on Computer Science and Automation Engineering, Beijing, China, pp. 750\u2013753. IEEE (2012)","DOI":"10.1109\/ICSESS.2012.6269575"},{"key":"3_CR55","doi-asserted-by":"crossref","unstructured":"Xu, L., Wang, B., Zhang, N., Goto, Y., Cheng, J.: Providing Users with Suitable Services of Information Security Engineering Cloud based on ISO\/IEC 15408. In: 2013 IEEE 4th International Conference on Software Engineering and Service Science, Beijing, China, pp. 321\u2013325. IEEE (2013)","DOI":"10.1109\/ICSESS.2013.6615315"},{"key":"3_CR56","doi-asserted-by":"crossref","unstructured":"Yajima, K., Morimoto, S., Horie, D., Azreen, N.S., Goto, Y., Cheng, J.: FORVEST: A Support Tool for Formal Verification of Security Specifications with ISO\/IEC 15408. In: 2009 International Conference on Availability, Reliability and Security, Fukuoka, Japan, pp. 624\u2013629. IEEE Computer Society (2009)","DOI":"10.1109\/ARES.2009.74"},{"key":"3_CR57","doi-asserted-by":"crossref","unstructured":"Zhang, N., Bao, D., Xu, L., Suhaimi, A.I.H., Miura, J., Goto, Y., Cheng, J.: Supporting Tools for Software Supportable Tasks Related with ISO\/IEC 15408. In: The 2nd International Conference on Mechatronic Sciences, Electric Engineering and Computer, Shenyang, China, pp. 2002\u20132006. IEEE (2013)","DOI":"10.1109\/MEC.2013.6885379"},{"key":"3_CR58","doi-asserted-by":"crossref","unstructured":"Zhang, N., Suhaimi, A.I.H., Goto, Y., Cheng, J.: An Analysis of Software Supportable Tasks Related with ISO\/IEC 15408. In: The 9th International Conference on Computational Intelligence and Security, E\u2019Mei Shan, China, pp. 601\u2013606. IEEE Computer Society (2013)","DOI":"10.1109\/CIS.2013.132"},{"key":"3_CR59","doi-asserted-by":"crossref","unstructured":"Zhu, L., Kent, R.D., Aggarwal, A., Viranthi, P., Rahman, Q., Elamsy, T., Ejelike, O., Statement, P.: Construction of a Webportal and User Management Framework for Grid. In: 21st International Symposium on High Performance Computing Systems and Applications, Saskatoon, SK, pp. 3\u20139. IEEE Computer Society (2007)","DOI":"10.1109\/HPCS.2007.12"},{"key":"3_CR60","unstructured":"Zikopoulos, P., Eaton, C.: Understanding Big Data: Analytics for Enterprise Class Hadoop and Streaming Data. McGraw-Hill Osborne Media (2011)"}],"container-title":["Lecture Notes in Computer Science","Intelligence and Security Informatics"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-06677-6_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,2]],"date-time":"2025-05-02T08:53:00Z","timestamp":1746175980000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-06677-6_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319066769","9783319066776"],"references-count":60,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-06677-6_3","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]}}}