{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T19:35:50Z","timestamp":1725564950572},"publisher-location":"Berlin, Heidelberg","reference-count":12,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540223795"},{"type":"electronic","value":"9783540278009"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004]]},"DOI":"10.1007\/978-3-540-27800-9_36","type":"book-chapter","created":{"date-parts":[[2010,9,5]],"date-time":"2010-09-05T23:00:38Z","timestamp":1283727638000},"page":"414-426","source":"Crossref","is-referenced-by-count":5,"title":["Authorization Mechanisms for Virtual Organizations in Distributed Computing Systems"],"prefix":"10.1007","author":[{"given":"Xi-Bin","family":"Zhao","sequence":"first","affiliation":[]},{"given":"Kwok-Yan","family":"Lam","sequence":"additional","affiliation":[]},{"given":"Siu-Leung","family":"Chung","sequence":"additional","affiliation":[]},{"given":"Ming","family":"Gu","sequence":"additional","affiliation":[]},{"given":"Jia-Guang","family":"Sun","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"3","key":"36_CR1","doi-asserted-by":"publisher","first-page":"200","DOI":"10.1177\/109434200101500302","volume":"15","author":"I. Foster","year":"2001","unstructured":"Foster, I., Kesselman, C., Tuecke, S.: The anatomy of the grid: enabling scalable virtual organizations. Int. J. Supercomputer Applications\u00a015(3), 200\u2013222 (2001)","journal-title":"Int. J. Supercomputer Applications"},{"key":"36_CR2","series-title":"K.Y. Lam, X.B. Zhao, S.L. Chung, M. Gu, J.G. Sun","doi-asserted-by":"publisher","first-page":"42","DOI":"10.1007\/978-3-540-24591-9_4","volume-title":"Information Security Applications","author":"K.Y. Lam","year":"2004","unstructured":"Lam, K.Y., Zhao, X.B., Chung, S.L., Gu, M., Sun, J.G.: Enhancing Grid Security Infrastructure to Support Mobile Computing Nodes. In: Chae, K.-J., Yung, M. (eds.) WISA 2003. K.Y. Lam, X.B. Zhao, S.L. Chung, M. Gu, J.G. Sun, vol.\u00a02908, pp. 42\u201354. Springer, Heidelberg (2004)"},{"key":"36_CR3","unstructured":"Dengue fever prevention and control. Weekly Epidemiological Record\u00a077(6), 41\u201348 (August 2002)"},{"key":"36_CR4","unstructured":"Overview of the Grid Security Infrastructure at \n                    \n                      http:\/\/www-fp.globus.org\/security\/overview.html"},{"issue":"8","key":"36_CR5","doi-asserted-by":"publisher","first-page":"710","DOI":"10.1016\/S0140-3664(99)00031-6","volume":"22","author":"J.Y. Zhou","year":"1999","unstructured":"Zhou, J.Y., Lam, K.Y.: Securing digital signatures for non-repudiation. Journal of Computer Communications\u00a022(8), 710\u2013716 (1999)","journal-title":"Journal of Computer Communications"},{"key":"36_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"199","DOI":"10.1007\/3-540-36133-2_18","volume-title":"Grid Computing - GRID 2002","author":"K. Keahey","year":"2002","unstructured":"Keahey, K., Welch, V.: Fine-Grain Authorization for Resource Management in the Grid Environment. In: Parashar, M. (ed.) GRID 2002. LNCS, vol.\u00a02536, pp. 199\u2013206. Springer, Heidelberg (2002)"},{"key":"36_CR7","doi-asserted-by":"crossref","unstructured":"Pearlman, L., Welch, V., Foster, I., Kesselman, C., Tuecke, S.: A Community Authorization Service for Group Collaboration. In: Proceedings of the IEEE 3rd International Workshop on Policies for Distributed Systems and Networks (2002)","DOI":"10.1109\/POLICY.2002.1011293"},{"key":"36_CR8","doi-asserted-by":"crossref","unstructured":"Nagaraj, S.V.: Access control in distributed object systems: problems with access control lists. In: Enabling Technologies: Infrastructure for Collaborative Enterprises, 2001. WET ICE 2001. Proceedings. Tenth IEEE International Workshops (2001)","DOI":"10.1109\/ENABL.2001.953407"},{"key":"36_CR9","doi-asserted-by":"publisher","first-page":"185","DOI":"10.1016\/S0304-3975(99)00072-9","volume":"226","author":"C.R. Zhang","year":"1999","unstructured":"Zhang, C.R., Lam, K.Y., Jajodia, S.: Scalable threshold closure. Theoretical Computer Science\u00a0226, 185\u2013206 (1999)","journal-title":"Theoretical Computer Science"},{"issue":"11","key":"36_CR10","doi-asserted-by":"publisher","first-page":"612","DOI":"10.1145\/359168.359176","volume":"22","author":"A. Shamir","year":"1979","unstructured":"Shamir, A.: How to share a secret. Communications of the ACM, Vol\u00a022(11), 612\u2013613 (1979)","journal-title":"Communications of the ACM, Vol"},{"key":"36_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"27","DOI":"10.1007\/0-387-34799-2_3","volume-title":"Advances in Cryptology - CRYPTO \u201988","author":"J.C. Benaloh","year":"1990","unstructured":"Benaloh, J.C., Leichter, J.: Generalized secret sharing and monotone functions. In: Goldwasser, S. (ed.) CRYPTO 1988. LNCS, vol.\u00a0403, pp. 27\u201335. Springer, Heidelberg (1990)"},{"key":"36_CR12","unstructured":"Ito, M., Saito, A., Nishizeki, T.: Secret sharing scheme realizing general access structure. In: Globecom 1987, Tokyo, Japan, pp. 99\u2013102 (1987)"}],"container-title":["Lecture Notes in Computer Science","Information Security and Privacy"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-27800-9_36.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,3]],"date-time":"2021-05-03T03:26:48Z","timestamp":1620012408000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-27800-9_36"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004]]},"ISBN":["9783540223795","9783540278009"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-27800-9_36","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2004]]}}}