{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T22:10:14Z","timestamp":1725574214329},"publisher-location":"Berlin, Heidelberg","reference-count":11,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540238980"},{"type":"electronic","value":"9783540304838"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004]]},"DOI":"10.1007\/978-3-540-30483-8_23","type":"book-chapter","created":{"date-parts":[[2011,1,7]],"date-time":"2011-01-07T22:47:02Z","timestamp":1294440422000},"page":"182-193","source":"Crossref","is-referenced-by-count":3,"title":["Enhancing the Scalability of the Community Authorization Service for Virtual Organizations"],"prefix":"10.1007","author":[{"given":"Jian-Ping","family":"Yong","sequence":"first","affiliation":[]},{"given":"Kwok-Yan","family":"Lam","sequence":"additional","affiliation":[]},{"given":"Siu-Leung","family":"Chung","sequence":"additional","affiliation":[]},{"given":"Ming","family":"Gu","sequence":"additional","affiliation":[]},{"given":"Jia-Guang","family":"Sun","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"3","key":"23_CR1","doi-asserted-by":"publisher","first-page":"200","DOI":"10.1177\/109434200101500302","volume":"15","author":"I. Foster","year":"2001","unstructured":"Foster, I., Kesselman, C., Tuecke, S.: The anatomy of the grid: enabling scalable virtual organizations. Int. J. Supercomputer Applications\u00a015(3), 200\u2013222 (2001)","journal-title":"Int. J. Supercomputer Applications"},{"key":"23_CR2","doi-asserted-by":"crossref","unstructured":"Pearlman, L., Welch, V., Foster, I., Kesselman, C., Tuecke, S.: A Community Authorization Service for Group Collaboration. In: Proceedings of the IEEE 3rd International Workshop on Policies for Distributed Systems and Networks (2002)","DOI":"10.1109\/POLICY.2002.1011293"},{"key":"23_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"414","DOI":"10.1007\/978-3-540-27800-9_36","volume-title":"Information Security and Privacy","author":"X.B. Zhao","year":"2004","unstructured":"Zhao, X.B., Lam, K.Y., Chung, S.L., Gu, M., Sun, J.G.: Authorization Mechanisms for Virtual Organizations in Distributed Computing Systems. In: Wang, H., Pieprzyk, J., Varadharajan, V. (eds.) ACISP 2004. LNCS, vol.\u00a03108, pp. 414\u2013426. Springer, Heidelberg (2004)"},{"key":"23_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"42","DOI":"10.1007\/978-3-540-24591-9_4","volume-title":"Information Security Applications","author":"K.Y. Lam","year":"2004","unstructured":"Lam, K.Y., Zhao, X.B., Chung, S.L., Gu, M., Sun, J.G.: Enhancing Grid Security Infrastructure to Support Mobile Computing Nodes. In: Chae, K.-J., Yung, M. (eds.) WISA 2003. LNCS, vol.\u00a02908, pp. 42\u201354. Springer, Heidelberg (2004)"},{"key":"23_CR5","unstructured":"Overview of the Grid Security Infrastructure at, \n                    \n                      http:\/\/www-fp.globus.org\/security\/overview.html"},{"issue":"8","key":"23_CR6","doi-asserted-by":"publisher","first-page":"710","DOI":"10.1016\/S0140-3664(99)00031-6","volume":"22","author":"J.Y. Zhou","year":"1999","unstructured":"Zhou, J.Y., Lam, K.Y.: Securing digital signatures for non-repudiation. Journal of Computer Communications\u00a022(8), 710\u2013716 (1999)","journal-title":"Journal of Computer Communications"},{"key":"23_CR7","doi-asserted-by":"crossref","unstructured":"Nagaraj, S.V.: Access control in distributed object systems: problems with access control lists. In: Proceedings of the Tenth IEEE International Workshops, WET ICE 2001. Enabling Technologies: Infrastructure for Collaborative Enterprises (2001)","DOI":"10.1109\/ENABL.2001.953407"},{"key":"23_CR8","doi-asserted-by":"publisher","first-page":"185","DOI":"10.1016\/S0304-3975(99)00072-9","volume":"226","author":"C.R. Zhang","year":"1999","unstructured":"Zhang, C.R., Lam, K.Y., Jajodia, S.: Scalable threshold closure. Theoretical Computer Science\u00a0226, 185\u2013206 (1999)","journal-title":"Theoretical Computer Science"},{"issue":"11","key":"23_CR9","doi-asserted-by":"publisher","first-page":"612","DOI":"10.1145\/359168.359176","volume":"22","author":"A. Shamir","year":"1979","unstructured":"Shamir, A.: How to share a secret. Communications of the ACM\u00a022(11), 612\u2013613 (1979)","journal-title":"Communications of the ACM"},{"key":"23_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"27","DOI":"10.1007\/0-387-34799-2_3","volume-title":"Advances in Cryptology - CRYPTO \u201988","author":"J.C. Benaloh","year":"1990","unstructured":"Benaloh, J.C., Leichter, J.: Generalized secret sharing and monotone functions. In: Goldwasser, S. (ed.) CRYPTO 1988. LNCS, vol.\u00a0403, pp. 27\u201335. Springer, Heidelberg (1990)"},{"key":"23_CR11","unstructured":"Ito, M., Saito, A., Nishizeki, T.: Secret sharing scheme realizing general access structure. In: Globecom 1987, Tokyo, Japan, pp. 99\u2013102 (1987)"}],"container-title":["Lecture Notes in Computer Science","Content Computing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-30483-8_23.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,3]],"date-time":"2021-05-03T04:03:58Z","timestamp":1620014638000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-30483-8_23"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004]]},"ISBN":["9783540238980","9783540304838"],"references-count":11,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-30483-8_23","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2004]]}}}