{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T17:50:57Z","timestamp":1725558657757},"publisher-location":"Berlin, Heidelberg","reference-count":22,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540201502"},{"type":"electronic","value":"9783540399278"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2003]]},"DOI":"10.1007\/978-3-540-39927-8_20","type":"book-chapter","created":{"date-parts":[[2010,6,28]],"date-time":"2010-06-28T04:51:33Z","timestamp":1277700693000},"page":"214-225","source":"Crossref","is-referenced-by-count":9,"title":["A Novel Two-Level Trust Model for Grid"],"prefix":"10.1007","author":[{"given":"Tie-Yan","family":"Li","sequence":"first","affiliation":[]},{"given":"HuaFei","family":"Zhu","sequence":"additional","affiliation":[]},{"given":"Kwok-Yan","family":"Lam","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"20_CR1","doi-asserted-by":"crossref","unstructured":"Foster, I., Kesselman, C., Tsudik, G., Tuecke, S.: A Security Architecture for Computational Grids. In: Proc. 5th ACM Conference on Computer and Communications Security Conference, pp. 83\u201392 (1998)","DOI":"10.1145\/288090.288111"},{"issue":"12","key":"20_CR2","doi-asserted-by":"crossref","first-page":"60","DOI":"10.1109\/2.889094","volume":"33","author":"R. Butler","year":"2000","unstructured":"Butler, R., Engert, D., Foster, I., Kesselman, C., Tuecke, S., Volmer, J., Welch, V.: A National-Scale Authentication Infrastructure. IEEE Computer\u00a033(12), 60\u201366 (2000)","journal-title":"IEEE Computer"},{"key":"20_CR3","unstructured":"Nagaratnam, N., et al.: Security Architecture for Open Grid Services. GGF OGSA Security Workgroup, http:\/\/www.ggf.org\/ogsa-sec-wg"},{"key":"20_CR4","unstructured":"Globus Toolkits V3.0 of the Globus project, http:\/\/www.globus.org"},{"key":"20_CR5","doi-asserted-by":"crossref","unstructured":"Tuecke, S., et al.: Internet X.509 Public Key Infrastructure Proxy Certificate Profile. IETF Internet Draft (April 2003), http:\/\/www.ietf.org\/internet-drafts\/draftietf-pkix-proxy-05.txt","DOI":"10.17487\/rfc3820"},{"key":"20_CR6","doi-asserted-by":"crossref","unstructured":"Housley, R., Polk, W., Ford, W., Solo, D.: Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile. RFC 3280 (April 2002)","DOI":"10.17487\/rfc3280"},{"key":"20_CR7","unstructured":"Surridge, M.: A Rough Guide to Grid Security. V1.1, IT Innovation Centre (2002)"},{"key":"20_CR8","unstructured":"Thompson, M., et al.: CA-based Trust Model for Grid Authentication and Identity Delegation. Grid Certificate Policy Working Group (October 2002)"},{"key":"20_CR9","doi-asserted-by":"crossref","unstructured":"Linn, J.: Generic Security Service Application Program Interface, Version 2, Update 1, RFC 2743 (January 2000)","DOI":"10.17487\/rfc2743"},{"key":"20_CR10","unstructured":"Freier, A., Kariton, P., Kocher, P.: The SSL Protocol: Version 3.0. Netscape communications, Inc., CA (March 1996)"},{"key":"20_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"151","DOI":"10.1007\/3-540-45807-7_23","volume-title":"Security Protocols","author":"S.N. Foley","year":"2002","unstructured":"Foley, S.N.: Trust Management and Whether to Delegate. In: Christianson, B., Crispo, B., Malcolm, J.A., Roe, M. (eds.) Security Protocols 2001. LNCS, vol.\u00a02467, pp. 151\u2013157. Springer, Heidelberg (2002)"},{"key":"20_CR12","doi-asserted-by":"crossref","unstructured":"Kohl, J., Neuman, C.: The Kerberos Network Authentication Service (V5). RFC 1510 (September 1993)","DOI":"10.17487\/rfc1510"},{"key":"20_CR13","doi-asserted-by":"crossref","unstructured":"Reiter, M., Stubblebine, S.: Resilient authentication using path independence. IEEE Transactions on computers 47(12) (December 1998)","DOI":"10.1109\/12.737682"},{"issue":"2","key":"20_CR14","doi-asserted-by":"publisher","first-page":"138","DOI":"10.1145\/317087.317088","volume":"2","author":"M.K. Reiter","year":"1999","unstructured":"Reiter, M.K., Stubblebine, S.G.: Authentication metric analysis and design. ACM Transactions on Information and System Security\u00a02(2), 138\u2013158 (1999)","journal-title":"ACM Transactions on Information and System Security"},{"key":"#cr-split#-20_CR15.1","doi-asserted-by":"crossref","unstructured":"Ellison, C., et al.: Spki certificate theory (September 1999);","DOI":"10.17487\/rfc2693"},{"key":"#cr-split#-20_CR15.2","unstructured":"Internet Request for Comments: 2693"},{"key":"20_CR16","doi-asserted-by":"crossref","unstructured":"Zimmermann, P.: Pretty Good Privacy (PGP), PGP User\u2019s Guide, MIT (October 1994)","DOI":"10.1016\/0142-0496(94)90185-6"},{"key":"20_CR17","doi-asserted-by":"crossref","unstructured":"Aura, T.: Distributed Access-Rights Managements with Delegations Certificates. Secure Internet Programming 1999, 211\u2013235 (1999)","DOI":"10.1007\/3-540-48749-2_9"},{"key":"20_CR18","doi-asserted-by":"crossref","unstructured":"Mendes, S., Huitema, C.: A new approach to the X.509 framework: Allowing a global authentication infrastructure without a global trust model. In: Proceedings of NDSS 1995 (1995)","DOI":"10.1109\/NDSS.1995.390635"},{"key":"20_CR19","unstructured":"Zhu, H., Feng, B., Deng, R.H.: Computing of Trust in Distributed Networks. Cryptology ePrint Archive: Report 2003\/056"},{"key":"20_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"325","DOI":"10.1007\/3-540-61770-1_45","volume-title":"Computer Security - ESORICS 96","author":"U. Maurer","year":"1996","unstructured":"Maurer, U.: Modelling a Public-Key Infrastructure. In: Martella, G., Kurth, H., Montolivo, E., Bertino, E. (eds.) ESORICS 1996. LNCS, vol.\u00a01146, pp. 325\u2013350. Springer, Heidelberg (1996)"},{"key":"20_CR21","unstructured":"Biskup, J., Karabulut, Y.: Mediating Between Strangers: A Trust Management Based Approach. In: 2nd Annual PKI Research Workshop, http:\/\/middleware.internet2.edu\/pki03\/"}],"container-title":["Lecture Notes in Computer Science","Information and Communications Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-39927-8_20","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,30]],"date-time":"2019-05-30T13:41:17Z","timestamp":1559223677000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-39927-8_20"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2003]]},"ISBN":["9783540201502","9783540399278"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-39927-8_20","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2003]]}}}