{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T06:04:03Z","timestamp":1725516243593},"publisher-location":"Berlin, Heidelberg","reference-count":26,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540693833"},{"type":"electronic","value":"9783540693840"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008]]},"DOI":"10.1007\/978-3-540-69384-0_15","type":"book-chapter","created":{"date-parts":[[2008,7,31]],"date-time":"2008-07-31T06:39:15Z","timestamp":1217486355000},"page":"96-105","source":"Crossref","is-referenced-by-count":2,"title":["Supporting Security-Oriented, Collaborative nanoCMOS Electronics Research"],"prefix":"10.1007","author":[{"given":"Richard O.","family":"Sinnott","sequence":"first","affiliation":[]},{"given":"Thomas","family":"Doherty","sequence":"additional","affiliation":[]},{"given":"David","family":"Martin","sequence":"additional","affiliation":[]},{"given":"Campbell","family":"Millar","sequence":"additional","affiliation":[]},{"given":"Gordon","family":"Stewart","sequence":"additional","affiliation":[]},{"given":"John","family":"Watt","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"15_CR1","unstructured":"UK National Grid Service (NGS), http:\/\/www.grid-support.ac.uk\/"},{"key":"15_CR2","unstructured":"Jensen, J.: The UK e-Science Certification Authority. In: Proceedings of the UK e-Science All-Hands Meeting, Nottingham, UK (September 2003)"},{"key":"15_CR3","unstructured":"UK Rutherford Appleton Laboratories (RAL), http:\/\/www.grid-support.ac.uk\/content\/view\/23\/55\/"},{"key":"15_CR4","doi-asserted-by":"crossref","unstructured":"Sinnott, R.O., Jiang, J., Watt, J., Ajayi, O.: Shibboleth-based Access to and Usage of Grid Resources. In: Proceedings of IEEE International Conference on Grid Computing, Barcelona, Spain (September 2006)","DOI":"10.1109\/ICGRID.2006.311008"},{"key":"15_CR5","unstructured":"Meetings the Design Challenges of nanoCMOS Electronics, http:\/\/www.nanocmos.ac.uk"},{"key":"15_CR6","doi-asserted-by":"crossref","unstructured":"Sinnott, R.O., Watt, J., Jiang, J., Stell, A.J., Ajayi, O.: Single Sign-on and Authorization for Dynamic Virtual Organizations. In: 7th IFIP Conference on Virtual Enterprises, PRO-VE 2006, Helsinki, Finland (September 2006)","DOI":"10.1007\/978-0-387-38269-2_58"},{"key":"15_CR7","doi-asserted-by":"crossref","unstructured":"Watt, J., Sinnott, R.O., Jiang, J., Ajayi, O., Koetsier, J.: A Shibboleth-Protected Privilege Management Infrastructure for e-Science Education. In: 6th International Symposium on Cluster Computing and the Grid CCGrid 2006, Singapore (May 2006)","DOI":"10.1109\/CCGRID.2006.11"},{"key":"15_CR8","volume-title":"Planning for PKI: Best Practices Guide for Deploying Public Key Infrastructures","author":"R. Housley","year":"2001","unstructured":"Housley, R., Polk, T.: Planning for PKI: Best Practices Guide for Deploying Public Key Infrastructures. Wiley Computer Publishing, Chichester (2001)"},{"key":"15_CR9","doi-asserted-by":"crossref","first-page":"38","DOI":"10.1109\/2.485845","volume":"29","author":"R.S. Sandhu","year":"1996","unstructured":"Sandhu, R.S., Coyne, E.J., Feinstein, H.L., Youman, C.E.: Role-Based Access Control Models. IEEE Computer\u00a029, 38\u201347 (1996)","journal-title":"IEEE Computer"},{"key":"15_CR10","doi-asserted-by":"crossref","unstructured":"Ninghui, L., Mitchell, J.C., Winsborough, W.H.: Design of a Role-based Trust-management Framework. In: Proceedings of the 2002 IEEE Symposium on Security and Privacy (2002)","DOI":"10.1109\/SECPRI.2002.1004366"},{"key":"15_CR11","first-page":"1","volume-title":"Future Generation Computer Systems","author":"D.W. Chadwick","year":"2002","unstructured":"Chadwick, D.W., Otenko, A.: The PERMIS X.509 Role Based Privilege Management Infrastructure. In: Future Generation Computer Systems, vol.\u00a0936, pp. 1\u201313. Elsevier Science BV, Amsterdam (2002)"},{"key":"15_CR12","unstructured":"Virtual Organization Membership Service (VOMS), http:\/\/hep-project-grid-scg.web.cern.ch\/hep-project-grid-scg\/voms.html"},{"key":"15_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"265","DOI":"10.1007\/11508380_28","volume-title":"Advances in Grid Computing - EGC 2005","author":"R.O. Sinnott","year":"2005","unstructured":"Sinnott, R.O., Stell, A.J., Chadwick, D.W., Otenko, O.: Experiences of Applying Advanced Grid Authorisation Infrastructures. In: Sloot, P.M.A., Hoekstra, A.G., Priol, T., Reinefeld, A., Bubak, M. (eds.) EGC 2005. LNCS, vol.\u00a03470, pp. 265\u2013275. Springer, Heidelberg (2005)"},{"key":"15_CR14","unstructured":"Sinnott, R.O., Stell, A.J., Watt, J.: Comparison of Advanced Authorisation Infrastructures for Grid Computing. In: Proceedings of International Conference on High Performance Computing Systems and Applications, Guelph, Canada (May 2005)"},{"key":"15_CR15","unstructured":"Shibboleth, http:\/\/shibboleth.internet2.edu\/"},{"key":"15_CR16","unstructured":"Shibboleth Architecture Technical Overview, http:\/\/shibboleth.internet2.edu\/docs\/draft-maceshibboleth-tech-oberview-latest.pdf"},{"key":"15_CR17","unstructured":"UK Access Management Federation, http:\/\/www.ukfederation.org.uk\/"},{"key":"15_CR18","unstructured":"eduPerson Specification, http:\/\/www.educause.edu\/eduperson\/"},{"key":"15_CR19","unstructured":"Shibboleth Attribute Release Policy Editor, http:\/\/federation.org.au\/twiki\/bin\/view\/Federation\/ShARPE"},{"key":"15_CR20","unstructured":"OMII SPAM-GP project, http:\/\/www.nesc.ac.uk\/hub\/projects\/omii-sp"},{"key":"15_CR21","unstructured":"Delegation Issuing Service (DIS), http:\/\/sec.cs.kent.ac.uk\/permis\/downloads\/Level3\/DIS.shtml"},{"key":"15_CR22","unstructured":"Integrating VOMS and PERMIS for Superior Secure Grid Management (VPMan), http:\/\/sec.cs.kent.ac.uk\/vpman\/"},{"key":"15_CR23","unstructured":"JSDL, http:\/\/www.gridforum.org\/documents\/GFD.56.pdf"},{"key":"15_CR24","doi-asserted-by":"crossref","unstructured":"Sinnott, R.O., Chadwick, D.W., Doherty, T., Martin, D., Stell, A., Stewart, G., Su, L., Watt, J.: Advanced Security for Virtual Organizations: Exploring the Pros and Cons of Centralized vs Decentralized Security Models. In: 8th IEEE International Symposium on Cluster Computing and the Grid (CCGrid 2008), Lyon, France (May 2008)","DOI":"10.1109\/CCGRID.2008.67"},{"key":"15_CR25","doi-asserted-by":"crossref","unstructured":"Sinnott, R.O., Watt, J., Chadwick, D.W., Koetsier, J., Otenko, O., Nguyen, T.A.: Supporting Decentralized, Security focused Dynamic Virtual Organizations across the Grid. In: 2nd IEEE International Conference on e-Science and Grid Computing, Amsterdam (December 2006)","DOI":"10.1109\/E-SCIENCE.2006.261106"},{"key":"15_CR26","unstructured":"Reid, D., Millar, C., Roy, G., Roy, S., Sinnott, R.O., Stewart, G., Asenov, A.: Supporting Statistical Semiconductor Device Analysis using EGEE and OMII-UK Middleware. In: 3rd EGEE User Conference, Clermont-Ferrand, France (February 2008)"}],"container-title":["Lecture Notes in Computer Science","Computational Science \u2013 ICCS 2008"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-69384-0_15","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,13]],"date-time":"2019-05-13T02:02:52Z","timestamp":1557712972000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-69384-0_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008]]},"ISBN":["9783540693833","9783540693840"],"references-count":26,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-69384-0_15","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2008]]}}}