{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T04:54:20Z","timestamp":1725512060168},"publisher-location":"Berlin, Heidelberg","reference-count":22,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540722267"},{"type":"electronic","value":"9783540723370"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-72337-0_5","type":"book-chapter","created":{"date-parts":[[2007,6,26]],"date-time":"2007-06-26T15:47:30Z","timestamp":1182872850000},"page":"34-48","source":"Crossref","is-referenced-by-count":0,"title":["Review of Security Models Applied to Distributed Data Access"],"prefix":"10.1007","author":[{"given":"Antonia","family":"Ghiselli","sequence":"first","affiliation":[]},{"given":"Federico","family":"Stagni","sequence":"additional","affiliation":[]},{"given":"Riccardo","family":"Zappi","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"5_CR1","doi-asserted-by":"crossref","unstructured":"Gu, J., Shoshani, A., Sim, A.: Storage resource manager: Essential components for the grid (2003)","DOI":"10.1007\/978-1-4615-0509-9_20"},{"key":"5_CR2","doi-asserted-by":"crossref","unstructured":"Chadwick, D.: An x.509 role-base privilege management infrastructure. Technical report (2002)","DOI":"10.1145\/507729.507732"},{"key":"5_CR3","doi-asserted-by":"crossref","unstructured":"Chadwick, D.: Authorization in grid computing. Information Security Technical Report 10, 33\u201340 (2005)","DOI":"10.1016\/j.istr.2004.11.004"},{"key":"5_CR4","unstructured":"Corso, E., Cozzini, S., Donno, F., Ghiselli, A., Magnoni, L., Mazzucato, M., Murri, R., Ricci, P.P., Stockinger, H., Terpin, A., Vagnoni, V., Zappi, R.: Storm, an srm Implementation for lhc Analysis Farms, Computing in High Energy Physics. In: Proceedings of the International Conference on Computing in High Energy and Nuclear Physics (CHEP2006), Mumbai, India, Feb. (2006)"},{"key":"5_CR5","first-page":"224","volume":"3","author":"S. Gavrila","year":"2001","unstructured":"Gavrila, S., Kuhn, D.R., Chandramouli, R., Ferraiolo, D., Sandhu, R.: Proposed nist standard for role-based access control. ACM Transactions on Information and System Security (TISSEC)\u00a03, 224\u2013274 (2001)","journal-title":"ACM Transactions on Information and System Security (TISSEC)"},{"key":"5_CR6","doi-asserted-by":"publisher","first-page":"191","DOI":"10.1145\/501978.501979","volume":"4","author":"E. Ferrari","year":"2001","unstructured":"Ferrari, E., Bertino, E., Bonatti, P.A.: Trbac: A temporal role-based access control model. ACM Transactions on Information and System Security (TISSEC)\u00a04, 191\u2013233 (2001)","journal-title":"ACM Transactions on Information and System Security (TISSEC)"},{"key":"5_CR7","unstructured":"Caltroni, A., et al.: G-Pbox: a Policy Framework for Grid Environments. INFN Grid-it"},{"key":"5_CR8","unstructured":"Alfieri, et\u00a0al.: Voms, an authorization system for virtual organizations. In: Proceedings of 1st European Across Grid Conference"},{"key":"5_CR9","unstructured":"Pearlman, L., et al.: The community authorization service: Status and future. In: Proceedings at CHEP03, La Jolla, California, March 24-28 (2003)"},{"key":"5_CR10","unstructured":"Nagaratman, et\u00a0al.: Security architecture for open grid services. memo GWD-I, GGF OGSA Security Workgroup, 2002m revised (2003)"},{"key":"5_CR11","doi-asserted-by":"crossref","unstructured":"Demchenko, Y., et\u00a0al.: Job-centric Security model for Open Collaborative Environment, pp. 69\u201377. IEEE Computer Society (2005)","DOI":"10.1109\/ISCST.2005.1553296"},{"key":"5_CR12","unstructured":"Grunbacher, A.: Posix access control lists on linux. In: Submitted for publication at the USENIX ATC, San Antonio, Texas, June (2003)"},{"key":"5_CR13","doi-asserted-by":"crossref","unstructured":"Tuecke, S., Foster, I., Kesselman, C.: The anatomy of the grid: Enabling scalable virtual organizations. International J. Supercomputer Applications\u00a015(3) (2001)","DOI":"10.1177\/109434200101500302"},{"key":"5_CR14","unstructured":"Frohner, A., Kunszt, P.: glite data management security model disussion (2005)"},{"key":"5_CR15","doi-asserted-by":"crossref","unstructured":"Housley, R., Farrel, S.: Rfc3281: An internet attribute certificate profile for authorization. Technical report (2002)","DOI":"10.17487\/rfc3281"},{"key":"5_CR16","unstructured":"EGEE security JRA3. Global security architecture (2004)"},{"key":"5_CR17","unstructured":"The\u00a0Globus security team. Gt 4.0 security (2005), http:\/\/www.globus.org\/toolkit\/docs\/4.0\/security\/"},{"key":"5_CR18","unstructured":"Steenbakkers, M.: Guide to lcmaps version 0.0.23 (2003), http:\/\/www.dutchGrid.nl\/DataGrid\/wp4\/lcmaps\/edg-lcmaps_gcc3_2_2-0.0.23\/"},{"key":"5_CR19","unstructured":"OASIS\u00a0SAML TC. Oasis security assertion markup language (saml) tc (2005), http:\/\/www.oasis-open.org\/committees\/tc_home.php?wg_abbrev=security"},{"key":"5_CR20","unstructured":"OASIS\u00a0XACML TC. Oasis extensible access control markup language (xacml) tc (2005), http:\/\/www.oasis-open.org\/committees\/tc_home.php?wg_abbrev=xacml#XACML20"},{"key":"5_CR21","unstructured":"OASIS\u00a0XACML TC. Saml 2.0 profile of xacml v2.0. (2005), http:\/\/docs.oasis-open.org\/xacml\/2.0\/access_control-xacml-2.0-saml-profile-spec-os.pdf"},{"key":"5_CR22","unstructured":"W3C WG. Web services architecture (2004), http:\/\/www.w3.org\/TR\/ws-arch\/"}],"container-title":["Lecture Notes in Computer Science","Euro-Par 2006: Parallel Processing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-72337-0_5.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,19]],"date-time":"2020-11-19T05:30:28Z","timestamp":1605763828000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-72337-0_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540722267","9783540723370"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-72337-0_5","relation":{},"subject":[]}}