{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T04:54:09Z","timestamp":1725512049409},"publisher-location":"Berlin, Heidelberg","reference-count":27,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540722267"},{"type":"electronic","value":"9783540723370"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-72337-0_6","type":"book-chapter","created":{"date-parts":[[2007,6,26]],"date-time":"2007-06-26T15:47:30Z","timestamp":1182872850000},"page":"49-60","source":"Crossref","is-referenced-by-count":0,"title":["Security Requirements Analysis for Large-Scale Distributed File Systems"],"prefix":"10.1007","author":[{"given":"Syed","family":"Naqvi","sequence":"first","affiliation":[]},{"given":"Olivier","family":"Poitou","sequence":"additional","affiliation":[]},{"given":"Philippe","family":"Massonet","sequence":"additional","affiliation":[]},{"given":"Alvaro","family":"Arenas","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"6_CR1","volume-title":"Proceedings of 18th ACM Symposium on Operating Systems Principles (SOSP\u201901)","author":"F. Dabek","year":"2001","unstructured":"Dabek, F., Kaashoek, M., Karger, D., Morris, R., Stoica, I.: Wide-Area Cooperative Storage with CFS. In: Proceedings of 18th ACM Symposium on Operating Systems Principles (SOSP\u201901), chateau Lake Louise, Banff, Canada, October 2001, ACM, New York (2001)"},{"key":"6_CR2","unstructured":"INRIA Project PASTIS, http:\/\/regal.lip6.fr\/projects\/pastis\/pastis_fr.html"},{"key":"6_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"329","DOI":"10.1007\/3-540-45518-3_18","volume-title":"Middleware 2001","author":"A. Rowstron","year":"2001","unstructured":"Rowstron, A., Druschel, P.: Pastry: Scalable, Distributed Object Location and Routing for Large-Scale Peer-to-Peer Systems. In: Guerraoui, R. (ed.) Middleware 2001. LNCS, vol.\u00a02218, pp. 329\u2013350. Springer, Heidelberg (2001)"},{"key":"6_CR4","first-page":"65","volume-title":"Proceedings of the 8th IEEE Workshop on Hot Topics in Operating Systems (HotOS-VIII)","author":"P. Druschel","year":"2001","unstructured":"Druschel, P., Rowstron, A.: Past: Persistent and Anonymous Storage in a Peer-to-Peer Networking Environment. In: Proceedings of the 8th IEEE Workshop on Hot Topics in Operating Systems (HotOS-VIII), pp. 65\u201370. IEEE Computer Society Press, Los Alamitos (2001)"},{"key":"6_CR5","volume-title":"Proceedings of the 12th IEEE International Symposium on High Performance Distributed Computing (HPDC\u201903)","author":"V. Welch","year":"2003","unstructured":"Welch, V., Siebenlist, F., Foster, I., Bresnahan, J., Czajkowski, K., Gawor, J., Kesselman, C., Meder, S., Pearlman, L., Tuecke, S.: Security for Grid Services. In: Proceedings of the 12th IEEE International Symposium on High Performance Distributed Computing (HPDC\u201903), IEEE Computer Society Press, Los Alamitos (2003)"},{"issue":"3","key":"6_CR6","doi-asserted-by":"publisher","first-page":"200","DOI":"10.1177\/109434200101500302","volume":"15","author":"I. Foster","year":"2001","unstructured":"Foster, I., Kesselman, C., Tuecke, S.: The Anatomy of the Grid: Enabling Scalable Virtual Organizations. International Journal of High Performance Computing Application\u00a015(3), 200\u2013222 (2001)","journal-title":"International Journal of High Performance Computing Application"},{"key":"6_CR7","unstructured":"Foster, I., Kesselman, C., Pearlman, L., Tuecke, S., Welch, V.: The Community Authorization Service: Status and Future. In: Proceedings of Computing in High Energy Physics 03 (CHEP \u201903), La Jolla, California, USA, March 24-28 (2003)"},{"key":"6_CR8","unstructured":"Allcock, W., et al.: GridFTP: Protocol extensions to FTP for the Grid, GGF Document Series GFD.20 (April 2003)"},{"key":"6_CR9","doi-asserted-by":"crossref","unstructured":"Foster, I., Kesselman, C., Tsudik, G., Tuecke, S.: A Security Architecture for Computational Grids. ACM Conference Proceedings, pp. 83-92 (1998)","DOI":"10.1145\/288090.288111"},{"key":"6_CR10","doi-asserted-by":"crossref","unstructured":"Rescorla, E.: Hyper Text Transfer Protocol (HTTP) over Transport Layer Security (TLS), Internet Engineering Task Force (IETF) draft RFC # 2818 (May 2000)","DOI":"10.17487\/rfc2818"},{"key":"6_CR11","doi-asserted-by":"crossref","unstructured":"Chokhani, S.: Internet X.509 Public Key Infrastructure Certificate Policy and Certification Practices Framework, Internet Engineering Task Force (IETF) draft RFC # 2527 (March 1999)","DOI":"10.17487\/rfc2527"},{"key":"6_CR12","unstructured":"Thompson, M., Olson, D., Cowles, R., Mullen, S., Helm, M.: CA-based Trust Issues for Grid Authentication and Identity Delegation, Global Grid Forum (GGF) Certification Authority Operations Working Group Community Practices (Oct. 2002)"},{"key":"6_CR13","volume-title":"PGP: Pretty Good Privacy","author":"S. Garfinkel","year":"1994","unstructured":"Garfinkel, S.: PGP: Pretty Good Privacy. O\u2019Reilly & Associates, Sebastopol (1994)"},{"key":"6_CR14","volume-title":"SSH: The Secure Shell","author":"D. Barret","year":"2001","unstructured":"Barret, D., Silverman, R.: SSH: The Secure Shell. O\u2019Reilly & Associates, Sebastopol (2001)"},{"key":"6_CR15","doi-asserted-by":"crossref","unstructured":"Ellison, C.: SPKI Requirements, IETF RFC 2692 (1999), http:\/\/www.ietf.org\/rfc\/rfc2692.txt","DOI":"10.17487\/rfc2692"},{"key":"6_CR16","unstructured":"The Certification Authority of Belgian Grid Initiative, http:\/\/www.begrid.be\/certification.htm"},{"key":"6_CR17","volume-title":"Proceedings of the IEEE 3rd International Workshop on Policies for Distributed Systems and Networks","author":"L. Pearlman","year":"2002","unstructured":"Pearlman, L., Welch, V., Foster, I., Kesselman, C., Tuecke, S.: A Community Authorization Service for Group Collaboration. In: Proceedings of the IEEE 3rd International Workshop on Policies for Distributed Systems and Networks, IEEE Computer Society Press, Los Alamitos (2002)"},{"key":"6_CR18","unstructured":"Ferraiolo, D., Cugini, J., Kuhn, D.: Role Based Access Control (RBAC): Features and Motivations. In: Proceedings of the 11th Computer Security Applications Conference, New Orleans, LA, USA, 11-15 December, pp. 241\u2013248 (1995)"},{"issue":"2","key":"6_CR19","doi-asserted-by":"publisher","first-page":"115","DOI":"10.1177\/109434209701100205","volume":"11","author":"I. Foster","year":"1998","unstructured":"Foster, I., Kesselman, C.: Globus: A Metacomputing Infrastructure Toolkit. International Journal of Supercomputer Applications\u00a011(2), 115\u2013129 (1998)","journal-title":"International Journal of Supercomputer Applications"},{"key":"6_CR20","unstructured":"VOMS Architecture v1.1 (May 2002), http:\/\/gridauth.infn.it\/docs\/VOMS-v1_1.pdf"},{"key":"6_CR21","unstructured":"Thompson, M., Johnston, W., Mudumbai, S., Hoo, G., Jackson, K., Essiari, A.: Certificate-based Access Control for Widely Distributed Resources. In: 8th Usenix Security Symposium (1999)"},{"key":"6_CR22","volume-title":"7th ACM Symposium on Access Control Models and Technologies","author":"D. Chadwick","year":"2002","unstructured":"Chadwick, D., Otenko, A.: The PERMIS X.509 Role Based Privilege Management Infrastructure. In: 7th ACM Symposium on Access Control Models and Technologies, ACM Press, New York (2002)"},{"key":"6_CR23","unstructured":"National Institute of Standards and Technology, Secure Hash Standard. Federal Information Processing Standards Publication 180-1, April 17 (1995)"},{"key":"6_CR24","unstructured":"Olmedilla, D., Rana, O., Matthews, B., Nejdl, W.: Security and Trust Issues in Semantic Grids. Proceedings of Schloss Dagstuhl Seminar no. 05271: Semantic Grid: The Convergence of Technologies, Dagstuhl, Germany, July 03-08 (2005)"},{"key":"6_CR25","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/3-540-36180-4_9","volume-title":"Job Scheduling Strategies for Parallel Processing","author":"K. Czajkowski","year":"2002","unstructured":"Czajkowski, K., Foster, I., Kesselman, C., Sander, V., Tuecke, S.: SNAP: A Protocol for Negotiating Service Level Agreements and Coordinating Resource Management in Distributed Systems. In: Feitelson, D.G., Rudolph, L., Schwiegelshohn, U. (eds.) JSSPP 2002. LNCS, vol.\u00a02537, pp. 3\u2013540. Springer, Heidelberg (2002)"},{"key":"6_CR26","unstructured":"Silicon Graphics Incorporate (SGI), SGI and Intel on the Grid \u2013 Unique Capabilities for Grid Computing, Whitepaper (2005)"},{"key":"6_CR27","doi-asserted-by":"publisher","first-page":"145","DOI":"10.1109\/MSST.2005.17","volume-title":"Proceedings of 22nd IEEE \/ 13th NASA Goddard Conference on Mass Storage Systems and Technologies 2005","author":"R. Watson","year":"2005","unstructured":"Watson, R.: High Performance Storage System Scalability: Architecture, Implementation and Experience. In: Proceedings of 22nd IEEE \/ 13th NASA Goddard Conference on Mass Storage Systems and Technologies 2005, 11-14 April, pp. 145\u2013159. IEEE Computer Society Press, Los Alamitos (2005)"}],"container-title":["Lecture Notes in Computer Science","Euro-Par 2006: Parallel Processing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-72337-0_6.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,19]],"date-time":"2020-11-19T05:30:28Z","timestamp":1605763828000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-72337-0_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540722267","9783540723370"],"references-count":27,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-72337-0_6","relation":{},"subject":[]}}