{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T04:57:53Z","timestamp":1725512273684},"publisher-location":"Berlin, Heidelberg","reference-count":20,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540723592"},{"type":"electronic","value":"9783540723608"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-72360-8_30","type":"book-chapter","created":{"date-parts":[[2007,6,20]],"date-time":"2007-06-20T23:07:03Z","timestamp":1182380823000},"page":"348-361","source":"Crossref","is-referenced-by-count":4,"title":["Authentication and Access Control Using Trust Collaboration in Pervasive Grid Environments"],"prefix":"10.1007","author":[{"given":"Rachid","family":"Saadi","sequence":"first","affiliation":[]},{"given":"Jean Marc","family":"Pierson","sequence":"additional","affiliation":[]},{"given":"Lionel","family":"Brunie","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"30_CR1","volume-title":"The Grid: Blueprint for a New Computing Infrastructure","author":"I. Foster","year":"1999","unstructured":"Foster, I., Kesselman, C.: The Grid: Blueprint for a New Computing Infrastructure. Morgan Kaufmann, San Francisco (1999)"},{"key":"30_CR2","doi-asserted-by":"crossref","unstructured":"Satyanarayanan, M.: Pervasive Computing: Vision and Challenges. IEEE Personal Communications journal, 10-17 (Aug. 2001)","DOI":"10.1109\/98.943998"},{"key":"30_CR3","unstructured":"Shankar, N., Arbaugh, W.: On Trust for Ubiquitous Computing. In: Workshop on Security in Ubiquitous Computing (Sep. 2004)"},{"key":"30_CR4","doi-asserted-by":"crossref","unstructured":"Seitz, L., Pierson, J.M., Brunie, L.: Semantic Access Control for Medical Applications in Grid Environments. In: International Conference on Parallel and Distributed Computing, Aug. 2003, pp. 374\u2013383 (2003)","DOI":"10.1007\/978-3-540-45209-6_56"},{"key":"30_CR5","doi-asserted-by":"crossref","unstructured":"Aloisio, G., et al.: Grid Computing in the Web Using the Globus Toolkits. Editor HPCN Europe, pp. 32-40 (2000)","DOI":"10.1007\/3-540-45492-6_4"},{"key":"30_CR6","doi-asserted-by":"crossref","unstructured":"Chadwick, D., Otenko, A.: The PERMIS X.509 Role Based Privilege Management Infrastructure. In: Proceedings of the 7th ACM Symposium on Access Control Models and Technologies, Jun. 2002, pp. 135\u2013140 (2002)","DOI":"10.1145\/507711.507732"},{"key":"30_CR7","unstructured":"Lorch, M., et al.: The PRIMA System for Privilege Management, Authorization and Enforcement. In: Proceedings of the 4th International Workshop on Grid Computing (Nov. 2003)"},{"key":"30_CR8","unstructured":"ITU-T Rec. X.509, ISO\/IEC 9594-8 The Directory: Authentication Framework (2000)"},{"key":"30_CR9","unstructured":"ITU-T Simple public key infrastructure (SPKI) charter, http:\/\/www.ietf.org\/html.charters\/OLD\/spki-charter.html"},{"key":"30_CR10","doi-asserted-by":"crossref","unstructured":"Abdul-Rahman, A., Hailes, S.: A Distributed Trust Model. In: Proceedings of the ACM Workshop on New Security Paradigms, Sep. 1997, pp. 48\u201360 (1997)","DOI":"10.1145\/283699.283739"},{"issue":"8","key":"30_CR11","doi-asserted-by":"publisher","first-page":"461","DOI":"10.1145\/360303.360333","volume":"19","author":"M.H. Harrison","year":"1976","unstructured":"Harrison, M.H., Ruzzo, W.L., Ullman, J.D.: Protection in Operating Systems. Communications of the ACM\u00a019(8), 461\u2013471 (1976)","journal-title":"Communications of the ACM"},{"key":"30_CR12","unstructured":"Bell, D.E.: A Refinement of the Mathematical Model. Technical Report ESD-TR-278, vol. 3, The Mitre Corp., Bedford, MA (1973)"},{"issue":"2","key":"30_CR13","doi-asserted-by":"crossref","first-page":"38","DOI":"10.1109\/2.485845","volume":"29","author":"R. Sandhu","year":"1996","unstructured":"Sandhu, R., et al.: Role-Based Access Control Models. IEEE Computer\u00a029(2), 38\u201347 (1996)","journal-title":"IEEE Computer"},{"key":"30_CR14","unstructured":"Saadi, R., Pierson, J.M., Brunie, L.: X316: Morph Access Pass certificate. Technical Report, INSA de Lyon France (2006)"},{"key":"30_CR15","doi-asserted-by":"crossref","unstructured":"Chaari, T., et al.: Modeling and Using Context in Adapting Applications to Pervasive Environments. In: Proceedings of the IEEE International Conference on Pervasive Services (ICPS\u201906), Lyon, France, Jun. 2006, pp. 111\u2013120 (2006)","DOI":"10.1109\/PERSER.2006.1652214"},{"key":"30_CR16","unstructured":"Basney, J., et al.: Negotiating trust on the grid. In: 2nd WWW Workshop on Semantics in P2P and Grid Computing (May 2004)"},{"issue":"4","key":"30_CR17","doi-asserted-by":"publisher","first-page":"289","DOI":"10.1108\/17427370580000132","volume":"1","author":"R. Saadi","year":"2005","unstructured":"Saadi, R., Pierson, J., Brunie, L. (Dis)trust Certification Model for Large Access in Pervasive Environment. JPCC International Journal of Pervasive Computing and Communications\u00a01(4), 289\u2013299 (2005)","journal-title":"JPCC International Journal of Pervasive Computing and Communications"},{"issue":"32","key":"30_CR18","first-page":"168","volume":"11","author":"N. Sklavos","year":"2003","unstructured":"Sklavos, N., Koufopavlou, O.: Mobile Communications World: Security Implementations Aspects - A State of the Art. CSJM Journal, Institute of Mathematics and Computer Science\u00a011(32), 168\u2013187 (2003)","journal-title":"CSJM Journal, Institute of Mathematics and Computer Science"},{"key":"30_CR19","unstructured":"Imamura, T., Dillaway, B., Simon, E.: XML-signature syntax and processing. In: W3C Recommendation (Dec. 2002), http:\/\/www.w3.org\/TR\/2002\/REC-xmlenc-core-20021210\/"},{"key":"30_CR20","unstructured":"Bartel, M., et al.: XML-encryption syntax and processing. In: W3C Recommendation (Feb. 2002), http:\/\/www.w3.org\/TR\/2002\/REC-xmldsig-core-20020212\/"}],"container-title":["Lecture Notes in Computer Science","Advances in Grid and Pervasive Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-72360-8_30.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,19]],"date-time":"2020-11-19T05:30:53Z","timestamp":1605763853000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-72360-8_30"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540723592","9783540723608"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-72360-8_30","relation":{},"subject":[]}}