{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T04:52:34Z","timestamp":1725511954569},"publisher-location":"Berlin, Heidelberg","reference-count":17,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540747796"},{"type":"electronic","value":"9783540747802"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-74780-2_26","type":"book-chapter","created":{"date-parts":[[2007,8,30]],"date-time":"2007-08-30T03:05:09Z","timestamp":1188443109000},"page":"217-225","source":"Crossref","is-referenced-by-count":0,"title":["A Composite-Service Authorization Prediction Platform for Grid Environment"],"prefix":"10.1007","author":[{"given":"Chuanjiang","family":"Yi","sequence":"first","affiliation":[]},{"given":"Hai","family":"Jin","sequence":"additional","affiliation":[]},{"given":"Sheng","family":"Di","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"26_CR1","doi-asserted-by":"publisher","first-page":"66","DOI":"10.1145\/373256.373266","volume-title":"Proceedings of 6th ACM Symposium on Access Control Models and Technologies","author":"M.H. Kang","year":"2001","unstructured":"Kang, M.H., Park, J.S., Froscher, J.N.: Access Control Mechanisms for Inter-Organizational Workflow. In: Proceedings of 6th ACM Symposium on Access Control Models and Technologies, Chantilly, Virginia, USA, pp. 66\u201374. ACM Press, New York (2001)"},{"unstructured":"Workflow Management Coalition Terminology & Glossary (WFMC-TC-1011, v3.0), http:\/\/www.wfmc.org\/standards\/docs\/TC-1011_term_glossary_v3.pdf","key":"26_CR2"},{"issue":"3","key":"26_CR3","doi-asserted-by":"publisher","first-page":"200","DOI":"10.1177\/109434200101500302","volume":"15","author":"I. Foster","year":"2001","unstructured":"Foster, I., Kesselman, C., Tuecke, S.: The Anatomy of the Grid: Enabling Scalable Virtual Organizations. International Journal of High Performance Computing Applications\u00a015(3), 200\u2013222 (2001)","journal-title":"International Journal of High Performance Computing Applications"},{"key":"26_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"13","DOI":"10.1007\/978-3-540-30544-6_2","volume-title":"Digital Libraries: International Collaboration and Cross-Fertilization","author":"H. Jin","year":"2004","unstructured":"Jin, H.: ChinaGrid: Making Grid Computing a Reality. In: Chen, Z., Chen, H., Miao, Q., Fu, Y., Fox, E., Lim, E.-p. (eds.) ICADL 2004. LNCS, vol.\u00a03334, pp. 13\u201324. Springer, Heidelberg (2004)"},{"issue":"8","key":"26_CR5","doi-asserted-by":"publisher","first-page":"461","DOI":"10.1145\/360303.360333","volume":"19","author":"M.H. Harrison","year":"1976","unstructured":"Harrison, M.H., Ruzzo, W.L., Ullman, J.D.: Protection in operating systems. Communications of the ACM\u00a019(8), 461\u2013471 (1976)","journal-title":"Communications of the ACM"},{"unstructured":"Ferraiolo, D., Kuhn, R.: Role-Based Access Controls. In: Proceedings of the 15th NIST-NCSC National Computer Security Conference, pp. 554\u2013563 (1992)","key":"26_CR6"},{"issue":"2","key":"26_CR7","doi-asserted-by":"crossref","first-page":"38","DOI":"10.1109\/2.485845","volume":"29","author":"R. Sandhu","year":"1996","unstructured":"Sandhu, R., Conyne, E.J., Lfeinstein, H., Youman, C.E.: Role based access control models. IEEE Computer\u00a029(2), 38\u201347 (1996)","journal-title":"IEEE Computer"},{"doi-asserted-by":"crossref","unstructured":"Thomas, R.K., Sandhu, R.S.: Towards a task-based paradigm for flexible and adaptable access control in distributed applications. In: Proceedings of the 1992-1993 ACM SIGSAC New Security Paradigms Workshops, pp. 138\u2013142 (1993)","key":"26_CR8","DOI":"10.1145\/283751.283810"},{"unstructured":"Thomas, R.K., Sandhu, R.S.: Task-Based authorization: a research project in next-generation active security models for workflows. In: Proceedings of NSF Workshop on Workflow and Process Automation in Information Systems: State-of-the-Art and Future Directions (1996)","key":"26_CR9"},{"doi-asserted-by":"crossref","unstructured":"Thomas, R.K., Sandhu, R.S.: Task-based authentication controls (TABC): A family of models for active and enterprise-oriented authentication management. In: Proc. of the IFIP WG11.3 Workshop on Database Security, pp. 166\u2013181 (1997)","key":"26_CR10","DOI":"10.1007\/978-0-387-35285-5_10"},{"issue":"2","key":"26_CR11","doi-asserted-by":"publisher","first-page":"115","DOI":"10.1177\/109434209701100205","volume":"11","author":"I. Foster","year":"1998","unstructured":"Foster, I., Kesselman, C.: Globus: A Metacomputing Infrastructure Toolkit. International Journal of Supercomputer Applications\u00a011(2), 115\u2013129 (1998)","journal-title":"International Journal of Supercomputer Applications"},{"unstructured":"GT 4.0: Security: Community Authorization Service, http:\/\/www.globus.org\/toolkit\/docs\/4.0\/security\/cas\/","key":"26_CR12"},{"unstructured":"Pearlman, L., Kesselman, C., Welch, V., Foster, I., Tuecke, S.: The Community Authorization Service: Status and Future. In: Computing in High Energy and Nuclear Physics, La Jolla, California, pp. 24\u201328 (2003)","key":"26_CR13"},{"unstructured":"Business Process Execution Language for Web Services Version 1.1, http:\/\/www-106.ibm.com\/developerworks\/webservices\/library\/ws-bpel\/","key":"26_CR14"},{"unstructured":"ActiveBPEL engine, http:\/\/www.activebpel.org\/index.html","key":"26_CR15"},{"key":"26_CR16","volume-title":"Proceedings of the 2006 IEEE\/WIC\/ACM International Conference on Web Intelligence","author":"C. Yi","year":"2006","unstructured":"Yi, C., Jin, H., Wang, C.: Dynamic Access Control Prediction for Ordered Service Sequence in Grid Environment. In: Proceedings of the 2006 IEEE\/WIC\/ACM International Conference on Web Intelligence, IEEE Computer Society, Hong Kong, China (2006)"},{"unstructured":"Web Services Business Process Execution Language Version 2.0, http:\/\/docs.oasis-open.org\/wsbpel\/2.0\/wsbpel-specification-draft.pdf","key":"26_CR17"}],"container-title":["Lecture Notes in Computer Science","Cooperative Design, Visualization, and Engineering"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-74780-2_26.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T06:38:12Z","timestamp":1619505492000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-74780-2_26"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540747796","9783540747802"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-74780-2_26","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[]}}