{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T23:09:06Z","timestamp":1725491346784},"publisher-location":"Berlin, Heidelberg","reference-count":13,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540754435"},{"type":"electronic","value":"9783540754442"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2007]]},"DOI":"10.1007\/978-3-540-75444-2_30","type":"book-chapter","created":{"date-parts":[[2007,9,7]],"date-time":"2007-09-07T15:48:35Z","timestamp":1189180115000},"page":"273-284","source":"Crossref","is-referenced-by-count":0,"title":["File and Memory Security Analysis for Grid Systems"],"prefix":"10.1007","author":[{"given":"Unnati","family":"Thakore","sequence":"first","affiliation":[]},{"given":"Lorie M.","family":"Liebrock","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"30_CR1","unstructured":"Burdach, M.: Digital Forensics of the Physical Memory (2005), http:\/\/forensic.seccure.net\/pdf\/mburdach_digital_forensics_of_physical_memory.pdf"},{"key":"30_CR2","unstructured":"Welch, V., Foster, I., Kesselman, C., Mulmo, O., Pearlman, L., Tuecke, S., Gawor, J., Meder, S., Siebenlist, F.: X.509 Proxy Certificates for Dynamic Delegation. In: 3rd Annual PKI R&D Workshop, pp. 42\u201358 (2004)"},{"key":"30_CR3","unstructured":"Globus Toolkit 4.0 Release Manuals (2007), http:\/\/www.globus.org\/toolkit\/docs\/4.0\/"},{"key":"30_CR4","doi-asserted-by":"crossref","unstructured":"Foster, T., Kesselman, C., Tsudik, G., Tuecke, S.: A Security Architecture for Computational Grids. In: Proc. 5th ACM Conference on Computer and Communications Security Conference, pp. 83\u201392 (1998)","DOI":"10.1145\/288090.288111"},{"key":"30_CR5","unstructured":"Mallery, J.R.: Secure File Deletion, Fact or Fiction (2006), http:\/\/www.sans.org\/rr\/papers\/27\/631.pdf"},{"key":"30_CR6","unstructured":"Gutmann, P.: Secure Deletion of Data from Magnetic and Solid-State Memory. In: Sixth USENIX Security Symposium Proceedings, San Jose, California, pp. 77\u201389 (1996)"},{"key":"30_CR7","unstructured":"Foster, I.: A Globus primer (2005), www.globus.org\/primer"},{"key":"30_CR8","doi-asserted-by":"crossref","unstructured":"Naqvi, S., Arenas, A., Massonet, P.: Scope of Forensics in Grid Computing - Vision and Perspectives. In: Proceedings of the International Workshop on Information Security and Digital Forensics. LNCS, pp. 964\u2013970 (2006)","DOI":"10.1007\/11942634_98"},{"key":"30_CR9","volume-title":"Forensic Discovery","author":"D. Farmer","year":"2005","unstructured":"Farmer, D., Venema, W.: Forensic Discovery. Addison Wesley Professional, Boston (2005)"},{"key":"30_CR10","doi-asserted-by":"crossref","unstructured":"Humphrey, M., Thompson, M.R.: Security Implications of Typical Grid Computing Usage Scenarios. In: Proceedings of HPDC, pp. 95\u2013103 (2001)","DOI":"10.1109\/HPDC.2001.945180"},{"issue":"3","key":"30_CR11","doi-asserted-by":"publisher","first-page":"644","DOI":"10.1109\/JPROC.2004.842776","volume":"93","author":"M. Humphrey","year":"2005","unstructured":"Humphrey, M., Thompson, M.R., Jackson, K.R.: Security for Grids. Proceedings of the IEEE\u00a093(3), 644\u2013652 (2005)","journal-title":"Proceedings of the IEEE"},{"key":"30_CR12","doi-asserted-by":"crossref","unstructured":"Verma, D., Sahu, S., Calo, S., Beigi, M., Chang, I.: A Policy Service for GRID Computing. In: Proceedings of the Third International Workshop on Grid Computing (2002)","DOI":"10.1007\/3-540-36133-2_22"},{"key":"30_CR13","volume-title":"Globus Toolkit 4: Programming Java Services","author":"B. Sotomayor","year":"2005","unstructured":"Sotomayor, B., Childers, L.: Globus Toolkit 4: Programming Java Services. Morgan Kaufmann, San Francisco (2005)"}],"container-title":["Lecture Notes in Computer Science","High Performance Computing and Communications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-75444-2_30","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,2]],"date-time":"2019-05-02T22:00:48Z","timestamp":1556834448000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-75444-2_30"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007]]},"ISBN":["9783540754435","9783540754442"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-75444-2_30","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2007]]}}}