{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T10:44:37Z","timestamp":1725533077532},"publisher-location":"Berlin, Heidelberg","reference-count":4,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642020551"},{"type":"electronic","value":"9783642020568"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-02056-8_21","type":"book-chapter","created":{"date-parts":[[2009,6,5]],"date-time":"2009-06-05T22:43:27Z","timestamp":1244241807000},"page":"306-309","source":"Crossref","is-referenced-by-count":2,"title":["Security and Trust Management for Virtual Organisations: GridTrust Approach"],"prefix":"10.1007","author":[{"given":"Syed","family":"Naqvi","sequence":"first","affiliation":[]},{"given":"Paolo","family":"Mori","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"21_CR1","volume-title":"Proc. eChallenges Conference 2008. Collaboration and the Knowledge Economy: Issues, Applications, Case Studies","author":"L. Blasi","year":"2008","unstructured":"Blasi, L., Arenas, A., Aziz, B., Mori, P., Rovati, U., Crispo, B., Martinelli, F., Massonet, P.: A Secure Environment for Grid-Based Supply Chains. In: Cunningham, P., Cunningham, M. (eds.) Proc. eChallenges Conference 2008. Collaboration and the Knowledge Economy: Issues, Applications, Case Studies. IOS Press, Amsterdam (2008)"},{"key":"21_CR2","volume-title":"Proceeding of Grid-STP 2007, International Workshop on Security, Trust and Privacy in Grid Systems at SecureComm 2007","author":"F. Martinelli","year":"2007","unstructured":"Martinelli, F., Mori, P.: A Model for Usage Control in GRID Systems. In: Proceeding of Grid-STP 2007, International Workshop on Security, Trust and Privacy in Grid Systems at SecureComm 2007. IEEE Computer Society, Los Alamitos (2007)"},{"key":"21_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"242","DOI":"10.1007\/978-3-540-89897-9_21","volume-title":"ServiceWave 2008","author":"S. Naqvi","year":"2008","unstructured":"Naqvi, S., Massonet, P., Aziz, B., Arenas, A., Martinelli, F., Mori, P., Blasi, L., Cortese, G.: Fine-grained continuous usage control of service based Grids the GridTrust Approach. In: M\u00e4h\u00f6nen, P., Pohl, K., Priol, T. (eds.) ServiceWave 2008. LNCS, vol.\u00a05377, pp. 242\u2013253. Springer, Heidelberg (2008)"},{"issue":"1","key":"21_CR4","first-page":"129","volume":"7","author":"R. Sandhu","year":"2004","unstructured":"Sandhu, R., Park, J.: The UCONABC Usage Control Model. ACM transaction on Information and System Security\u00a07(1), 129\u2013174 (2004)","journal-title":"ACM transaction on Information and System Security"}],"container-title":["IFIP Advances in Information and Communication Technology","Trust Management III"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-02056-8_21","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,3,8]],"date-time":"2019-03-08T18:03:46Z","timestamp":1552068226000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-02056-8_21"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642020551","9783642020568"],"references-count":4,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-02056-8_21","relation":{},"ISSN":["1868-4238","1868-422X"],"issn-type":[{"type":"print","value":"1868-4238"},{"type":"electronic","value":"1868-422X"}],"subject":[],"published":{"date-parts":[[2009]]}}}