{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T03:10:14Z","timestamp":1761621014727,"version":"3.37.3"},"publisher-location":"Berlin, Heidelberg","reference-count":26,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642020551"},{"type":"electronic","value":"9783642020568"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-02056-8_7","type":"book-chapter","created":{"date-parts":[[2009,6,5]],"date-time":"2009-06-05T22:43:27Z","timestamp":1244241807000},"page":"99-116","source":"Crossref","is-referenced-by-count":5,"title":["On Usage Control in Data Grids"],"prefix":"10.1007","author":[{"given":"Federico","family":"Stagni","sequence":"first","affiliation":[]},{"given":"Alvaro","family":"Arenas","sequence":"additional","affiliation":[]},{"given":"Benjamin","family":"Aziz","sequence":"additional","affiliation":[]},{"given":"Fabio","family":"Martinelli","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"7_CR1","unstructured":"Antonioletti, M., Berry, D., Chervenak, A., Kunszt, P., Luniewski, A., Laws, S., Morgan, M.: Ogsa data architecture v0.6.6. Technical report, Open Grid Forum (2007), http:\/\/forge.gridforum.org\/sf\/go\/doc13635?nav=1"},{"key":"7_CR2","doi-asserted-by":"crossref","unstructured":"Aziz, B., Arenas, A., Martinelli, F., Matteucci, I., Mori, P.: Controlling usage in business process workflows through fine-grained security policies. In: Springer (ed.) 5th International Conference on Trust, Privacy& Security in Digital Business (2008)","DOI":"10.1007\/978-3-540-85735-8_11"},{"key":"7_CR3","unstructured":"Chadwick, D.: Functional components of grid service provider authorisation service middleware. Technical report, Open Grid Forum (2008), http:\/\/forge.gridforum.org\/sf\/go\/doc15171?nav=1"},{"issue":"2","key":"7_CR4","doi-asserted-by":"publisher","first-page":"102","DOI":"10.1016\/j.websem.2006.03.001","volume":"4","author":"\u00d3. Corcho","year":"2006","unstructured":"Corcho, \u00d3., Alper, P., Kotsiopoulos, I., Missier, P., Bechhofer, S., Goble, C.A.: An overview of s-ogsa: A reference semantic grid architecture. J. Web Sem.\u00a04(2), 102\u2013115 (2006)","journal-title":"J. Web Sem."},{"key":"7_CR5","doi-asserted-by":"crossref","unstructured":"Ferraiolo, D., Sandhu, R., Gavrila, S., Kuhn, D., Chandramouli, R.: Proposed nist standard for role-based access control. ACM Transactions on Information and System Security (TISSEC) (3), 224\u2013274 (2001)","DOI":"10.1145\/501978.501980"},{"key":"7_CR6","unstructured":"Frohner, A., Kunszt, P.Z., Brito da Rocha, R., Laure, E.: Security of distributed data management. Technical Report EGEE-TR-2006-003. EGEE-TR-2006-DATASEC (2006)"},{"key":"7_CR7","unstructured":"Group, T.S.R.M.W.: An internet attribute certificate profile for authorization (2008), http:\/\/sdm.lbl.gov\/srm-wg\/doc\/SRM.v2.2.pdf http:\/\/sdm.lbl.gov\/srm-wg\/doc\/SRM.v.2.2.pdf"},{"key":"7_CR8","unstructured":"HealthGrid: Healthgrid white paper. Technical Report HealthGrid-White_Paper-Draft_v.1.1-5, HealthGrid (2004)"},{"key":"7_CR9","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1109\/ICSNC.2006.75","volume-title":"ICSNC 2006: Proceedings of the International Conference on Systems and Networks Communication","author":"M. Hilty","year":"2006","unstructured":"Hilty, M., Pretschner, A., Schaefer, C., Walter, T.: Usage control requirements in mobile and ubiquitous computing applications. In: ICSNC 2006: Proceedings of the International Conference on Systems and Networks Communication, p. 27. IEEE Computer Society, Los Alamitos (2006)"},{"key":"7_CR10","volume-title":"Grid-STP 2007, International Conference on Security, Trust and Privacy in Grid Systems","author":"F. Martinelli","year":"2007","unstructured":"Martinelli, F., Mori, P.: A Model for Usage Control in GRID systems. In: Grid-STP 2007, International Conference on Security, Trust and Privacy in Grid Systems. IEEE Computer Society, Los Alamitos (2007)"},{"key":"7_CR11","doi-asserted-by":"crossref","unstructured":"Martinelli, F., Mori, P., Vaccarelli, A.: Towards continuous usage control on grid computational services. In: ICAS\/ICNS, p. 82 (2005)","DOI":"10.1109\/ICAS-ICNS.2005.93"},{"key":"7_CR12","unstructured":"Moore, R., Jagatheesan, A., Rajasekar, A., Wan, M., Schroeder, W.: Data Grid Management Systems. In: Proceedings of the 21st IEEE\/NASA Conference on Mass Storage Systems and Technologies, Maryland, USA (2004)"},{"key":"7_CR13","unstructured":"OASIS: Oasis extensible access control markup language (xacml) tc (2005), http:\/\/www.oasis-open.org\/committees\/xacml"},{"issue":"1","key":"7_CR14","doi-asserted-by":"publisher","first-page":"128","DOI":"10.1145\/984334.984339","volume":"7","author":"J. Park","year":"2004","unstructured":"Park, J., Sandhu, R.: The UCON $_{\\textup{abc}}$ Usage Control Model. ACM Transactions on Information and System Security\u00a07(1), 128\u2013174 (2004)","journal-title":"ACM Transactions on Information and System Security"},{"key":"7_CR15","doi-asserted-by":"crossref","unstructured":"Pretschner, A., Hilty, M., Basin, D.: Distributed usage control. Communications of the ACM (2006)","DOI":"10.1145\/1151030.1151053"},{"key":"7_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"83","DOI":"10.1007\/978-3-540-74409-2_11","volume-title":"Trust, Privacy and Security in Digital Business","author":"A. Pretschner","year":"2007","unstructured":"Pretschner, A., Massacci, F., Hilty, M.: Usage control in service-oriented architectures. In: Lambrinoudakis, C., Pernul, G., Tjoa, A.M. (eds.) TrustBus 2007. LNCS, vol.\u00a04657, pp. 83\u201393. Springer, Heidelberg (2007)"},{"key":"7_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1007\/978-3-540-45215-7_2","volume-title":"Computer Network Security","author":"R.S. Sandhu","year":"2003","unstructured":"Sandhu, R.S., Park, J.: Usage control: A vision for next generation access control. In: Gorodetsky, V., Popyack, L.J., Skormin, V.A. (eds.) MMM-ACNS 2003. LNCS, vol.\u00a02776, pp. 17\u201331. Springer, Heidelberg (2003)"},{"key":"7_CR18","doi-asserted-by":"crossref","unstructured":"Stagni, F., Arenas, A.E., Aziz, B.: On usage control in data grids. Technical Report TR-0154, Institute on Knowledge and Data Management, CoreGRID - Network of Excellence (2008)","DOI":"10.1007\/978-3-642-02056-8_7"},{"key":"7_CR19","unstructured":"Sufi, S., Matthews, B.M.: The cclrc scientific metadata model: a metadata model for the exploitation of scientific studies and associated data. In: Knowledge and Data Management in Grids (2005), http:\/\/epubs.cclrc.ac.uk\/work-details?w=34195"},{"key":"7_CR20","unstructured":"team, E.J.: Egee global security architecture for web and legacy services. deliverable EGEE-JRA3-TEC-487004-DJRA3.1-v1-1, EGEE JRA3 (2004)"},{"key":"7_CR21","first-page":"545","volume-title":"E-SCIENCE 2007: Proceedings of the Third IEEE International Conference on e-Science and Grid Computing","author":"V. Venturi","year":"2007","unstructured":"Venturi, V., Stagni, F., Gianoli, A., Ceccanti, A., Ciaschini, V.: Virtual organization management across middleware boundaries. In: E-SCIENCE 2007: Proceedings of the Third IEEE International Conference on e-Science and Grid Computing, pp. 545\u2013552. IEEE Computer Society, Washington (2007), http:\/\/dx.doi.org\/10.1109\/E-SCIENCE.2007.84"},{"issue":"1","key":"7_CR22","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1145\/1132952.1132955","volume":"38","author":"S. Venugopal","year":"2006","unstructured":"Venugopal, S., Buyya, R., Ramamohanarao, K.: A taxonomy of data grids for distributed data sharing, management, and processing. ACM Comput. Surv.\u00a038(1), 3 (2006), http:\/\/dx.doi.acm.org\/10.1145\/1132952.1132955","journal-title":"ACM Comput. Surv."},{"key":"7_CR23","first-page":"71","volume-title":"SACMAT 2007: Proceedings of the 12th ACM symposium on Access control models and technologies","author":"M. Xu","year":"2007","unstructured":"Xu, M., Jiang, X., Sandhu, R., Zhang, X.: Towards a vmm-based usage control framework for os kernel integrity protection. In: SACMAT 2007: Proceedings of the 12th ACM symposium on Access control models and technologies, pp. 71\u201380. ACM, New York (2007), http:\/\/doi.acm.org\/10.1145\/1266840.1266852"},{"key":"7_CR24","unstructured":"Yao, D.: An ad hoc trust inference model for flexible and controlled information sharing. In: Security and Management, pp. 555\u2013561 (2008)"},{"issue":"1","key":"7_CR25","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1330295.1330298","volume":"11","author":"X. Zhang","year":"2008","unstructured":"Zhang, X., Nakae, M., Covington, M.J., Sandhu, R.: Toward a usage-based security framework for collaborative computing systems. ACM Trans. Inf. Syst. Secur.\u00a011(1), 1\u201336 (2008), http:\/\/doi.acm.org\/10.1145\/1330295.1330298","journal-title":"ACM Trans. Inf. Syst. Secur."},{"issue":"4","key":"7_CR26","doi-asserted-by":"publisher","first-page":"351","DOI":"10.1145\/1108906.1108908","volume":"8","author":"X. Zhang","year":"2005","unstructured":"Zhang, X., Parisi-Presicce, F., Sandhu, R., Park, J.: Formal Model and Policy Specification of Usage Control. ACM Transactions on Information and System Security\u00a08(4), 351\u2013387 (2005), http:\/\/doi.acm.org\/10.1145\/1108906.1108908","journal-title":"ACM Transactions on Information and System Security"}],"container-title":["IFIP Advances in Information and Communication Technology","Trust Management III"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-02056-8_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,5,25]],"date-time":"2023-05-25T14:50:39Z","timestamp":1685026239000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-02056-8_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642020551","9783642020568"],"references-count":26,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-02056-8_7","relation":{},"ISSN":["1868-4238","1868-422X"],"issn-type":[{"type":"print","value":"1868-4238"},{"type":"electronic","value":"1868-422X"}],"subject":[],"published":{"date-parts":[[2009]]}}}