{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T14:58:38Z","timestamp":1725548318296},"publisher-location":"Berlin, Heidelberg","reference-count":45,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642041167"},{"type":"electronic","value":"9783642041174"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-04117-4_16","type":"book-chapter","created":{"date-parts":[[2010,2,22]],"date-time":"2010-02-22T11:44:00Z","timestamp":1266839040000},"page":"293-308","source":"Crossref","is-referenced-by-count":1,"title":["Access and Usage Control in Grid Systems"],"prefix":"10.1007","author":[{"given":"Maurizio","family":"Colombo","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Aliaksandr","family":"Lazouski","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Fabio","family":"Martinelli","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Paolo","family":"Mori","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"key":"16_CR1","doi-asserted-by":"crossref","unstructured":"I.\u00a0Foster, C.\u00a0Kesselman, J.\u00a0Nick, S.\u00a0Tuecke: The physiology of the grid: An open grid service architecture for distributed system integration. Globus Project (2002), http:\/\/www.globus.org\/research\/papers\/ogsa.pdf","DOI":"10.1109\/MC.2002.1009167"},{"issue":"3","key":"16_CR2","doi-asserted-by":"publisher","first-page":"200","DOI":"10.1177\/109434200101500302","volume":"15","author":"I. Foster","year":"2001","unstructured":"I.\u00a0Foster, C.\u00a0Kesselman, S.\u00a0Tuecke: The anatomy of the grid: Enabling scalable virtual organizations, Int. J. Supercomput. Appl. 15(3), 200\u2013222 (2001)","journal-title":"Int. J. Supercomput. Appl."},{"key":"16_CR3","unstructured":"Open grid forum: http:\/\/www.ogf.org\/"},{"key":"16_CR4","unstructured":"The Globus Alliance: Welcome to globus, http:\/\/www.globus.org"},{"key":"16_CR5","doi-asserted-by":"crossref","unstructured":"I.\u00a0Foster: Globus toolkit version 4: Software for service-oriented systems. In: Proc. IFIP Int. Conference on Network and Parallel Computing, LNCS, Vol. 3779, ed. by H.\u00a0Jin, D.A.\u00a0Reed, W.\u00a0Jiang (Springer, 2005) pp. 2\u201313","DOI":"10.1007\/11577188_2"},{"key":"16_CR6","unstructured":"I.\u00a0Foster, C.\u00a0Kesselman: The globus project: A status report, Proc. IPPS\/SPDP \u201998 Heterogeneous Computing Workshop (1998) pp. 4\u201318"},{"issue":"15","key":"16_CR7","doi-asserted-by":"publisher","first-page":"1437","DOI":"10.1002\/spe.488","volume":"32","author":"M. Baker","year":"2002","unstructured":"M.\u00a0Baker, R.\u00a0Buyya, D.\u00a0Laforenza: Grids and grid technologies for wide-area distributed computing, Int. J. Softw. Pract. Exp. 32(15), 1437\u20131466 (2002)","journal-title":"Int. J. Softw. Pract. Exp."},{"issue":"5\/6","key":"16_CR8","doi-asserted-by":"publisher","first-page":"583","DOI":"10.1016\/S0167-739X(99)00011-4","volume":"15","author":"S.J. Chapin","year":"1999","unstructured":"S.J.\u00a0Chapin, D.\u00a0Katramatos, J.\u00a0Karpovich, A.\u00a0Grimshaw: Resource management in Legion, Future Gener. Comput. Syst. 15(5\/6), 583\u2013594 (1999)","journal-title":"Future Gener. Comput. Syst."},{"key":"16_CR9","unstructured":"A.\u00a0Vahdat, T.\u00a0Anderson, M.\u00a0Dahlin, E.\u00a0Belani, D.\u00a0Culler, P.\u00a0Eastham, C.\u00a0Yoshikawa: WebOS: Operating system services for wide area applications, Proc. 7th Symp. on High Performance Distributed Computing (1998)"},{"key":"16_CR10","unstructured":"D.\u00a0Erwin, D.\u00a0Snelling: UNICORE: A Grid computing environment. In: EuroPar\u20192001, Lecture Notes in Computer Science, Vol. 2150, ed. by R.\u00a0Sakellariou, J.\u00a0Keane, J.\u00a0Gurd, L.\u00a0Freeman (Springer, 2001) pp. 825\u2013838"},{"key":"16_CR11","unstructured":"I.\u00a0Foster, C.\u00a0Kesselman, G.\u00a0Tsudik, S.\u00a0Tuecke: A security architecture for computational grids, Proc. 5th ACM Conference on Computer and Communications Security Conference (1998) pp. 83\u201392"},{"issue":"3","key":"16_CR12","doi-asserted-by":"publisher","first-page":"644","DOI":"10.1109\/JPROC.2004.842776","volume":"93","author":"M. Humphrey","year":"2005","unstructured":"M.\u00a0Humphrey, M.\u00a0Thompson, K.\u00a0Jackson: Security for grids, Proc. IEEE 93(3), 644\u2013652 (2005)","journal-title":"Proc. IEEE"},{"key":"16_CR13","unstructured":"N.\u00a0Nagaratnam, P.\u00a0Janson, J.\u00a0Dayka, A.\u00a0Nadalin, F.\u00a0Siebenlist, V.\u00a0Welch, I.\u00a0Foster, S.\u00a0Tuecke: Security architecture for open grid services, Global Grid Forum Recommendation (2003)"},{"key":"16_CR14","unstructured":"V. Welch, F. Siebenlist, D. Chadwick, S. Meder, L. Pearlman: Use of SAML for OGSA authorization (2004), https:\/\/forge.gridforum.org\/projects\/ogsa-authz"},{"key":"16_CR15","unstructured":"IBM: Web service trust language (WS-Trust), http:\/\/specs.xmlsoap.org\/ws\/2005\/02\/trust\/WS-Trust.pdf"},{"key":"16_CR16","unstructured":"I.\u00a0Foster, C.\u00a0Kesselman, L.\u00a0Pearlman, S.\u00a0Tuecke, V.\u00a0Welch: A community authorization service for group collaboration, Proceedings of the 3rd IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY\u201902) (2002) pp. 50\u201359"},{"key":"16_CR17","unstructured":"L. Pearlman, C. Kesselman, V. Welch, I.\u00a0Foster, S.\u00a0Tuecke: The community authorization service: Status and future. Proceedings of Computing in High Energy and Nuclear Physics (CHEP03): ECONF C0303241, TUBT003 (2003)"},{"key":"16_CR18","doi-asserted-by":"crossref","unstructured":"D.\u00a0Chadwick, A.\u00a0Otenko: The PERMIS x.509 role based privilege management infrastructure, SACMAT \u201902: Proc. 7th ACM symposium on Access control models and technologies (ACM Press, New York 2002) pp. 135\u2013140","DOI":"10.1145\/507729.507732"},{"issue":"11","key":"16_CR19","doi-asserted-by":"publisher","first-page":"1341","DOI":"10.1002\/cpe.1313","volume":"20","author":"D.W. Chadwick","year":"2008","unstructured":"D.W.\u00a0Chadwick, G.\u00a0Zhao, S.\u00a0Otenko, R.\u00a0Laborde, L.\u00a0Su, T.A.\u00a0Nguyen: PERMIS: a modular authorization infrastructure, Concurr. Comput. Pract. Exp. 20(11), 1341\u20131357 (2008), Online, ISSN: 1532-0634","journal-title":"Concurr. Comput. Pract. Exp."},{"key":"16_CR20","unstructured":"A.J.\u00a0Stell, R.O.\u00a0Sinnott, J.P.\u00a0Watt: Comparison of advanced authorisation infrastructures for grid computing, Proc. High Performance Computing System and Applications 2005, HPCS (2005) pp. 195\u2013201"},{"key":"16_CR21","unstructured":"Permis: http:\/\/sec.cs.kent.ac.uk\/permis\/index.shtml"},{"key":"16_CR22","unstructured":"Akenti: http:\/\/dsd.lbl.gov\/security\/Akenti\/"},{"key":"16_CR23","unstructured":"M.\u00a0Thompson, A.\u00a0Essiari, K.\u00a0Keahey, V.\u00a0Welch, S.\u00a0Lang, B.\u00a0Liu: Fine-grained authorization for job and resource management using akenti and the globus toolkit, Proc. Computing in High Energy and Nuclear Physics (CHEP03) (2003)"},{"issue":"4","key":"16_CR24","doi-asserted-by":"publisher","first-page":"566","DOI":"10.1145\/950191.950196","volume":"6","author":"M. Thompson","year":"2003","unstructured":"M.\u00a0Thompson, A.\u00a0Essiari, S.\u00a0Mudumbai: Certificate-based authorization policy in a\u00a0PKI environment, ACM Trans. Inf. Syst. Secur. 6(4), 566\u2013588 (2003)","journal-title":"ACM Trans. Inf. Syst. Secur."},{"key":"16_CR25","unstructured":"Shibboleth project: http:\/\/shibboleth.internet2.edu\/"},{"key":"16_CR26","unstructured":"V.\u00a0Welch, T.\u00a0Barton, K.\u00a0Keahey: Attributes, anonymity, and access: Shibboleth and globus integration to facilitate grid collaboration, Proc. 4th Annual PKI R&D Workshop Multiple Paths to Trust (2005)"},{"key":"16_CR27","unstructured":"Gridshib project: http:\/\/grid.ncsa.uiuc.edu\/GridShib"},{"key":"16_CR28","doi-asserted-by":"crossref","unstructured":"D. Chadwick, A. Novikov, A. Otenko: Gridshib and permis integration, http:\/\/www.terena.org\/events\/tnc2006\/programme\/presentations\/show.php?p res_id=200","DOI":"10.1108\/10650740610704153"},{"key":"16_CR29","unstructured":"Datagrid security design: Deliverable 7.6 DataGrid Project (2003)"},{"key":"16_CR30","doi-asserted-by":"crossref","unstructured":"R.\u00a0Alfieri, R.\u00a0Cecchini, V.\u00a0Ciaschini, L.\u00a0dell Agnello, A.\u00a0Frohner, A.\u00a0Gianoli, K.\u00a0Lorentey, F.\u00a0Spataro: VOMS: An authorisation system for virtual organizations, Proc. 1st European Across Grid Conference (2003)","DOI":"10.1007\/978-3-540-24689-3_5"},{"key":"16_CR31","unstructured":"R. Lepro: Cardea: Dynamic access control in distributed systems, Tech. Rep. NAS Technical Report NAS-03-020, NASA Advanced Supercomputing (NAS) Division (2003)"},{"key":"16_CR32","unstructured":"M.\u00a0Lorch, D.B.\u00a0Adams, D.\u00a0Kafura, M.S.R.\u00a0Koneni, A.\u00a0Rathi, S.\u00a0Shah: The prima system for privilege management, authorization and enforcement in grid environments, GRID \u201903: Proc. 4th Int. Workshop on Grid Computing (IEEE Computer Society, Washington 2003) pp. 109\u2013"},{"key":"16_CR33","unstructured":"R.\u00a0Sandhu, J.\u00a0Park: Usage control: A vision for next generation access control. In: Workshop on Mathematical Methods, Models and Architectures for Computer Networks Security MMM03, LNCS, Vol. 2776, ed. by V.\u00a0Gorodetsky, L.\u00a0Popyack, V.\u00a0Skormin (Springer, 2003) pp. 17\u201331"},{"issue":"1","key":"16_CR34","doi-asserted-by":"publisher","first-page":"128","DOI":"10.1145\/984334.984339","volume":"7","author":"R. Sandhu","year":"2004","unstructured":"R.\u00a0Sandhu, J.\u00a0Park: The UCON_ABC usage control model, ACM Trans. Inf. Syst. Secur. 7(1), 128\u2013174 (2004)","journal-title":"ACM Trans. Inf. Syst. Secur."},{"key":"16_CR35","unstructured":"D. Bell, L. LaPadula: Secure computer systems: MITRE Report, MTR 2547, v2 (1973)"},{"issue":"2","key":"16_CR36","doi-asserted-by":"crossref","first-page":"38","DOI":"10.1109\/2.485845","volume":"9","author":"R. Sandhu","year":"1996","unstructured":"R.\u00a0Sandhu, E.\u00a0Coyne, H.\u00a0Feinstein, C.\u00a0Youman: Role-based access control models, IEEE Comput. 9(2), 38\u201347 (1996)","journal-title":"IEEE Comput."},{"key":"16_CR37","doi-asserted-by":"crossref","unstructured":"X.\u00a0Zhang, M.\u00a0Nakae, M.\u00a0Covington, R.\u00a0Sandhu: A\u00a0usage-based authorization framework for collaborative computing systems, Proc. 11th ACM Symposium on Access Control Models and Technologies (SACMAT\u201906) (ACM Press, 2006)","DOI":"10.1145\/1133058.1133084"},{"issue":"1","key":"16_CR38","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1330295.1330298","volume":"11","author":"X. Zhang","year":"2008","unstructured":"X.\u00a0Zhang, M.\u00a0Nakae, M.J.\u00a0Covington, R.\u00a0Sandhu: Toward a usage-based security framework for collaborative computing systems, ACM Trans. Inf. Syst. Secur. 11(1), 1\u201336 (2008)","journal-title":"ACM Trans. Inf. Syst. Secur."},{"key":"16_CR39","doi-asserted-by":"crossref","unstructured":"F.\u00a0Martinelli, P.\u00a0Mori, A.\u00a0Vaccarelli: Towards continuous usage control on grid computational services, Proc. of Int. Conference on Autonomic and Autonomous Systems and International Conference on Networking and Services 2005 (IEEE Computer Society, 2005) p. 82","DOI":"10.1109\/ICAS-ICNS.2005.93"},{"key":"16_CR40","unstructured":"H.\u00a0Koshutanski, F.\u00a0Martinelli, P.\u00a0Mori, A.\u00a0Vaccarelli: Fine-grained and history-based access control with trust management for autonomic grid services, Proc. of Int. Conference on Autonomic and Autonomous Systems (2006)"},{"key":"16_CR41","unstructured":"GridTrust project: http:\/\/www.gridtrust.eu\/"},{"key":"16_CR42","volume-title":"Fine grained access control for computational services","author":"F. Martinelli","year":"2006","unstructured":"F. Martinelli, P. Mori, A. Vaccarelli: Fine grained access control for computational services. Tech. Rep. TR-06\/2006, Istituto di Informatica e Telematica, Consiglio Nazionale delle Ricerche, Pisa (2006)"},{"key":"16_CR43","doi-asserted-by":"crossref","unstructured":"F.\u00a0Martinelli, P.\u00a0Mori: A model for usage control in grid systems, Proc. 1st Int. Workshop on Security, Trust and Privacy in Grid Systems (GRID-STP07) (2007)","DOI":"10.1109\/SECCOM.2007.4550377"},{"issue":"4","key":"16_CR44","doi-asserted-by":"publisher","first-page":"351","DOI":"10.1145\/1108906.1108908","volume":"8","author":"X. Zhang","year":"2005","unstructured":"X.\u00a0Zhang, F.\u00a0Parisi-Presicce, R.\u00a0Sandhu, J.\u00a0Park: Formal model and policy specification of usage control, ACM Trans. Inf. Syst. Secur. 8(4), 351\u2013387 (2005)","journal-title":"ACM Trans. Inf. Syst. Secur."},{"key":"16_CR45","unstructured":"X.\u00a0Zhang, M.\u00a0Nakae, M.\u00a0Covington, J.R.\u00a0Sandhu: A usage-based authorization framework for collaborative computing systems, SACMAT (2006) pp. 180\u2013189"}],"container-title":["Handbook of Information and Communication Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-04117-4_16.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,23]],"date-time":"2020-11-23T21:39:22Z","timestamp":1606167562000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-04117-4_16"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642041167","9783642041174"],"references-count":45,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-04117-4_16","relation":{},"subject":[],"published":{"date-parts":[[2010]]}}}