{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,20]],"date-time":"2025-02-20T19:10:03Z","timestamp":1740078603913,"version":"3.37.3"},"publisher-location":"Berlin, Heidelberg","reference-count":13,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642105487"},{"type":"electronic","value":"9783642105494"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-10549-4_18","type":"book-chapter","created":{"date-parts":[[2010,5,8]],"date-time":"2010-05-08T15:58:15Z","timestamp":1273334295000},"page":"148-155","source":"Crossref","is-referenced-by-count":1,"title":["Authorization Framework for Resource Sharing in Grid Environments"],"prefix":"10.1007","author":[{"given":"Jing","family":"Jin","sequence":"first","affiliation":[]},{"given":"Gail-Joon","family":"Ahn","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"18_CR1","unstructured":"Globus: GT 4.0: Data Replication Service (DRS), http:\/\/www.globus.org\/toolkit\/docs\/4.0\/techpreview\/datarep\/"},{"issue":"2","key":"18_CR2","doi-asserted-by":"crossref","first-page":"169","DOI":"10.1007\/s10723-008-9112-1","volume":"7","author":"Bo Lang","year":"2008","unstructured":"Lang, B., Foster, I., Siebenlist, F., Ananthakrishnan, R., Freeman, T.: A Flexible Attribute Based Access Control Method for Grid Computing. Journal of Grid Computing\u00a07(2) (2008)","journal-title":"Journal of Grid Computing"},{"key":"18_CR3","doi-asserted-by":"crossref","unstructured":"Cantor, S.: Shibboleth Architecture: Protocols and Profiles (2005), http:\/\/shibboleth.internet2.edu\/docs\/internet2-mace-shibboleth-arch-protocols-200509.pdf","DOI":"10.26869\/TI.66.1"},{"key":"18_CR4","doi-asserted-by":"crossref","unstructured":"Alfieri, R., Cecchini, R., Ciaschini, V., dell\u2019Agnello, L., Frohner, A., Gianoli, A., Lorentey, L., Spataro, F.: VOMS, an authorization system for virtual organizations. In: Proc. of 1st EuropeanAcross Grids Conferences (2003)","DOI":"10.1007\/978-3-540-24689-3_5"},{"key":"18_CR5","doi-asserted-by":"crossref","unstructured":"Groeper, R., Grimm, C., Piger, S., Wiebelitz, J.: An Architecture for Authorization in Grids using Shibboleth and VOMS. In: Proc. of 33rd EUROMICRO Conference on Software Engineering and Advanced Applications, pp. 367\u2013374 (2007)","DOI":"10.1109\/EUROMICRO.2007.15"},{"key":"18_CR6","unstructured":"Thompson, M., Johnston, W., Mudumbai, S., Hoo, G., Jackson, K., Essiari, A.: Certificate-based Access Control for Widely Distributed Resources. In: Proc. of 8th Usenix Security Symposium (1999)"},{"key":"18_CR7","doi-asserted-by":"crossref","unstructured":"Chadwick, D.W., Otenko, A.: The PERMIS X.509 role based privilege management infrastructure. In: Proc.of the 7th ACM symposium on Access control models and technologies (SACMAT), pp. 135\u2013140 (2002)","DOI":"10.1145\/507711.507732"},{"key":"18_CR8","doi-asserted-by":"crossref","unstructured":"Jin, J., Ahn, G.J.: Role-based Access Management for Ad-hoc Collaborative Sharing. In: Proc. of 11th Symposium on Access Control Models and Technologies (SACMAT), pp. 200\u2013209 (2006)","DOI":"10.1145\/1133058.1133086"},{"key":"18_CR9","doi-asserted-by":"crossref","unstructured":"Jin, J., Ahn, G.J., Shehab, M., Hu, H.: Towards Trust-aware Access Management for Ad-hoc Collaborations. In: Proc. of 3rd IEEE International Conference on Collaborative Computing, pp. 41\u201348 (2007)","DOI":"10.1109\/COLCOM.2007.4553807"},{"key":"18_CR10","unstructured":"OASIS: XACML 2.0 core: extensible access control markup language (XACML) version 2.0 (2005), http:\/\/docs.oasis-open.org\/xacml\/2.0\/access_control-xacml-2.0-core-spec-ospdf"},{"key":"18_CR11","unstructured":"Welch, V., Ananthakrishnan, R., Siebenlist, F., Chadwick, D., Meder, S., Pearlman, L.: Use of SAML for OGSI authorization (2005), https:\/\/forge.gridforum.org\/projects\/ogsa-authz\/document\/draft-ogsi-authz-saml-aug15-05.pdf\/en\/1"},{"key":"18_CR12","doi-asserted-by":"crossref","unstructured":"Tuecke, S., Welch, V., Engert, D., Pearlman, L., Thompson, M.: Internet X.509 Public Key Infrastructure (PKI) Proxy Certificate Profile (2004), http:\/\/rfc.net\/rfc3820.html","DOI":"10.17487\/rfc3820"},{"key":"18_CR13","doi-asserted-by":"crossref","unstructured":"Welch, V., Siebenlist, F., Foster, I., Bresnahan, J., Czajkowski, K., Gawor, J., Kesselman, C., Pearlman, S.M.L., Tuecke, S.: Security for Grid Services. In: Proc. of 12th IEEE International Symposium on High Performance Distributed Computing, pp. 48\u201357 (2003)","DOI":"10.1109\/HPDC.2003.1210015"}],"container-title":["Communications in Computer and Information Science","Grid and Distributed Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-10549-4_18","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,20]],"date-time":"2025-02-20T18:42:35Z","timestamp":1740076955000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-10549-4_18"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642105487","9783642105494"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-10549-4_18","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2009]]}}}