{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T09:14:47Z","timestamp":1742980487728,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":26,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642117329"},{"type":"electronic","value":"9783642117336"}],"license":[{"start":{"date-parts":[[2010,1,1]],"date-time":"2010-01-01T00:00:00Z","timestamp":1262304000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-11733-6_3","type":"book-chapter","created":{"date-parts":[[2010,2,13]],"date-time":"2010-02-13T09:09:04Z","timestamp":1266052144000},"page":"19-26","source":"Crossref","is-referenced-by-count":8,"title":["On the Definition of Access Control Requirements for Grid and Cloud Computing Systems"],"prefix":"10.1007","author":[{"given":"Antonios","family":"Gouglidis","sequence":"first","affiliation":[]},{"given":"Ioannis","family":"Mavridis","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"3_CR1","doi-asserted-by":"crossref","unstructured":"Foster, I., Kesselman, C., Tuecke, S.: The anatomy of the grid - enabling scalable virtual organizations. International Journal of Supercomputer Applications 15 (2001)","DOI":"10.1177\/109434200101500302"},{"key":"3_CR2","doi-asserted-by":"crossref","unstructured":"Foster, I., Zhao, Y., Raicu, I., Lu, S.: Cloud computing and grid computing 360-degree compared. In: Grid Computing Environments Workshop, GCE 2008, pp. 1\u201310 (2008)","DOI":"10.1109\/GCE.2008.4738445"},{"issue":"3","key":"3_CR3","doi-asserted-by":"publisher","first-page":"224","DOI":"10.1145\/501978.501980","volume":"4","author":"D.F. Ferraiolo","year":"2001","unstructured":"Ferraiolo, D.F., Sandhu, R., Gavrila, S., Kuhn, D.R., Chandramouli, R.: Proposed NIST standard for role-based access control. ACM Trans. Inf. Syst. Secur.\u00a04(3), 224\u2013274 (2001)","journal-title":"ACM Trans. Inf. Syst. Secur."},{"key":"3_CR4","doi-asserted-by":"crossref","unstructured":"Sandhu, R., Park, J.: Usage control: A vision for next generation access control. Computer Network Security, 17\u201331 (2003)","DOI":"10.1007\/978-3-540-45215-7_2"},{"issue":"1","key":"3_CR5","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1330295.1330298","volume":"11","author":"X. Zhang","year":"2008","unstructured":"Zhang, X., Nakae, M., Covington, M.J., Sandhu, R.: Toward a usage-based security framework for collaborative computing systems. ACM Trans. Inf. Syst. Secur.\u00a011(1), 1\u201336 (2008)","journal-title":"ACM Trans. Inf. Syst. Secur."},{"key":"3_CR6","first-page":"561","volume-title":"Proceedings of the IEEE ICWS","author":"E. Yuan","year":"2005","unstructured":"Yuan, E., Tong, J.: Attributed Based Access Control (ABAC) for Web Services. In: Proceedings of the IEEE ICWS, pp. 561\u2013569. IEEE Computer Society, Los Alamitos (2005)"},{"key":"3_CR7","doi-asserted-by":"crossref","unstructured":"Busch, S., Muschall, B., Pernul, G., Priebe, T.: Authrule: A generic rule-based authorization module, DBSec. Springer, Heidelberg (2006)","DOI":"10.1007\/11805588_19"},{"issue":"2","key":"3_CR8","doi-asserted-by":"publisher","first-page":"38","DOI":"10.1109\/2.485845","volume":"29","author":"R.S. Sandhu","year":"1996","unstructured":"Sandhu, R.S., Coyne, E.J., Feinstein, H.L., Youman, C.E.: Role-based access control models. IEEE Computer\u00a029(2), 38\u201347 (1996)","journal-title":"IEEE Computer"},{"key":"3_CR9","unstructured":"Sandhu, R., Bhamidipati, V.: The ASCAA principles for next-generation role-based access control. In: Availability, Reliability and Security, ARES 2008 (2008)"},{"issue":"2","key":"3_CR10","doi-asserted-by":"publisher","first-page":"62","DOI":"10.1109\/MIC.2003.1189190","volume":"7","author":"D.W. Chadwick","year":"2003","unstructured":"Chadwick, D.W., Otenko, A., Ball, E.: Role-based access control with X.509 attribute certificates. IEEE Internet Computing\u00a07(2), 62\u201369 (2003)","journal-title":"IEEE Internet Computing"},{"key":"3_CR11","unstructured":"GridTrust: Gridtrust (2009), \n                      http:\/\/www.gridtrust.eu\/gridtrust"},{"key":"3_CR12","first-page":"465","volume-title":"ARES 2006: Proceedings of the First International Conference on Availability, Reliability and Security","author":"T. Priebe","year":"2006","unstructured":"Priebe, T., Dobmeier, W., Kamprath, N.: Supporting attribute-based access control with ontologies. In: ARES 2006: Proceedings of the First International Conference on Availability, Reliability and Security, Washington, DC, USA, pp. 465\u2013472. IEEE Computer Society, Los Alamitos (2006)"},{"key":"3_CR13","unstructured":"Alexander Kipp, S.W., Lutz Schubert, R.P., Horst Schwichtenberg, C.T., Karanastasis, E.: A new approach for classifying grids. Technical report, BEinGRID (2008)"},{"key":"3_CR14","unstructured":"Gridipedia: Types of grid (2009), \n                      http:\/\/www.gridipedia.eu\/types-of-grids.html"},{"issue":"3","key":"3_CR15","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/MDSO.2008.8","volume":"9","author":"H. Kurdi","year":"2008","unstructured":"Kurdi, H., Li, M., Al-Raweshidy, H.: A classification of emerging and traditional grid systems. IEEE Distributed Systems Online\u00a09(3), 1 (2008)","journal-title":"IEEE Distributed Systems Online"},{"key":"3_CR16","unstructured":"SETI@home (2009), \n                      http:\/\/setiathome.ssl.berkeley.edu\/"},{"key":"3_CR17","unstructured":"EGEE: Enabling grids for e-science, EGEE (2009), \n                      http:\/\/eu-egee.org\/"},{"key":"3_CR18","unstructured":"BOINC: Boinc all projects statistics - distributed computing statistics (2009), \n                      http:\/\/www.allprojectstats.com\/"},{"key":"3_CR19","unstructured":"Gridmap: Gridmap visualizing the \u201cstate\u201d of the grid (2009), \n                      http:\/\/gridmap.cern.ch\/gm"},{"key":"3_CR20","unstructured":"Green, D.: Grid technology. The future of the internet? The future of it (2002), \n                      https:\/\/ludit.kuleuven.be\/nieuws\/pdf\/grid.pdf"},{"issue":"2","key":"3_CR21","doi-asserted-by":"publisher","first-page":"135","DOI":"10.1002\/spe.432","volume":"32","author":"K. Krauter","year":"2002","unstructured":"Krauter, K., Buyya, R., Maheswaran, M.: A taxonomy and survey of grid resource management systems for distributed computing. Softw. Pract. Exper.\u00a032(2), 135\u2013164 (2002)","journal-title":"Softw. Pract. Exper."},{"key":"3_CR22","unstructured":"Broadfoot, P.J., Martin, A.P.: A critical survey of grid security requirements and technologies. Technical Report RR-03-15, Oxford University Computing Laboratory (2003)"},{"key":"3_CR23","doi-asserted-by":"crossref","unstructured":"Kephart, J.: Research challenges of autonomic computing. In: Software Engineering, ICSE 2005. Proceedings, pp. 15\u201322 (2005)","DOI":"10.1145\/1062455.1062464"},{"key":"3_CR24","volume-title":"Grid Computing Security, Managing Trust in the Grid","author":"A. Chakrabarti","year":"2007","unstructured":"Chakrabarti, A.: Grid Computing Security, Managing Trust in the Grid. Springer, Heidelberg (2007)"},{"key":"3_CR25","series-title":"Lecture Notes in Computer Science","volume-title":"Grid Economics and Business Models","year":"2007","unstructured":"Veit, D.J., Altmann, J. (eds.): GECON 2007. LNCS, vol.\u00a04685. Springer, Heidelberg (2007)"},{"issue":"1","key":"3_CR26","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1145\/1057977.1057979","volume":"37","author":"W. Tolone","year":"2005","unstructured":"Tolone, W., Ahn, G.J., Pai, T., Hong, S.P.: Access control in collaborative systems. ACM Comput. Surv.\u00a037(1), 29\u201341 (2005)","journal-title":"ACM Comput. Surv."}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Networks for Grid Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-11733-6_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,5,8]],"date-time":"2024-05-08T05:36:33Z","timestamp":1715146593000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-642-11733-6_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642117329","9783642117336"],"references-count":26,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-11733-6_3","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2010]]}}}