{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T15:41:38Z","timestamp":1725550898227},"publisher-location":"Berlin, Heidelberg","reference-count":5,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642122132"},{"type":"electronic","value":"9783642122149"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-12214-9_22","type":"book-chapter","created":{"date-parts":[[2010,3,31]],"date-time":"2010-03-31T19:11:44Z","timestamp":1270062704000},"page":"125-129","source":"Crossref","is-referenced-by-count":2,"title":["Integrating an Efficient Authorization Protocol with Trigon-Based Authentication Mechanism for Improving Grid Security"],"prefix":"10.1007","author":[{"given":"V.","family":"Ruckmani","sequence":"first","affiliation":[]},{"given":"G. Sudha","family":"Sadasivam","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"22_CR1","doi-asserted-by":"crossref","unstructured":"Foster, I., Kesselman, C., Tsudik, G., Tuecke, S.: A Security Architecture for Computational Grids. In: Proceedings of the ACM Conference on Computers and Security, pp. 83\u201391 (1998)","DOI":"10.1145\/288090.288111"},{"issue":"4","key":"22_CR2","doi-asserted-by":"publisher","first-page":"291","DOI":"10.1007\/s10207-009-0083-4","volume":"8","author":"H. Koshutanski","year":"2009","unstructured":"Koshutanski, H., Lazouski, A., Martinelli, F., Mori, P.: Enhancing grid security by fine-grained behavioral control and negotiation-based authorization. International Journal of Information Security\u00a08(4), 291\u2013314 (2009)","journal-title":"International Journal of Information Security"},{"issue":"4","key":"22_CR3","doi-asserted-by":"publisher","first-page":"860","DOI":"10.1016\/S1004-4132(08)60164-4","volume":"19","author":"L. Hongweia","year":"2008","unstructured":"Hongweia, L., Shixina, S., Haomiaoa, Y.: Identity-based authentication protocol for grid. Journal of Systems Engineering and Electronics\u00a019(4), 860\u2013865 (2008)","journal-title":"Journal of Systems Engineering and Electronics"},{"issue":"1","key":"22_CR4","first-page":"1","volume":"6","author":"G. Geethakumari","year":"2009","unstructured":"Geethakumari, G., Negi, A., Sastry, V.N.: A Cross - Domain Role Mapping and Authorization Framework for RBAC in Grid Systems. International Journal of Computer Science and Applications\u00a06(1), 1\u201312 (2009)","journal-title":"International Journal of Computer Science and Applications"},{"key":"22_CR5","unstructured":"Ruckmani, V., Sudha Sadasivam, G.: A novel trigon-based authentication protocol for enhancing security in grid environment. International Journal of Computer Science and Information Security\u00a06(3), 064\u2013072 (2009)"}],"container-title":["Communications in Computer and Information Science","Information Processing and Management"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-12214-9_22.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,30]],"date-time":"2021-04-30T12:05:57Z","timestamp":1619784357000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-12214-9_22"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642122132","9783642122149"],"references-count":5,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-12214-9_22","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2010]]}}}