{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T23:13:06Z","timestamp":1725577986636},"publisher-location":"Berlin, Heidelberg","reference-count":37,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642194221"},{"type":"electronic","value":"9783642194238"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-19423-8_16","type":"book-chapter","created":{"date-parts":[[2011,2,10]],"date-time":"2011-02-10T06:18:31Z","timestamp":1297318711000},"page":"149-159","source":"Crossref","is-referenced-by-count":1,"title":["SASM- An Approach towards Self-protection in Grid Computing"],"prefix":"10.1007","author":[{"given":"Inderpreet","family":"Chopra","sequence":"first","affiliation":[]},{"given":"Maninder","family":"Singh","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"16_CR1","volume-title":"ISIEA","author":"Y.A. Mohamed","year":"2009","unstructured":"Mohamed, Y.A., Abdulla, A.B.: Immune Inspired Framework for Securing Hybrid MANET. In: ISIEA. IEEE, Los Alamitos (2009)"},{"key":"16_CR2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-49823-0_13","volume-title":"Self-protection for Distributed Component-Based Applications","author":"B. Claudel","year":"2006","unstructured":"Claudel, B., De Palma, N., Lachaize, R., Hagimont, D.: Self-protection for Distributed Component-Based Applications. Springer, Heidelberg (2006)"},{"key":"16_CR3","doi-asserted-by":"publisher","DOI":"10.1109\/EASE.2007.25","volume-title":"The need for self-managed access nodes in grid environments","author":"R. Nou","year":"2007","unstructured":"Nou, R., Julia, F., Torres, J.: The need for self-managed access nodes in grid environments. IEEE, EASe (2007)"},{"key":"16_CR4","doi-asserted-by":"crossref","unstructured":"Romberg, M.: The unicore grid infrastructure (2002), http:\/\/www.unicore.org","DOI":"10.1155\/2002\/483253"},{"key":"16_CR5","doi-asserted-by":"crossref","unstructured":"Sotomayor, B., Childers, L.: Globus Toolkit 4: Programming Java Services (2005)","DOI":"10.1016\/B978-012369404-1\/50006-4"},{"key":"16_CR6","unstructured":"Guo, H., Gao, J., Zhu, P., Zhang, F.: A Self-Organized Model of Agent-Enabling Autonomic Computing for Grid Environment. In: 6th Word Congress on Inteligent Control (2006)"},{"key":"16_CR7","volume-title":"Evolution, Direction","author":"A. Ganek","year":"2004","unstructured":"Ganek, A.: Overview of Autonomic Computing: Origins. In: Evolution, Direction. CRC Press, Boca Raton (2004)"},{"key":"16_CR8","doi-asserted-by":"crossref","unstructured":"Kephart, J.O., Chess, D.M.: The Vision of Autonomic Computing. IEEE Computer (2003)","DOI":"10.1109\/MC.2003.1160055"},{"key":"16_CR9","doi-asserted-by":"crossref","unstructured":"Humphrey, M., Thompson, M.: Security Implications of Typical Grid Computing Usage Scenarios. Cluster Computing\u00a05(3) (2002)","DOI":"10.1023\/A:1015621120332"},{"key":"16_CR10","unstructured":"Li, W.: Using Genetic Algorithm for Network Intrusion Detection. In: Proceedings of the United States Department of Energy Cyber Security Group (2004)"},{"key":"16_CR11","unstructured":"Hartmut, P.: Genetic and Evolutionary Algorithms: Principles, Methods, and Algorithms. In: Genetic and Evolutionary Algorithm Toolbox (2003)"},{"key":"16_CR12","unstructured":"Stopping insider attacks: how organizations can protect their sensitive information (September 2006), ibm.com\/services"},{"key":"16_CR13","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-49823-0_13","volume-title":"Self-protection for Distributed Component-Based Applications","author":"B. Claudel","year":"2006","unstructured":"Claudel, B., De Palma, N., Lachaize, R., Hagimont, D.: Self-protection for Distributed Component-Based Applications. Springer, Heidelberg (2006)"},{"key":"16_CR14","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1145\/1741906.1741912","volume-title":"ICWET","author":"I. Chopra","year":"2010","unstructured":"Chopra, I., Singh, M.: Agent based Self-Healing System for Grid Computing. In: ICWET, pp. 31\u201335. ACM, New York (2010)"},{"key":"16_CR15","doi-asserted-by":"crossref","unstructured":"Foster, I., Kesselman, C., Nick, J.M., Tuecke, S.: The physiology of the Grid. Global Grid Forum (2002)","DOI":"10.1002\/0470867167.ch8"},{"key":"16_CR16","doi-asserted-by":"crossref","unstructured":"Hariri, S., Qu, G., et al.: Quality-of-Protection (QoP)-An Online Monitoring and Self-Protection Mechanism. IEEE Journal on Selected Areas in Communications\u00a023(10) (2005)","DOI":"10.1109\/JSAC.2005.854122"},{"key":"16_CR17","unstructured":"Horn, P.: Autonomic computing: IBM\u2019s perspective on the state of information technology (2001), http:\/\/www.research.ibm.com\/autonomic\/"},{"key":"16_CR18","doi-asserted-by":"crossref","unstructured":"Humphrey, M., Thompson, M.: Security Implications of Typical Grid Computing Usage Scenarios. Cluster Computing 5(3) (July 2002)","DOI":"10.1023\/A:1015621120332"},{"key":"16_CR19","doi-asserted-by":"publisher","DOI":"10.1002\/0470867167.ch6","volume-title":"The anatomy of the Grid","author":"I. Foster","year":"2003","unstructured":"Foster, I., Kesselman, C., Tuecke, S.: The anatomy of the Grid. John Wiley and Sons, Chichester (2003)"},{"key":"16_CR20","unstructured":"Wang, J., Liu, X., Chien, A.: Empirical Study of Tolerating Denial-of-Service Attacks with a Proxy Network. In: Proceedings of the 14th Conference on USENIX Security Symposium (2005)"},{"key":"16_CR21","unstructured":"Ferreira, L., Berstis, V., et al.: Introduction to Grid Computing with Globus, IBM, http:\/\/www.liv.ac.uk\/escience\/beowulf\/IBM_globus.pdf"},{"key":"16_CR22","unstructured":"Montero, R.S.: The Grid Way Meta-Scheduler. In: Open Source Grid and Cluster, Oakland, CA (May 2008)"},{"key":"16_CR23","volume-title":"Autonomic Computing: An Overview","author":"M. Parashar","year":"2005","unstructured":"Parashar, M., Hariri, S.: Autonomic Computing: An Overview. Springer, Heidelberg (2005)"},{"key":"16_CR24","unstructured":"Tesauro, G., Chess, D.M., Walsh, W.E., Das, R., et al.: A Multi-Agent Systems Approach to Autonomic Computing. In: AAMAS 2004. ACM, New York (2004)"},{"key":"16_CR25","doi-asserted-by":"crossref","unstructured":"Kreibich, C., Crowcroft, J.: Honeycomb - Creating Intrusion Detection Signatures Using Honeypots. ACM SIGCOMM (January 2004)","DOI":"10.1145\/972374.972384"},{"key":"16_CR26","doi-asserted-by":"publisher","first-page":"105","DOI":"10.1007\/978-3-540-44493-0_6","volume-title":"Grid Computing Security","author":"A. Chakrabarti","year":"2007","unstructured":"Chakrabarti, A.: Grid Computing Security, ch. 6, p. 105. Springer, Heidelberg (2007)"},{"key":"16_CR27","unstructured":"Snort, https:\/\/edge.arubanetworks.com\/article\/leveraging-centralized-encryption-snort-part-1"},{"key":"16_CR28","unstructured":"Stephen, M., Sukumaran Nair, V.S., Abraham, J.: Distributed Computing Grids- Safety and Security. In: Security in Distributed, Grid, Mobile, and Pervasive Computing, ch. 14"},{"key":"16_CR29","doi-asserted-by":"publisher","first-page":"159","DOI":"10.1007\/978-3-540-44493-0_8","volume-title":"Grid Computing Security","author":"A. Chakrabarti","year":"2007","unstructured":"Chakrabarti, A.: Grid Computing Security, ch. 8, p. 159. Springer, Heidelberg (2007)"},{"key":"16_CR30","first-page":"275","volume-title":"Advances in Grid Computing","author":"S. Kenny","year":"2005","unstructured":"Kenny, S., Coghlan, B.: Towards a Grid-Wide Intrusion Detection System. In: Advances in Grid Computing, pp. 275\u2013284. Springer, Heidelberg (2005)"},{"key":"16_CR31","doi-asserted-by":"crossref","unstructured":"Schulter, A., Navarro, F., Koch, F., Westphall, C.: Towards Gridbased Intrusion Detection. In: 10th IEEE\/IFIP, Network Operations and Management Symposium, NOMS 2006, pp. 1\u20134 (2006)","DOI":"10.1109\/NOMS.2006.1687643"},{"key":"16_CR32","unstructured":"Witold Jarmo lkowicz, M.: A Grid-aware Intrusion Detection System, Technical University of Denmark, IMM-THESIS-2007-109"},{"key":"16_CR33","doi-asserted-by":"crossref","unstructured":"Leu, F.-Y., Li, M.-C., Lin, J.-C.: Intrusion Detection based on Grid. In: ICCGI 2006 (2006)","DOI":"10.1109\/ICCGI.2006.41"},{"issue":"6","key":"16_CR34","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1109\/2.294849","volume":"27","author":"M. Srinivas","year":"1994","unstructured":"Srinivas, M., Patnaik, L.M.: Genetic algorithms: A survey. IEEE Computer\u00a027(6), 17\u201326 (1994)","journal-title":"IEEE Computer"},{"key":"16_CR35","unstructured":"Li, W.: Using Genetic Algorithm for Network Intrusion Detection. In: Proceedings of the United States Department of Energy Cyber Security Group (2004)"},{"key":"16_CR36","unstructured":"Brennan, M.P.: Using Snort For a Distributed Intrusion Detection System. SANS Institute (2002)"},{"key":"16_CR37","unstructured":"Sallay, H., AlShalfan, K.A., Fredj, O.B.: A scalable distributed IDS Architecture for High speed Networks. IJCSNS\u00a09(8) (August 2009)"}],"container-title":["Communications in Computer and Information Science","Information Intelligence, Systems, Technology and Management"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-19423-8_16","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,4,4]],"date-time":"2024-04-04T00:37:18Z","timestamp":1712191038000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-19423-8_16"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642194221","9783642194238"],"references-count":37,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-19423-8_16","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2011]]}}}