{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T03:29:46Z","timestamp":1725593386187},"publisher-location":"Berlin, Heidelberg","reference-count":13,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642223389"},{"type":"electronic","value":"9783642223396"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-22339-6_6","type":"book-chapter","created":{"date-parts":[[2011,6,27]],"date-time":"2011-06-27T19:58:48Z","timestamp":1309204728000},"page":"45-53","source":"Crossref","is-referenced-by-count":3,"title":["A Software Architecture for Introducing Trust in Java-Based Clouds"],"prefix":"10.1007","author":[{"given":"Siegfried","family":"Podesser","sequence":"first","affiliation":[]},{"given":"Ronald","family":"Toegl","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"11","key":"6_CR1","doi-asserted-by":"publisher","first-page":"1341","DOI":"10.1002\/cpe.1313","volume":"20","author":"D.W. Chadwick","year":"2008","unstructured":"Chadwick, D.W., Zhao, G., Otenko, S., Laborde, R., Su, L., Nguyen, T.A.: Permis a modular authorization infrastructure. Concurrency and Computation: Practice and Experience\u00a020(11), 1341\u20131357 (2008)","journal-title":"Concurrency and Computation: Practice and Experience"},{"key":"6_CR2","doi-asserted-by":"crossref","unstructured":"Cooper, A., Martin, A.: Towards a secure, tamper-proof grid platform. In: Cluster Computing and the Grid, CCGRID 2006 (2006)","DOI":"10.1109\/CCGRID.2006.103"},{"key":"6_CR3","doi-asserted-by":"crossref","unstructured":"Daniele Catteddu, G.H.: Cloud Computing benefits, risks and recommendations for information security. Tech. rep., ENISA (2009)","DOI":"10.1007\/978-3-642-16120-9_9"},{"issue":"3","key":"6_CR4","doi-asserted-by":"publisher","first-page":"200","DOI":"10.1177\/109434200101500302","volume":"15","author":"I. Foster","year":"2001","unstructured":"Foster, I., Kesselman, C., Tuecke, S.: The anatomy of the grid: Enabling scalable virtual organizations. Int. J. High Perform. Comput. Appl.\u00a015(3), 200\u2013222 (2001)","journal-title":"Int. J. High Perform. Comput. Appl."},{"issue":"10","key":"6_CR5","doi-asserted-by":"publisher","first-page":"118","DOI":"10.1145\/383845.383872","volume":"44","author":"V. Getov","year":"2001","unstructured":"Getov, V., von Laszewski, G., Philippsen, M., Foster, I.T.: Multiparadigm commu-nications in java for grid computing. Commun. ACM\u00a044(10), 118\u2013125 (2001)","journal-title":"Commun. ACM"},{"key":"6_CR6","volume-title":"Dynamics of a Trusted Platform: A Building Block Approach, Richard Bowles","author":"D. Grawrock","year":"2009","unstructured":"Grawrock, D.: Dynamics of a Trusted Platform: A Building Block Approach, Richard Bowles. Intel Press, Hillsboro (2009) ISBN 978-1934053171"},{"key":"6_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"372","DOI":"10.1007\/978-3-540-73547-2_39","volume-title":"Autonomic and Trusted Computing","author":"H. L\u00f6hr","year":"2007","unstructured":"L\u00f6hr, H., Ramasamy, H.V., Sadeghi, A.-R., Schulz, S., Schunter, M., St\u00fcble, C.: Enhancing grid security using trusted virtualization. In: Xiao, B., Yang, L.T., Ma, J., Muller-Schloer, C., Hua, Y. (eds.) ATC 2007. LNCS, vol.\u00a04610, pp. 372\u2013384. Springer, Heidelberg (2007)"},{"key":"6_CR8","doi-asserted-by":"crossref","unstructured":"Mao, W., Martin, A., Jin, H., Zhang, H.: Innovations for grid security from trusted computing. In: Security Protocols, pp. 132\u2013149 (2009)","DOI":"10.1007\/978-3-642-04904-0_18"},{"key":"6_CR9","unstructured":"Ivanov, N., Setrakyan, D.: GridGain (2010), http:\/\/www.gridgain.com"},{"key":"6_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"101","DOI":"10.1007\/978-3-642-00587-9_7","volume-title":"Trusted Computing","author":"M. Pirker","year":"2009","unstructured":"Pirker, M., Toegl, R., Hein, D., Danner, P.: A PrivacyCA for anonymity and trust. In: Chen, L., Mitchell, C.J., Martin, A. (eds.) Trust 2009. LNCS, vol.\u00a05471, pp. 101\u2013119. Springer, Heidelberg (2009)"},{"key":"6_CR11","series-title":"LNCS","volume-title":"INTRUST 2011","author":"R. Toegl","year":"2011","unstructured":"Toegl, R., Pirker, M., Gissing, M.: acTvSM: A dynamic virtualization platform for enforcement of application integrity. In: INTRUST 2011. LNCS. Springer, Heidelberg (in print, 2011)"},{"key":"6_CR12","volume-title":"STC","author":"R. Toegl","year":"2009","unstructured":"Toegl, R., Winkler, T., Nauman, M., Hong, T.: Towards platform-independent trusted computing. In: Xu, S., Asokan, N., Nita-Rotaru, C., Seifert, J.P. (eds.) STC, ACM, New York (2009)"},{"key":"6_CR13","unstructured":"Trusted Computing Group: TCG TPM specification version 1.2 revision 103 (2007)"}],"container-title":["Communications in Computer and Information Science","Secure and Trust Computing, Data Management and Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-22339-6_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,12]],"date-time":"2019-06-12T08:14:12Z","timestamp":1560327252000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-22339-6_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642223389","9783642223396"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-22339-6_6","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2011]]}}}