{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T23:37:02Z","timestamp":1742945822305,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":14,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642239700"},{"type":"electronic","value":"9783642239717"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-23971-7_50","type":"book-chapter","created":{"date-parts":[[2011,9,24]],"date-time":"2011-09-24T01:37:49Z","timestamp":1316828269000},"page":"397-401","source":"Crossref","is-referenced-by-count":0,"title":["Study on Grid Access Control Strategy Based on Trust and Security Grade"],"prefix":"10.1007","author":[{"given":"Yihe","family":"Liu","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"50_CR1","unstructured":"The Globus Project (EB\/OL), \n                    \n                      http:\/\/www.globus.org\/"},{"key":"50_CR2","unstructured":"Jin, N.: The grid safe authentication key technologies studies. Nanjing Posts and telecommunications University master\u2019s degree paper (2006) (in Chinese)"},{"key":"50_CR3","doi-asserted-by":"crossref","unstructured":"Oo, M.P., Naing, T.T.: Access Control System for Grid Security Infrastructure. In: 2007 IEEE\/WIC\/ACM International Conferences on Web Intelligence and Intelligent Agent Technology \u2013 Workshops, pp. 299\u2013302 (2007)","DOI":"10.1109\/WI-IATW.2007.45"},{"key":"50_CR4","unstructured":"Han, B.: Study on data management and the security problem Under the grid environment. Chinese Scientific and Technical University master\u2019s degree paper (2006) (in Chinese)"},{"key":"50_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"258","DOI":"10.1007\/11533962_23","volume-title":"Advanced Distributed Systems","author":"X. Huang","year":"2005","unstructured":"Huang, X., Chen, L., Huang, L., Li, M.: An Identity-Based Model for Grid Security Infrastructure. In: Ramos, F.F., Larios Rosillo, V., Unger, H. (eds.) ISSADS 2005. LNCS, vol.\u00a03563, pp. 258\u2013266. Springer, Heidelberg (2005)"},{"key":"50_CR6","unstructured":"Wang, F.: Study Under the grid environment\u2019s trust mechanism. Nanjing Posts and telecommunications University master\u2019s degree paper, 52\u201353 (2009) (in Chinese)"},{"issue":"2","key":"50_CR7","doi-asserted-by":"publisher","first-page":"618","DOI":"10.1016\/j.dss.2005.05.019","volume":"43","author":"A. J-sang","year":"2007","unstructured":"J-sang, A., Ismail, R., Boyd, C.: A survey of trust and reputation systems for online service provision. Decision Support Systems\u00a043(2), 618\u2013644 (2007)","journal-title":"Decision Support Systems"},{"issue":"10","key":"50_CR8","doi-asserted-by":"publisher","first-page":"2551","DOI":"10.1360\/jos182551","volume":"18","author":"S. Jiang","year":"2007","unstructured":"Jiang, S., Li, J.: A Reputation-Based Trust Mechanism for P2P E-Commerce Systems. Journal of Software\u00a018(10), 2551\u20132563 (2007) (in Chinese)","journal-title":"Journal of Software"},{"key":"50_CR9","first-page":"301","volume-title":"CCICS 2005","author":"Y. Tang","year":"2005","unstructured":"Tang, Y., Quan, Y., Hu, Y.: Hierarchy \u2013based access contrl in p2p. In: CCICS 2005, pp. 301\u2013306. Science, Beijing (2005) (in Chinese)"},{"issue":"12","key":"50_CR10","first-page":"2734","volume":"17","author":"Y. Liu","year":"2005","unstructured":"Liu, Y., Sheng, C.: A New Information Security Function And Application Model. Journal of Computer Aided Design & Computer Graphics\u00a017(12), 2734\u20132738 (2005) (in Chinese)","journal-title":"Journal of Computer Aided Design & Computer Graphics"},{"issue":"5","key":"50_CR11","first-page":"674","volume":"36","author":"Y. Liu","year":"2010","unstructured":"Liu, Y.: P2P Access Control Research Based on Interest Classification, Trust and Security Grade. Journal of Beijing University of Technology\u00a036(5), 674\u2013678 (2010) (in Chinese)","journal-title":"Journal of Beijing University of Technology"},{"key":"50_CR12","volume-title":"Grid Computing","author":"Z. Du","year":"2002","unstructured":"Du, Z., Chen, Y., Liu, P.: Grid Computing. Tsinghua University Press, Beijing (2002) (in Chinese)"},{"issue":"13","key":"50_CR13","first-page":"4503","volume":"6","author":"Y. Liu","year":"2010","unstructured":"Liu, Y.: Research on Access Control Based Grid Environment. Journal of Computational Information Systems\u00a06(13), 4503\u20134512 (2010)","journal-title":"Journal of Computational Information Systems"},{"key":"50_CR14","unstructured":"Bell, D.E., Lapadula, L.J.: Secure compter system: mathematical foundation. MTR-2527, Mitrecorp, Bedford, MA, NTIS AD771543 (1973)"}],"container-title":["Lecture Notes in Computer Science","Web Information Systems and Mining"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-23971-7_50","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,19]],"date-time":"2019-05-19T20:01:06Z","timestamp":1558296066000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-23971-7_50"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642239700","9783642239717"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-23971-7_50","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2011]]}}}