{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T22:05:58Z","timestamp":1725660358959},"publisher-location":"Berlin, Heidelberg","reference-count":20,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642282669"},{"type":"electronic","value":"9783642282676"}],"license":[{"start":{"date-parts":[[2012,1,1]],"date-time":"2012-01-01T00:00:00Z","timestamp":1325376000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-28267-6_8","type":"book-chapter","created":{"date-parts":[[2012,2,15]],"date-time":"2012-02-15T19:55:46Z","timestamp":1329335746000},"page":"102-113","source":"Crossref","is-referenced-by-count":2,"title":["SARA \u2013 System for Inventory and Static Security Control in a Grid Infrastructure"],"prefix":"10.1007","author":[{"given":"Gerard","family":"Frankowski","sequence":"first","affiliation":[]},{"given":"Micha\u0142","family":"Rzepka","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"8_CR1","unstructured":"Schneier, B.: Crypto-gram newsletter, \n                  \n                    http:\/\/www.schneier.com\/crypto-gram-0005.html"},{"key":"8_CR2","unstructured":"Common vulnerabilities and exposures, \n                  \n                    http:\/\/cve.mitre.org"},{"key":"8_CR3","unstructured":"Common platform enumeration, \n                  \n                    http:\/\/cpe.mitre.org"},{"key":"8_CR4","unstructured":"Common vulnerabilities scoring system, \n                  \n                    http:\/\/www.first.org\/cvss"},{"key":"8_CR5","unstructured":"National vulnerability database, \n                  \n                    http:\/\/nvd.nist.gov"},{"key":"8_CR6","unstructured":"Cve details \u2013 browse vulnerabilities by date, \n                  \n                    http:\/\/www.cvedetails.com\/browse-by-date.php"},{"key":"8_CR7","unstructured":"Rzepka, M.: An approach to monitoring grids with system of automatic reporting and administration (SARA). In: CGW 2010 Conference (October 2010)"},{"key":"8_CR8","unstructured":"A complete guide to the common vulnerability scoring system version 2.0, \n                  \n                    http:\/\/www.first.org\/cvss\/cvss-guide.html"},{"key":"8_CR9","unstructured":"Cvss version 2 calculator, \n                  \n                    http:\/\/nvd.nist.gov\/cvss.cfm"},{"key":"8_CR10","unstructured":"Nagios monitoring system, \n                  \n                    http:\/\/www.nagios.org"},{"key":"8_CR11","unstructured":"Patching status monitoring tool pakiti, \n                  \n                    http:\/\/pakiti.sourceforge.net"},{"key":"8_CR12","unstructured":"Secunia personal software inspector (psi), \n                  \n                    http:\/\/secunia.com\/vulnerability_scanning\/personal"},{"key":"8_CR13","unstructured":"Secunia psi 2.0 \u2013 setup and usage guide, \n                  \n                    http:\/\/secunia.com\/gfx\/pdf\/SecuniaPSI2.0-Setupandusageguide.pdf"},{"key":"8_CR14","unstructured":"Inspire project web page, \n                  \n                    http:\/\/www.inspire-strep.eu"},{"key":"8_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"98","DOI":"10.1007\/978-3-642-14379-3_9","volume-title":"Critical Information Infrastructures Security","author":"M. Chora\u015b","year":"2010","unstructured":"Chora\u015b, M., Flizikowski, A., Kozik, R., Ho\u0142ubowicz, W.: Decision Aid Tool and Ontology-Based Reasoning for Critical Infrastructure Vulnerabilities and Threats Analysis. In: Rome, E., Bloomfield, R. (eds.) CRITIS 2009. LNCS, vol.\u00a06027, pp. 98\u2013110. Springer, Heidelberg (2010)"},{"key":"8_CR16","series-title":"LNCS","first-page":"114","volume-title":"PL-Grid 2011","author":"B. Balcerek","year":"2012","unstructured":"Balcerek, B., Szurgot, B., Uchro\u0144ski, M., Waga, W.: ACARM-ng: Next Generation Correlation Framework. In: Bubak, M., Szepieniec, T., Wiatr, K. (eds.) PL-Grid 2011. LNCS, vol.\u00a07136, pp. 114\u2013127. Springer, Heidelberg (2012)"},{"key":"8_CR17","unstructured":"Rzepka, M.: Monitorowanie bezpiecze\u0144stwa z\u0142o\u017conych infrastruktur przy pomocy systemu SARA, i3 2010 Conference (December 2010), \n                  \n                    http:\/\/www.i3conference.net\/online\/2010\/prezentacje\/58.pdf"},{"key":"8_CR18","series-title":"LNCS","first-page":"128","volume-title":"PL-Grid 2011","author":"B. Balcerek","year":"2012","unstructured":"Balcerek, B., Frankowski, G., Kwiecie\u0144, A., Smutnicki, A., Teodorczyk, M.: Security Best Practices: Applying Defense-in-Depth Strategy to Protect the NGI_PL. In: Bubak, M., Szepieniec, T., Wiatr, K. (eds.) PL-Grid 2011. LNCS, vol.\u00a07136, pp. 128\u2013141. Springer, Heidelberg (2012)"},{"key":"8_CR19","doi-asserted-by":"crossref","unstructured":"Adamski, M., Frankowski, G., Jerzak, M., Stoklosa, D., Rzepka, M.: Defense in depth strategy \u2013 a use case scenario of securing a virtual laboratory. In: Davoli, F., Lawenda, M., Meyer, N., Pugliese, R., Weglarz, J., Zappatore, S. (eds.) Remote Instrumentation for eScience and Related Aspects (2012)","DOI":"10.1007\/978-1-4614-0508-5_6"},{"key":"8_CR20","unstructured":"Virtual laboratory of interactive learning (wlin) project, \n                  \n                    http:\/\/www.wlin.pl"}],"container-title":["Lecture Notes in Computer Science","Building a National Distributed e-Infrastructure\u2013PL-Grid"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-28267-6_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,4,27]],"date-time":"2019-04-27T21:16:49Z","timestamp":1556399809000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-28267-6_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642282669","9783642282676"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-28267-6_8","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2012]]}}}