{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,1,30]],"date-time":"2025-01-30T22:10:01Z","timestamp":1738275001872,"version":"3.35.0"},"reference-count":30,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2008,6,28]],"date-time":"2008-06-28T00:00:00Z","timestamp":1214611200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["J Grid Computing"],"published-print":{"date-parts":[[2009,3]]},"DOI":"10.1007\/s10723-008-9104-1","type":"journal-article","created":{"date-parts":[[2008,6,27]],"date-time":"2008-06-27T14:52:52Z","timestamp":1214578372000},"page":"25-50","source":"Crossref","is-referenced-by-count":4,"title":["REMUS: A Rerouting and Multiplexing System for Grid Connectivity Across Firewalls"],"prefix":"10.1007","volume":"7","author":[{"given":"Jefferson","family":"Tan","sequence":"first","affiliation":[]},{"given":"David","family":"Abramson","sequence":"additional","affiliation":[]},{"given":"Colin","family":"Enticott","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2008,6,28]]},"reference":[{"key":"9104_CR1","doi-asserted-by":"crossref","unstructured":"Abramson, D., Sosic, R., Giddy, J., Hall, B.: Nimrod: a tool for performing parametised simulations using distributed workstations. In: Proceedings of the 4th IEEE Symposium on High Performance Distributed Computing, Virginia, August 1995","DOI":"10.1109\/HPDC.1995.518701"},{"key":"9104_CR2","doi-asserted-by":"crossref","unstructured":"Buyya, R., Abramson, D., Giddy, J.: Nimrod\/G: an architecture of a resource management and scheduling system in a global computational Grid. In: Proceedings of HPC Asia 2000, Beijing, China, 14\u201317 May 2000","DOI":"10.1109\/HPC.2000.846563"},{"key":"9104_CR3","volume-title":"Internetworking with TCP\/IP volume 3: client-server programming and applications","author":"D. Comer","year":"2001","unstructured":"Comer, D., Stevens, D.: Internetworking with TCP\/IP volume 3: client-server programming and applications. Prentice-Hall, Upper Saddle River (2001)"},{"key":"9104_CR4","unstructured":"Inferno Nettverk A\/S: Dante\u2014a free SOCKS implementation (Online). http:\/\/www.inet.no\/dante\/ . Accessed 2005"},{"key":"9104_CR5","doi-asserted-by":"crossref","unstructured":"Denis, A., Aumage, O., Hofman, R., Verstoep, K., Kielmann, T., Bal, H.E.: Wide-area communication for grids: an integrated solution to connectivity, performance and security problems. In: Proceedings of the 13th IEEE International Symposium on High Performance Distributed Computing (HPDC-13 \u201804), pp. 97\u2013106 (2004)","DOI":"10.1109\/HPDC.2004.1323501"},{"key":"9104_CR6","unstructured":"Dynamic Firewalls Configuration, Ver. 1.0, D-Grid Integrationsprojekt (DGI), Technical Report, (Online). https:\/\/www.d-grid.de\/fileadmin\/user_upload\/documents\/DGI-FG3\u20135\/FG3\u20135_Dynamic_Firewalls.pdf. Accessed Feb. 2006"},{"key":"9104_CR7","doi-asserted-by":"crossref","unstructured":"Foster, I., Kesselman, C., Tsudik, G., Tuecke, S.: A security architecture for computational Grids. In: Proceedings of the 5th ACM Conference on Computer and Communications Security Conference, pp. 83\u201392 (1998)","DOI":"10.1145\/288090.288111"},{"issue":"3","key":"9104_CR8","doi-asserted-by":"crossref","first-page":"200","DOI":"10.1177\/109434200101500302","volume":"15","author":"I. Foster","year":"2001","unstructured":"Foster, I., Kesselman, C., Tuecke, S.: The anatomy of the Grid: enabling scalable virtual organizations. Int. J. Supercomput. Appl. 15(3), 200\u2013222 (2001)","journal-title":"Int. J. Supercomput. Appl."},{"issue":"2","key":"9104_CR9","first-page":"115","volume":"11","author":"I. Foster","year":"1997","unstructured":"Foster, I., Kesselman, C.: Globus: a metacomputing infrastructure toolkit. Int. J. Supercomput. Appl. High Perform. Comput. 11(2), 115\u2013128 (1997), Summer","journal-title":"Int. J. Supercomput. Appl. High Perform. Comput."},{"issue":"2","key":"9104_CR10","doi-asserted-by":"crossref","first-page":"151","DOI":"10.1007\/s10723-007-9076-6","volume":"5","author":"A. Ganguly","year":"2007","unstructured":"Ganguly, A., Agrawal, A., Boykin, P.O., Figueiredo, R.J.: WOW: self-organizing wide area overlay networks of virtual workstations. J. Grid Comput. 5(2), 151\u2013172 (2007)","journal-title":"J. Grid Comput."},{"key":"9104_CR11","unstructured":"The Globus Alliance: Globus Toolkit. http:\/\/www.globus.org . Accessed 2008"},{"key":"9104_CR12","unstructured":"Graupner, S., Reimann, C.: Globus grid and firewalls: issues and solutions in a utility data center environment, Technical report HPL-2002-278. Hewlett-Packard, Palo Alto, 2 October 2002"},{"key":"9104_CR13","doi-asserted-by":"crossref","unstructured":"Green, M.L., Gallo, S.M., Miller, R.: Grid-enabled virtual organization based dynamic firewall. In: Proceedings of the 5th IEEE\/ACM International Workshop on Grid Computing (GRID\u201904), pp. 208\u2013216 (2004)","DOI":"10.1109\/GRID.2004.35"},{"key":"9104_CR14","doi-asserted-by":"crossref","unstructured":"Hutzelman, J., Salowey, J., Galbraith, J., Welch, V.: Generic Security Service Application Program Interface (GSS-API) Authentication and Key Exchange for the Secure Shell (SSH) Protocol, RFC document, IETF (Internet Engineering Task Force). http:\/\/www.ietf.org\/rfc\/rfc4462.txt . Accessed May 2006","DOI":"10.17487\/rfc4462"},{"key":"9104_CR15","unstructured":"Lee, Y.: SOCKS: a protocol for TCP proxy across firewalls, NEC Systems Laboratory (Online). http:\/\/archive.socks.permeo.com\/protocol\/socks4.protocol . Accessed 2005"},{"key":"9104_CR16","doi-asserted-by":"crossref","unstructured":"Leech, M., Ganis, M., Lee, Y., Kuris, R., Koblas, D., Jones, L.: SOCKS protocol version 5. IETF RFC 1928. http:\/\/tools.ietf.org\/html\/rfc1928 . Accessed March 1996","DOI":"10.17487\/rfc1928"},{"key":"9104_CR17","volume-title":"Metrics for performance tuning of web-based applications","author":"W.N. Mills III","year":"2000","unstructured":"Mills, W.N. III, Krueger, L., Chiu, W., Halim, N., Hellerstein, J.L., Squillante, M.S.: Metrics for performance tuning of web-based applications. Computer Measurement Group, Turnersville (2000)"},{"key":"9104_CR18","doi-asserted-by":"crossref","unstructured":"Neisse, R., Bosquiroli Almeida, M.J., Granville, L.Z., Rockenbach Tarouco, L.M.: Policies translation for integrated management of grids and networks. In: Liebrock, L.M. (ed.) Proceedings of the 2005 ACM Symposium on Applied Computing, pp. 724\u2013729, March 13\u201317, Santa Fe, New Mexico. SAC \u201905. ACM, New York (2005)","DOI":"10.1145\/1066677.1066841"},{"key":"9104_CR19","unstructured":"Quittek, J., Stiemerling, M., Srisuresh, P.: Definitions of Managed Objects for Middlebox Communication, Internet-Draft, IETF (Internet Engineering Task Force), October 2006"},{"key":"9104_CR20","doi-asserted-by":"crossref","unstructured":"Rosmanith, H., Kranzlmuller, D.: Glogin - a multifunctional, interactive tunnel into the grid. In: Proceedings of the 5th IEEE\/ACM International Workshop on Grid Computing (GRID\u201904), pp. 266\u2013272 (2004)","DOI":"10.1109\/GRID.2004.33"},{"key":"9104_CR21","unstructured":"Son, S., Allcock, B., Livny, M.: CODO: firewall traversal by cooperative on-demand opening. In: Proceedings of the 14th IEEE Symposium on High Performance Distributed Computing, July 2005"},{"key":"9104_CR22","doi-asserted-by":"crossref","unstructured":"Son, S., Farrellee, M., Livny, M.: a generic proxy mechanism for secure middlebox traversal. In: Proceedings of the IEEE International Conference on Cluster Computing (Cluster 2005). Boston, Massachusetts, USA, 27\u201330 September 2005","DOI":"10.1109\/CLUSTR.2005.347055"},{"key":"9104_CR23","doi-asserted-by":"crossref","unstructured":"Son, S., Livny, M.: Recovering internet symmetry in distributed computing. In: Proc. 3rd IEEE\/ACM International Symposium Cluster Computing and the Grid (CCGrid 2003), pp. 542\u2013549, 12\u201315 May 2003","DOI":"10.1109\/CCGRID.2003.1199412"},{"key":"9104_CR24","doi-asserted-by":"crossref","unstructured":"Sudholt, W., Baldridge, K., Abramson, D., Enticott, C., Garic, S.: Application of Grid computing to parameter sweeps and optimizations in molecular modelling. In: Zomaya, A. (ed.) Parallel Computing for Bioinformatics, pp. 27\u201335. Wiley, Hoboken (2006). Also appeared in The International Conference on Computational Sciences (ICCS04), Krakow Poland, 6\u20139 June 2004","DOI":"10.1016\/j.future.2004.09.010"},{"key":"9104_CR25","doi-asserted-by":"crossref","unstructured":"Tan, J., Abramson, D., Enticott, C.: Bridging organizational network boundaries on the Grid. In: Proceedings of the 6th IEEE\/ACM International Workshop on Grid Computing (Grid 2005). Seattle, Washington, 13\u201314 November 2005","DOI":"10.1109\/GRID.2005.1542765"},{"key":"9104_CR26","doi-asserted-by":"crossref","unstructured":"Tanaka, Y., Hirano, M., Nakada, H., Sekiguchi, S.: Performance evaluation of a firewall-compliant Globus-based wide-area cluster system. In: Proceedings of the IEEE International Symposium on High-Performance Distributed Computing 2000 (HPDC 2000), pp. 121\u2013128, 1\u20134 August 2000","DOI":"10.1109\/HPDC.2000.868642"},{"key":"9104_CR27","unstructured":"Thorpe, S.: Online, an email sent to the globus-discuss mailing list about running a GridFTP server behind a NAT firewall. http:\/\/www-unix.globus.org\/mail_archive\/discuss\/2005\/01\/msg00216.html . Accessed January 2005"},{"key":"9104_CR28","unstructured":"Welch, V.: Globus Toolkit Firewall Requirements, version 9. The Globus Alliance, (Online). http:\/\/www.globus.org\/toolkit\/security\/firewalls\/Globus-Firewall-Requirements-9.pdf . Accessed 31 October 2006"},{"key":"9104_CR29","unstructured":"Welch, V., Foster, I., Kesselman, C., Mulmo, O., Pearlman, L., Tuecke, S., Gawor, J., Meder, S., Siebenlist, F.: X.509 proxy certificates for dynamic delegation. In: Proceedings of the 3rd Annual PKI R&D Workshop (2004)"},{"key":"9104_CR30","unstructured":"Ylonen, T.: SSH\u2014Secure login connections over the internet. In: Proc. 6th USENIX Security Symposium, San Jose, CA, pp. 37\u201342, July 1996"}],"container-title":["Journal of Grid Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10723-008-9104-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10723-008-9104-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10723-008-9104-1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,30]],"date-time":"2025-01-30T21:47:00Z","timestamp":1738273620000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10723-008-9104-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,6,28]]},"references-count":30,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2009,3]]}},"alternative-id":["9104"],"URL":"https:\/\/doi.org\/10.1007\/s10723-008-9104-1","relation":{},"ISSN":["1570-7873","1572-9184"],"issn-type":[{"type":"print","value":"1570-7873"},{"type":"electronic","value":"1572-9184"}],"subject":[],"published":{"date-parts":[[2008,6,28]]}}}