{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T12:11:23Z","timestamp":1763467883851},"reference-count":27,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2008,11,20]],"date-time":"2008-11-20T00:00:00Z","timestamp":1227139200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["J Grid Computing"],"published-print":{"date-parts":[[2009,6]]},"DOI":"10.1007\/s10723-008-9112-1","type":"journal-article","created":{"date-parts":[[2008,11,19]],"date-time":"2008-11-19T06:48:11Z","timestamp":1227077291000},"page":"169-180","source":"Crossref","is-referenced-by-count":73,"title":["A Flexible Attribute Based Access Control Method for Grid Computing"],"prefix":"10.1007","volume":"7","author":[{"given":"Bo","family":"Lang","sequence":"first","affiliation":[]},{"given":"Ian","family":"Foster","sequence":"additional","affiliation":[]},{"given":"Frank","family":"Siebenlist","sequence":"additional","affiliation":[]},{"given":"Rachana","family":"Ananthakrishnan","sequence":"additional","affiliation":[]},{"given":"Tim","family":"Freeman","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2008,11,20]]},"reference":[{"key":"9112_CR1","first-page":"437","volume-title":"Proceedings of the 5th Princeton Conference on Information Sciences and Systems","author":"B.W. Lampson","year":"1971","unstructured":"Lampson, B.W.: Protection. In: Proceedings of the 5th Princeton Conference on Information Sciences and Systems, pp. 437\u2013443. Princeton University, Princeton, N.J. (1971)"},{"key":"9112_CR2","volume-title":"Secure computer systems: a mathematical model","author":"D.E. Bell","year":"1973","unstructured":"Bell, D.E., LaPadula, L.: Secure computer systems: a mathematical model. Mitre Corporation, Bedford, MA (1973, January)"},{"issue":"9","key":"9112_CR3","doi-asserted-by":"crossref","first-page":"40","DOI":"10.1109\/35.312842","volume":"32","author":"R.S. Sandhu","year":"1994","unstructured":"Sandhu, R.S., Samaratiy, P.: Access control: principles and practice. IEEE Commun. 32(9), 40\u201348 (1994)","journal-title":"IEEE Commun."},{"issue":"3","key":"9112_CR4","doi-asserted-by":"crossref","first-page":"200","DOI":"10.1177\/109434200101500302","volume":"15","author":"I. Foster","year":"2001","unstructured":"Foster, I., Kesselman, C., Tuecke, S.: The anatomy of the grid: enabling scalable virtual organizations. Intern. J. Supercomp Appl. 15(3), 200\u2013222 (2001)","journal-title":"Intern. J. Supercomp Appl."},{"key":"9112_CR5","doi-asserted-by":"crossref","unstructured":"Lang, B., Foster, I., Siebenlist, F., Ananthakrishnan, R., Freeman, T.: A multipolicy authorization framework for grid security. In: Proceedings of the 5th IEEE International Symposium on Network Computing and Applications, Cambridge, USA (2006, July)","DOI":"10.1109\/NCA.2006.4"},{"key":"9112_CR6","unstructured":"ITU-T Recommendation X.509: Information technology\u2014open systems interconnection\u2014the directory: authentication framework, ISO\/IEC 9594-8 (1993)"},{"key":"9112_CR7","doi-asserted-by":"crossref","unstructured":"Housley, R., Ford, W., Polk, W., Solo, D.: Internet X.509 Public Key Infrastructure Certificate and CRL Profile (1998, September)","DOI":"10.17487\/rfc2459"},{"key":"9112_CR8","volume-title":"Proceedings of the 4th ACM Workshop on Role-Based Access Control","author":"J.S. Park","year":"1999","unstructured":"Park, J.S., Sandhu, R.: RBAC on the web by smart certificates. In: Proceedings of the 4th ACM Workshop on Role-Based Access Control. ACM, Fairfax, VA, October 28\u201329 (1999)"},{"key":"9112_CR9","unstructured":"Rivest, R.L., Lampson, B.: SDSI\u2014a simple distributed security infrastructure. Presented at CRYPTO \u201896 Rumpsession (1996, April)"},{"key":"9112_CR10","unstructured":"Thompson, M., Johnston, W., Mudumbai, S., Hoo, G., Jackson, K., Essiani, A.: Certificate-based access control for widely distributed resources. In: Proceedings of the Usenix Security Symposium, August (1999)"},{"key":"9112_CR11","unstructured":"Park, J.S., Sandhu, R.: Smart Certificates: Extending X.509 for Secure Attribute Service on the Web. NISSC (1999)"},{"key":"9112_CR12","doi-asserted-by":"crossref","unstructured":"Farrell, S., Housley, R.: An Internet attribute certificate profile for authorization. IETF\u2013RFC 3281 (2002)","DOI":"10.17487\/rfc3281"},{"key":"9112_CR13","doi-asserted-by":"crossref","unstructured":"Damiani, E., Vimercati, S.D.C., Samarati, P.: New paradigms for access control in open environments. In: Proceedings of the 5th IEEE International Symposium on Signal Processing and Information, Athens, Greece, December 18\u201321 (2005)","DOI":"10.1109\/ISSPIT.2005.1577155"},{"issue":"3","key":"9112_CR14","doi-asserted-by":"crossref","first-page":"241","DOI":"10.3233\/JCS-2002-10303","volume":"10","author":"P. Bonatti","year":"2002","unstructured":"Bonatti, P., Samarati, P.: A unified framework for regulating access and information release on the web. J. Comput. Secur. 10(3), 241\u2013272 (2002)","journal-title":"J. Comput. Secur."},{"key":"9112_CR15","doi-asserted-by":"crossref","unstructured":"Wang, L., Wijesekera, D., Jajodia, S.: A logic-based framework for attribute based access control. In: Proceedings of the 2004 ACM Workshop on Formal Methods in Security Engineering, Washington, DC, October (2004)","DOI":"10.1145\/1029133.1029140"},{"key":"9112_CR16","doi-asserted-by":"crossref","unstructured":"Yuan, E., Tong, J.: Attributed based access control (ABAC) for Web services. In: Proceedings of the IEEE International Conference on Web Services (ICW\u201905) (2005, July)","DOI":"10.1109\/ICWS.2005.25"},{"key":"9112_CR17","doi-asserted-by":"crossref","unstructured":"Squicciarini, A.C., Bertino, E., Goasguen, S.: Access control strategies for virtualized environments in grid computing systems. In: Proceedings of the 11th IEEE International Workshop on Future Trends of Distributed Computing Systems (FTDCS\u201907) (2007)","DOI":"10.1109\/FTDCS.2007.10"},{"issue":"4","key":"9112_CR18","doi-asserted-by":"crossref","first-page":"566","DOI":"10.1145\/950191.950196","volume":"6","author":"M. Thompson","year":"2003","unstructured":"Thompson, M., Essiari, A., Mudumbai, S.: Certificate-based authorization policy in a PKI environment. ACM Trans. Inform. Syst. Secur. (TISSEC) 6(4), 566\u2013588 (2003, November)","journal-title":"ACM Trans. Inform. Syst. Secur. (TISSEC)"},{"issue":"1","key":"9112_CR19","doi-asserted-by":"crossref","first-page":"33","DOI":"10.1016\/j.istr.2004.11.004","volume":"10","author":"D. Chadwick","year":"2005","unstructured":"Chadwick, D.: Authorization in grid computing. Inform. Secur. Tech. Rep. 10(1), 33\u201340 (2005)","journal-title":"Inform. Secur. Tech. Rep."},{"issue":"2","key":"9112_CR20","doi-asserted-by":"crossref","first-page":"277","DOI":"10.1016\/S0167-739X(02)00153-X","volume":"19","author":"D. Chadwick","year":"2003","unstructured":"Chadwick, D., Otenko, A.: The PERMIS X.509 role based privilege management infrastructure. Future Gener. Comput. Systs. 19(2), 277\u2013289 (2003, February)","journal-title":"Future Gener. Comput. Systs."},{"key":"9112_CR21","unstructured":"Welch, V., Barton, T., Keahey, K., Siebenlist, F.: Attributes, anonymity, and access: Shibboleth and Globus integration to facilitate grid collaboration. In: 4th Annual PKI R&D Workshop, April (2005)"},{"key":"9112_CR22","unstructured":"Barton, T., Basney, J., Freeman, T., Scavo, T., Siebenlist, F., Welch, V., Ananthakrishnan, R., Baker, B., Goode, M., Keahey, K.: Identity federation and attribute-based authorization through the globus toolkit, Shibboleth, Gridshib, and MyProxy. In: 5th Annual PKI R&D Workshop, April (2006)"},{"key":"9112_CR23","doi-asserted-by":"crossref","unstructured":"Alfteri, R., Cecchini, R., Ciaschini, V., Dellagnello, L., Frohner, A., Gianoli, A., Lorentey, K., Spataro, F.: VOMS, an authorization system for virtual organizations. In: 1st European Across Grids Conference, Santiago de Compostela, February 13\u201314 (2003)","DOI":"10.1007\/978-3-540-24689-3_5"},{"key":"9112_CR24","unstructured":"OASIS, Extensible Access Control Markup Language (XACML), V2.0 (February 2005)"},{"key":"9112_CR25","unstructured":"OASIS, Security Assertion Markup Language (SAML), V2.0 (March 2005)"},{"key":"9112_CR26","unstructured":"Foster, I., Frey, J., Graham, S., Tuecke, S., Czajkowski, K., Ferguson, D., Leymann, F., Nally, M., Storey, T., Weerawaranna, S.: Modeling stateful resources with Web Services. Globus Alliance (2004)"},{"key":"9112_CR27","unstructured":"Czajkowski, K., Ferguson, D.F., Foster, I., Frey, J., Graham, S., Sedukhin, I., Snelling, D., Tuecke, S., Vambenepe, W.: The WS-Resource Framework, Version 1.0, March 5 (2004)"}],"container-title":["Journal of Grid Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10723-008-9112-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10723-008-9112-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10723-008-9112-1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,9,21]],"date-time":"2021-09-21T11:59:24Z","timestamp":1632225564000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10723-008-9112-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,11,20]]},"references-count":27,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2009,6]]}},"alternative-id":["9112"],"URL":"https:\/\/doi.org\/10.1007\/s10723-008-9112-1","relation":{},"ISSN":["1570-7873","1572-9184"],"issn-type":[{"value":"1570-7873","type":"print"},{"value":"1572-9184","type":"electronic"}],"subject":[],"published":{"date-parts":[[2008,11,20]]}}}