{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,9,11]],"date-time":"2023-09-11T23:06:54Z","timestamp":1694473614620},"reference-count":44,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2014,5,15]],"date-time":"2014-05-15T00:00:00Z","timestamp":1400112000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Grid Computing"],"published-print":{"date-parts":[[2014,9]]},"DOI":"10.1007\/s10723-014-9303-x","type":"journal-article","created":{"date-parts":[[2014,5,14]],"date-time":"2014-05-14T02:10:42Z","timestamp":1400033442000},"page":"521-542","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["A Security-enabled Grid System for MINDS Distributed Data Mining"],"prefix":"10.1007","volume":"12","author":[{"given":"Seonho","family":"Kim","sequence":"first","affiliation":[]},{"given":"Jinoh","family":"Kim","sequence":"additional","affiliation":[]},{"given":"Jon B.","family":"Weissman","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,5,15]]},"reference":[{"key":"9303_CR1","unstructured":"Ertoz, L., Eilertson, E., Lazarevic, A., Tan, P., Srivastava, J., Kumar, V., Dokas, P: The MINDS - Minnesota Intrusion Detection System, \u201cNext Generation Data Mining\u201d. MIT Press (2004)"},{"key":"9303_CR2","unstructured":"Dokas, P., Ertoz, L., Kumar, V., Lazarevic, A., Srivastava, J., Tan, P.: Data Mining for Network Intrusion Detection. In: Proc. NSF Workshop on Next Generation Data Mining, Baltimore, MD (November 2002)"},{"key":"9303_CR3","doi-asserted-by":"crossref","unstructured":"Foster, I., Kesselman, C., Tuecke, S.: The Anatomy of the Grid: Enabling Scalable Virtual Organizations. International J. Supercomputer Applications 15(3) (2001)","DOI":"10.1177\/109434200101500302"},{"key":"9303_CR4","doi-asserted-by":"crossref","unstructured":"Foster, I., Kesselman, C., Nick, J., Tuecke, S.: The Physiology of the Grid: An Open Grid Services Architecture for Distributed Systems Integration. Open Grid Service Infrastructure WG, GGF (June 2002)","DOI":"10.1109\/MC.2002.1009167"},{"key":"9303_CR5","unstructured":"OASIS Reference Model for Service Oriented Architecture 1.0, http:\/\/docs.oasis-open.org\/soa-rm\/v1.0\/soa-rm.html (October 2006)"},{"key":"9303_CR6","unstructured":"Simple Object Access Protocol, http:\/\/www.w3.org\/TR\/soap\/ (April 2007)"},{"key":"9303_CR7","unstructured":"Universal Description, Discovery, & Integration, http:\/\/www.uddi.org\/specification.html (July 2002)"},{"key":"9303_CR8","unstructured":"Web Services Definition Language, http:\/\/www.w3.org\/TR\/wsdl (March 2001)"},{"key":"9303_CR9","doi-asserted-by":"crossref","unstructured":"I. Foster and C. Kesselman, Globus: A Metacomputing Infrastructure Toolkit, International Journal of Supercomputing Applications, 11(2), 1997.","DOI":"10.1177\/109434209701100205"},{"key":"9303_CR10","unstructured":"The WS-Resource Framework, http:\/\/www.globus.org\/wsrf\/ (April 2006)"},{"key":"9303_CR11","unstructured":"Web Services Resource Framework (WSRF) \u2013 Primer v1.2, http:\/\/docs.oasis-open.org\/wsrf\/wsrf-primer-1.2-primer-cd- 02.pdf, May 2006."},{"key":"9303_CR12","unstructured":"Globus GT4: www.globus.org , 2006."},{"key":"9303_CR13","unstructured":"Weissman, J, Kim, S, England, D: A Framework for Dynamic Service Adaptation in the Grid: Next Generation Software Program Progress Report. NGS NSF Workshop, in conjunction with IPDPS (2005)"},{"key":"9303_CR14","unstructured":"Weissman, Jon, Kim, Seonho, England, Darin: A Dynamic Grid Service Architecture. In: IEEE International Symposium on Cluster Computing and the Grid (CCGrid2005), Cardiff, UK (May 2005)"},{"key":"9303_CR15","unstructured":"Lee, B., Weissman, J.B.: Adaptive Resource Selection for Grid-Enabled Network Services. In: 2nd IEEE International Symposium on Network Computing and Applications (April 2003)"},{"key":"9303_CR16","doi-asserted-by":"crossref","unstructured":"Kim, S, Weissman, J: A Genetic Algorithm based Approach for Scheduling Decomposable Data Grid Applications. In: IEEE International Conference on Parallel Processing (August 2004)","DOI":"10.1109\/ICPP.2004.1327949"},{"key":"9303_CR17","doi-asserted-by":"crossref","unstructured":"England, D., Weissman, J.B.: A Stochastic Control Model for the Deployment of Dynamic Grid Services. In: 5th IEEE\/ACM International Workshop on Grid Computing (2004)","DOI":"10.1109\/GRID.2004.4"},{"key":"9303_CR18","unstructured":"England, D., Weissman, J.B.: A Resource Leasing Policy for On-Demand Computing (2005). invited to the International Journal of High Performance Computing and Applications (IJHPCA)"},{"key":"9303_CR19","doi-asserted-by":"crossref","unstructured":"Neuman, C.B., Ts\u2019o T.: Kerboros: An Authentication Service for Computer Networks. IEEE Communications 32(9), 33\u201338 (September 1994)","DOI":"10.1109\/35.312841"},{"key":"9303_CR20","unstructured":"Simple Authentication and Security Layer, Internet Engineering Task Force RFC-4222, http:\/\/www.ietf.org\/rfc\/rfc4422.txt (June 2006)"},{"key":"9303_CR21","unstructured":"Generic Security Services API, Internet Engineering Task Force RFC2743, http:\/\/www.ietf.org\/rfc\/rfc2743.txt (January 2000)"},{"key":"9303_CR22","unstructured":"The Transport Layer Security Protocol Version 1.0, IETF RFC 2246, http:\/\/www.ietf.org\/rfc\/rfc2246.txt (January 1999)"},{"key":"9303_CR23","unstructured":"The Secure Sockets Layer (SSL) 3.0 specification, http:\/\/wp.netscape.com\/eng\/ssl3\/draft302.txt (August 2011)"},{"key":"9303_CR24","unstructured":"ITU-T Recommendation X.509: Information Technology \u2013 Open Systems Interconnection \u2013 The Directory: Authentication Framework"},{"issue":"2","key":"9303_CR25","doi-asserted-by":"crossref","first-page":"38","DOI":"10.1109\/2.485845","volume":"29","author":"R Sandhu","year":"1996","unstructured":"Sandhu, R., Coyne, E. J., Feinstein, H. L., Youman, C. E.: Role-based access control models. IEEE Computer 29(2), 38\u201347 (1996)","journal-title":"IEEE Computer"},{"key":"9303_CR26","unstructured":"Ferraiolo, D., Kuhn, R.: Role-Based Access Control, Proc. In: 15th National Computer Security Conference. (1992)"},{"key":"9303_CR27","unstructured":"Loscocco, P., Smalley, S., Muckelbauer, P., Taylor, R., Farrell, J.: The Inevitability of Failure: The flawed assumption of security in modern computing environment. In: Proceedings of the 21 s t national Information Systems Security Conference, pp p303\u2013314 (1998)"},{"key":"9303_CR28","unstructured":"Lampson, B: Protection. In: 5 t h Princeton Symposium on Information Sciences and Systems, pp 437\u2013443 (1971)"},{"key":"9303_CR29","unstructured":"Arenas, A.E., et al.. In: Proc. UK e-Science All Hands Meeting. The Design and Implementation of Grid Database Services in OGSA-DAI (2003)"},{"key":"9303_CR30","unstructured":"The OGSA-DAI project, http:\/\/www.ogsadai.org.uk\/ (2002)"},{"key":"9303_CR31","doi-asserted-by":"crossref","unstructured":"Josh, J.B.D., Bhatti, R., Bertino, E., Ghafoor, A.: Access Control Language for Multidomain Environment. IEEE Internet Computing, 40\u201350 (2004)","DOI":"10.1109\/MIC.2004.53"},{"issue":"11","key":"9303_CR32","doi-asserted-by":"crossref","first-page":"1557","DOI":"10.1109\/TKDE.2005.185","volume":"17","author":"B Shafiq","year":"2005","unstructured":"Shafiq, B., Joshi, J.B.D., Bertino, E., Ghafoor, A.: Secure Interoperation in a Multidomain Environment Employing RBAC Policies. IEEE Transactions on Knowledge and Data Engineering 17(11), 1557\u20131577 (2005)","journal-title":"IEEE Transactions on Knowledge and Data Engineering"},{"key":"9303_CR33","doi-asserted-by":"crossref","unstructured":"Zhang, X., Li, Q., Seifert, J.P, Xu, M.: Flexible Authorization with Decentralized Access Control Model for Grid Computing. In: IEEE High Assurance Systems Engineering Symposium (HASE), pp 156\u2013165 (2007)","DOI":"10.1109\/HASE.2007.29"},{"key":"9303_CR34","first-page":"34","volume":"6","author":"M Cannataro","year":"2004","unstructured":"Cannataro, M., et al: Distributed Data Mining on Grids: Services, Tools, and Applications. IEE Transactions on Systems, Man, and Sybernetics 6, 34 (December 2004)","journal-title":"IEE Transactions on Systems, Man, and Sybernetics"},{"issue":"1","key":"9303_CR35","doi-asserted-by":"crossref","first-page":"89","DOI":"10.1145\/602421.602425","volume":"46","author":"M Cannataro","year":"2003","unstructured":"Cannataro, M., Talia, D.: The Knowledge Grid. Communications of the ACM 46(1), 89\u201393 (2003)","journal-title":"Communications of the ACM"},{"key":"9303_CR36","volume-title":"Advances in Distributed and Parallel Knowledge Discovery","author":"H Kargupta","year":"2000","unstructured":"Kargupta, H., Chan, P.: Advances in Distributed and Parallel Knowledge Discovery. MIT Press, Cambridge, MA (2000)"},{"key":"9303_CR37","doi-asserted-by":"crossref","unstructured":"Park, B., Kargupta, H.: Distributed Data Mining: Algorithms, Systems and Applications, Data Mining Handbook (2002)","DOI":"10.1145\/502786.502791"},{"issue":"11","key":"9303_CR38","doi-asserted-by":"crossref","first-page":"27","DOI":"10.1145\/384150.384156","volume":"44","author":"F Berman","year":"2001","unstructured":"Berman, F.: From TeraGrid to Knowledge Grid. Communication of ACM 44(11), 27\u201328 (2001)","journal-title":"Communication of ACM"},{"key":"9303_CR39","unstructured":"Project: GEDDM (Grid Enabled Distributed Data Mining), http:\/\/www.omii.ac.uk\/repository\/project.jhtml?pid=134 (2007)"},{"key":"9303_CR40","unstructured":"The ePCRN (electronic Primary Care Research Network) Project, http:\/\/www.epcrn.org\/ (2007)"},{"issue":"1","key":"9303_CR41","doi-asserted-by":"crossref","first-page":"65","DOI":"10.1007\/s10723-006-9054-4","volume":"5","author":"AL Pereira","year":"2007","unstructured":"Pereira, A L., Muppavarapu, V, Chung, S M: Managing Role-Based Access Control Policies for Grid Databases in OGSA-DAI Using CAS. J. Grid Comput. 5(1), 65\u201381 (2007)","journal-title":"J. Grid Comput."},{"issue":"2","key":"9303_CR42","doi-asserted-by":"crossref","first-page":"265","DOI":"10.1007\/s10723-009-9116-5","volume":"7","author":"V Muppavarapu","year":"2009","unstructured":"Muppavarapu, V, Chung, S M: Role-Based Access Control in a Data Grid Using the Storage Resource Broker and Shibboleth. Journal of Grid Computing 7(2), 265\u2013283 (2009)","journal-title":"Journal of Grid Computing"},{"issue":"2","key":"9303_CR43","doi-asserted-by":"crossref","first-page":"169","DOI":"10.1007\/s10723-008-9112-1","volume":"7","author":"B Lang","year":"2009","unstructured":"Lang, B, Foster, I T., Siebenlist, F, Ananthakrishnan, R., Freeman, T: A Flexible Attribute Based Access Control Method for Grid Computing. Journal of Grid Computing 7(2), 169\u2013180 (2009)","journal-title":"Journal of Grid Computing"},{"key":"9303_CR44","doi-asserted-by":"crossref","first-page":"85","DOI":"10.1145\/354876.354878","volume":"3","author":"S Osborn","year":"2000","unstructured":"Osborn, S., Sandhu, R., Munawar, Q.: Configuring Role-based Access Control to enforce Mandatory and Discretionary Access Control Polices. ACM Transactions on Information and System Security (TISSEC) 3, 85\u2013106 (2000)","journal-title":"ACM Transactions on Information and System Security (TISSEC)"}],"container-title":["Journal of Grid Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10723-014-9303-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10723-014-9303-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10723-014-9303-x","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,4,3]],"date-time":"2022-04-03T14:52:45Z","timestamp":1648997565000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10723-014-9303-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,5,15]]},"references-count":44,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2014,9]]}},"alternative-id":["9303"],"URL":"https:\/\/doi.org\/10.1007\/s10723-014-9303-x","relation":{},"ISSN":["1570-7873","1572-9184"],"issn-type":[{"value":"1570-7873","type":"print"},{"value":"1572-9184","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014,5,15]]}}}