{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,8,23]],"date-time":"2023-08-23T15:32:38Z","timestamp":1692804758135},"reference-count":24,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2009,2,21]],"date-time":"2009-02-21T00:00:00Z","timestamp":1235174400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["J Supercomput"],"published-print":{"date-parts":[[2010,4]]},"DOI":"10.1007\/s11227-009-0267-8","type":"journal-article","created":{"date-parts":[[2009,2,20]],"date-time":"2009-02-20T12:57:29Z","timestamp":1235134649000},"page":"82-96","source":"Crossref","is-referenced-by-count":6,"title":["Authentication and authorization infrastructure for\u00a0Grids\u2014issues, technologies, trends and experiences"],"prefix":"10.1007","volume":"52","author":[{"given":"Wei","family":"Jie","sequence":"first","affiliation":[]},{"given":"Junaid","family":"Arshad","sequence":"additional","affiliation":[]},{"given":"Pascal","family":"Ekin","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2009,2,21]]},"reference":[{"key":"267_CR1","doi-asserted-by":"crossref","first-page":"200","DOI":"10.1177\/109434200101500302","volume":"15","author":"I Foster","year":"2001","unstructured":"Foster I, Kesselman C (2001) The anatomy of the grid: enabling scalable virtual organizations. Int J High Perform Comput Appl 15:200\u2013222","journal-title":"Int J High Perform Comput Appl"},{"key":"267_CR2","doi-asserted-by":"crossref","unstructured":"Foster I et al (1998) A security architecture for computational grids. In: ACM conference on computers and security, 1998","DOI":"10.1145\/288090.288111"},{"key":"267_CR3","unstructured":"Globus Toolkit (2009) http:\/\/www.globus.org"},{"key":"267_CR4","unstructured":"Weise J (2008) Public key infrastructure overview. http:\/\/www.sun.com\/blueprints\/0801\/publickey.pdf"},{"key":"267_CR5","doi-asserted-by":"crossref","unstructured":"Kuhn DR et al (2001) Introduction to public key technology and the federal PKI infrastructure. National Institute of Standards and Technology","DOI":"10.6028\/NIST.SP.800-32"},{"key":"267_CR6","unstructured":"C.C.I.T.T. (1988) Recommendation X.509. The directory\u2014authentication framework"},{"key":"267_CR7","unstructured":"Tuecke S et al (2001) Internet X. 509 public key infrastructure proxy certificate profile. IETF"},{"key":"267_CR8","unstructured":"Athens for Education (2008) http:\/\/www.athens.ac.uk"},{"key":"267_CR9","unstructured":"Shibboleth Project (2008) http:\/\/shibboleth,internet2.edu"},{"key":"267_CR10","unstructured":"OASIS Security Services Technical Committee (2003) Security Assertion Markup Language (SAML) v1.1. OASIS Standard 200308. http:\/\/www.oasisopen.org\/specs\/index.php#samlv1.1"},{"key":"267_CR11","doi-asserted-by":"crossref","unstructured":"Pearlman L et al (2002) A community authorization service for group collaboration. In: IEEE 3rd international workshop on policies for distributed systems and networks, 2002","DOI":"10.1109\/POLICY.2002.1011293"},{"key":"267_CR12","unstructured":"Alfieri R (2003) Managing dynamic user communities in a grid of autonomous resources. In: Conference for computing in high energy and nuclear physics, 2003"},{"key":"267_CR13","doi-asserted-by":"crossref","unstructured":"Chadwick DW, Otenko A, Ball E (2003) Role-based access control with X.509 attribute certificates. IEEE Internet Comput 62\u201369","DOI":"10.1109\/MIC.2003.1189190"},{"key":"267_CR14","unstructured":"ITU-T (1995) Rec X. 812|ISO\/IEC 10181-3:1996. Security frameworks for 475, open systems: access control framework"},{"key":"267_CR15","unstructured":"Xu W, Chadwick D, Otenko S (2005) Development of a flexible PERMIS authorization module for Shibboleth and Apache server. In: 2nd EuroPKIWorkshop, 2005"},{"key":"267_CR16","unstructured":"GridShib Project (2008) http:\/\/gridshib.globus.org"},{"key":"267_CR17","unstructured":"ShibGrid Project (2008) http:\/\/www.oesc.ox.ac.uk\/activities\/projects\/index.xml?ID=ShibGrid"},{"issue":"9","key":"267_CR18","doi-asserted-by":"crossref","first-page":"801","DOI":"10.1002\/spe.688","volume":"35","author":"J Basney","year":"2005","unstructured":"Basney J, Humphrey M, Welch V (2005) The MyProxy online credential repository. Softw Pract Exp 35(9):801\u2013816","journal-title":"Softw Pract Exp"},{"key":"267_CR19","unstructured":"UK National Grid Service (2008) http:\/\/www.grid-support.ac.uk\/"},{"key":"267_CR20","unstructured":"GridShibPERMIS Project (2008) http:\/\/www.jisc.ac.uk\/uploaded_documents\/GRIDShibPermis.pdf"},{"key":"267_CR21","unstructured":"Tan L et al (2006) GEODE\u2014sharing occupational data through the grid. In: 5th UK eScience all hands meeting, Nottingham, UK, 2006"},{"key":"267_CR22","unstructured":"Lambert P et al (2006) Development of a grid enabled occupational data environment. In: 2nd international conference on eSocial science, Manchester, UK, 2006"},{"key":"267_CR23","unstructured":"OGSA-DAI (2008) Open grid service architecture\u2014data access and integration. http:\/\/www.ogsadai.org.uk"},{"key":"267_CR24","unstructured":"Sakai Project (2008) http:\/\/www.sakaiproject.org"}],"container-title":["The Journal of Supercomputing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-009-0267-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11227-009-0267-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-009-0267-8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T06:23:58Z","timestamp":1559370238000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11227-009-0267-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,2,21]]},"references-count":24,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2010,4]]}},"alternative-id":["267"],"URL":"https:\/\/doi.org\/10.1007\/s11227-009-0267-8","relation":{},"ISSN":["0920-8542","1573-0484"],"issn-type":[{"value":"0920-8542","type":"print"},{"value":"1573-0484","type":"electronic"}],"subject":[],"published":{"date-parts":[[2009,2,21]]}}}