{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,3,29]],"date-time":"2022-03-29T10:04:41Z","timestamp":1648548281969},"reference-count":23,"publisher":"Springer Science and Business Media LLC","issue":"1-2","license":[{"start":{"date-parts":[[2009,5,5]],"date-time":"2009-05-05T00:00:00Z","timestamp":1241481600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc\/2.0"},{"start":{"date-parts":[[2009,5,5]],"date-time":"2009-05-05T00:00:00Z","timestamp":1241481600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc\/2.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Earth Sci Inform"],"published-print":{"date-parts":[[2009,6]]},"DOI":"10.1007\/s12145-009-0026-7","type":"journal-article","created":{"date-parts":[[2009,5,4]],"date-time":"2009-05-04T21:35:44Z","timestamp":1241472944000},"page":"63-74","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Virtual organisation in the SIMDAT meteorological activity: a decentralised access control mechanism for distributed data"],"prefix":"10.1007","volume":"2","author":[{"given":"Baudouin","family":"Raoult","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Guillaume","family":"Aubert","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Marta","family":"Guti\u00e9rrez","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Cristina","family":"Arciniegas-Lopez","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Ricardo","family":"Correa","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2009,5,5]]},"reference":[{"key":"26_CR1","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/11755593_2","volume":"3986","author":"M Ahsant","year":"2006","unstructured":"Ahsant M, Surride M, Leonard T, Krishna A, Olle M (2006) Dynamic trust federation in grids. Lecture Note in Computer Science 3986:3\u201318","journal-title":"Lecture Note in Computer Science"},{"key":"26_CR2","doi-asserted-by":"crossref","unstructured":"Alfieri R, Cecchini R, Ciaschini V, dell\u2019 Agnello L, Frohner \u00c1, Gianoli A, L\u00f6rentey K, Spataro F (2004) An authorization system for virtual organizations. In Proceedings of the 1st European Across Grids Conference. Santiago de Compostela, Spain, pp 33\u201340","DOI":"10.1007\/978-3-540-24689-3_5"},{"issue":"4","key":"26_CR3","doi-asserted-by":"publisher","first-page":"549","DOI":"10.1016\/j.future.2004.10.006","volume":"21","author":"R Alfieri","year":"2005","unstructured":"Alfieri R, Cecchini R, Ciaschini V, dell\u2019 Agnello L, Frohner \u00c1, L\u00f6rentey K, Spataro F (2005) From Gridmap-File to VOMS: managing authorization in a grid environment. Future Gener Comput Syst 21(4):549\u2013558","journal-title":"Future Gener Comput Syst"},{"key":"26_CR4","unstructured":"Chivers H (2003) Grid security: problems and potential solutions. In UK e-science programme, March 2003. http:\/\/www.cs.york.ac.uk\/ftpdir\/reports\/YCS-2003-354.pdf. Accessed 6th Aug 2008"},{"key":"26_CR5","unstructured":"Cornwall L, Jensen J, Kelsey D, McNab A (2003) EU datagrid and gridPP authorization and access control. In Proceedings of the UK e-Science All Hands Meeting 2003, pp 382\u2013384, EPSRC"},{"key":"26_CR6","doi-asserted-by":"crossref","unstructured":"Demchenko Y, Gommans L, Tokmakoff A, van Buuren R (2006) Policy based access control in dynamic grid-based collaborative environment. Proceedings of the International Symposium on Collaborative Technologies and Systems (CTS), pp 64\u201373","DOI":"10.1109\/CTS.2006.59"},{"key":"26_CR7","doi-asserted-by":"publisher","first-page":"269","DOI":"10.1007\/BF01386390","volume":"1","author":"EW Dijkstra","year":"1959","unstructured":"Dijkstra EW (1959) A note on two problems in connexion with graphs. Numer Math 1:269\u2013271","journal-title":"Numer Math"},{"issue":"3","key":"26_CR8","doi-asserted-by":"publisher","first-page":"200","DOI":"10.1177\/109434200101500302","volume":"15","author":"I Foster","year":"2001","unstructured":"Foster I, Kesselman C, Tuecke S (2001) The anatomy of the grid: enabling scalable virtual organizations. Int J Supercomput Appl 15(3):200\u2013222","journal-title":"Int J Supercomput Appl"},{"issue":"3","key":"26_CR9","doi-asserted-by":"publisher","first-page":"644","DOI":"10.1109\/JPROC.2004.842776","volume":"93","author":"M Humphrey","year":"2005","unstructured":"Humphrey M, Thompson MR, Jackson KR (2005) Security for grids. Proc IEEE 93(3):644\u2013652","journal-title":"Proc IEEE"},{"key":"26_CR10","unstructured":"Iamnitchi A, Foster I, Nurmi DC (2002) A peer-to-peer approach to resource location in grid environments. In Proceedings of the 11th Symposium on High Performance Distributed Computing, Edinburgh, UK"},{"key":"26_CR11","unstructured":"JISC (2006) Shibboleth: connecting people to resources. http:\/\/www.jisc.ac.uk\/uploaded_documents\/JISC-BP-Shibboleth.pdf. Accessed 6th Aug 2008"},{"key":"26_CR12","doi-asserted-by":"crossref","unstructured":"Lang, B, Foster I, Siebenlist F, Ananthakrishnan R, Freeman T (2006) A multipolicy authorization framework for grid security. Proceedings of the Fifth IEEE International Symposium on Network Computing and Applications, pp 269\u2013272","DOI":"10.1109\/NCA.2006.4"},{"issue":"4","key":"26_CR13","first-page":"12","volume":"27","author":"RL Morgan","year":"2004","unstructured":"Morgan RL, Cantor S, Carmody S, Hoehn W, Klingenstein K (2004) Federated security: the shibboleth approach. EDUCASE Quarterly 27(4):12\u201317","journal-title":"EDUCASE Quarterly"},{"key":"26_CR14","unstructured":"Pearlman L, Kesselman C, Welch V, Foster I, Tuecke S (2003) The community authorization service: status and future. In Proceedings of International Conference for Computing in High Energy and Nuclear Physics"},{"key":"26_CR15","first-page":"90","volume-title":"Ad hoc on-demand distance vector routing. In Proceedings of the 2nd IEEE workshop on mobile computing systems and applications","author":"CE Perkins","year":"1999","unstructured":"Perkins CE, Royer EM (1999) Ad hoc on-demand distance vector routing. In Proceedings of the 2nd IEEE workshop on mobile computing systems and applications. New Orleans, LA, USA, pp 90\u2013100"},{"key":"26_CR16","doi-asserted-by":"crossref","unstructured":"Pouchard L, Cinquini L, Drach B, Middleton D, Bernholdt D, Chanchio K, Foster I, Nefedova V, Brown D, Fox P, Garcia J, Strand G, Williams D, Chervenak A, Kesselman C, Shoshani A, Sim A (2003) An ontology for scientific information in a grid environment: the earth system Grid. In: Proceedings 3rd IEEE\/ACM International Symposium on Cluster Computing and the Grid CCG 2003, pp 626\u2013632","DOI":"10.1109\/CCGRID.2003.1199424"},{"key":"26_CR17","unstructured":"SIMDAT (2004a) D 19.1.2 Report on consolidated technology prototypes for Virtual Organisations and Ontologies. http:\/\/www.ecmwf.int\/services\/grid\/simdat\/wiki\/do\/get\/documents Accessed 8th September 2008"},{"key":"26_CR18","unstructured":"SIMDAT (2004b) D.18.1.1 Consolidated Meteorology Requirements. In Grid based Systems for solving complex problems\u2014SIMDAT Project. http:\/\/www.scai.fraunhofer.de\/fileadmin\/images\/nuso\/SIMDAT\/SIMDAT_D.18.1.1_public.pdf. Accessed 4th Aug 2008"},{"key":"26_CR19","doi-asserted-by":"crossref","unstructured":"Sinnott RO, Chadwick DW, Koetsier J, Otenko O, Watt JP, Nguyen TA (2006a) Supporting decentralized, security focused dynamic virtual organizations across the grid. In Proceedings of the Second IEEE International Conference on e-Science and Grid Computing (e-Science\u201906)","DOI":"10.1109\/E-SCIENCE.2006.261106"},{"key":"26_CR20","doi-asserted-by":"publisher","first-page":"555","DOI":"10.1007\/978-0-387-38269-2_58","volume-title":"Network-Centric collaboration and supporting frameworks, vol 224","author":"RO Sinnott","year":"2006b","unstructured":"Sinnott RO, Ajayi O, Stell AJ, Watt J, Jiang J, Koetsier J (2006b) Single sing-on and authorization for dynamic virtual organizations. In: Camarinha-Matos LM, Afsarmanesh H, Ollus M (eds) Network-Centric collaboration and supporting frameworks, vol 224. Springer, Boston, pp 555\u2013564"},{"issue":"2","key":"26_CR21","first-page":"282","volume":"40","author":"D Snelling","year":"2004","unstructured":"Snelling D, van den Berghe S, Qian Li V (2004) Explicit trust delegation: security for dynamic grids. FUJITSU Sci Tech J 40(2):282\u2013294","journal-title":"FUJITSU Sci Tech J"},{"key":"26_CR22","doi-asserted-by":"crossref","unstructured":"Welch V, Siebenlist F, Foster I, Bresnahan J, Czajkowski K, Gawor J, Kesselman C, Meder S, Pearlman Laura, Tuecke S (2003) Security for grid services. High performance distributed computing, 2003. In Proceedings. 12th IEEE International Symposium, pp 48\u201357","DOI":"10.1109\/HPDC.2003.1210015"},{"key":"26_CR23","unstructured":"Welch V, Barton T, Keahey K, Siebenlist F (2005) Attributes, anonymity, and access: shibboleth and globus integration to facilitate grid collaboration. In Proceedings of the 4th Annual PKI R&D Workshop: Multiple paths to trust, April 2005, pp 15\u201315"}],"container-title":["Earth Science Informatics"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12145-009-0026-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12145-009-0026-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12145-009-0026-7.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12145-009-0026-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,8,31]],"date-time":"2021-08-31T20:33:05Z","timestamp":1630441985000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12145-009-0026-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,5,5]]},"references-count":23,"journal-issue":{"issue":"1-2","published-print":{"date-parts":[[2009,6]]}},"alternative-id":["26"],"URL":"https:\/\/doi.org\/10.1007\/s12145-009-0026-7","relation":{},"ISSN":["1865-0473","1865-0481"],"issn-type":[{"value":"1865-0473","type":"print"},{"value":"1865-0481","type":"electronic"}],"subject":[],"published":{"date-parts":[[2009,5,5]]},"assertion":[{"value":"12 September 2008","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"15 April 2009","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"5 May 2009","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}