{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T12:02:26Z","timestamp":1742990546342,"version":"3.40.3"},"publisher-location":"Cham","reference-count":12,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319167657"},{"type":"electronic","value":"9783319167664"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-16766-4_6","type":"book-chapter","created":{"date-parts":[[2015,3,28]],"date-time":"2015-03-28T20:00:49Z","timestamp":1427572849000},"page":"54-61","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Trust-Based Access Control in Storage Middleware Grids: A Reference Framework Proposal to Deploy in the Financial Sector"],"prefix":"10.1007","author":[{"given":"Francisco","family":"Nunes","sequence":"first","affiliation":[]},{"given":"Henrique","family":"O\u2019Neill","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,3,28]]},"reference":[{"key":"6_CR1","unstructured":"Sim, A., Berkeley, L.: Grid, Storage and SRM (2008)"},{"key":"6_CR2","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1145\/1721654.1721672","volume":"53","author":"M Armbrust","year":"2010","unstructured":"Armbrust, M., Fox, A., Griffith, R., Joseph, A.D., Katz, R., Konwinski, A., Lee, G., Patterson, D., Rabkin, A., Stoica, I., Zaharia, M.: A view of cloud computing. Commun. ACM 53, 50\u201358 (2010)","journal-title":"Commun. ACM"},{"key":"6_CR3","first-page":"4","volume":"26","author":"H Erdogmus","year":"2009","unstructured":"Erdogmus, H.: Cloud Computing: Does Nirvana Hide behind the Nebula? IEEE Software 26, 4\u20136 (2009)","journal-title":"IEEE Software"},{"key":"6_CR4","doi-asserted-by":"crossref","unstructured":"Foster, I., Zhao, Y., Raicu, I., Lu, S.: Cloud Computing and Grid Computing 360-Degree Compared. In: 2008 Grid Computing Environments Workshop, pp. 1\u201310 (2008)","DOI":"10.1109\/GCE.2008.4738445"},{"key":"6_CR5","unstructured":"IBM Cloud Computing und Green IT - Ausbildung 2010. 49, 4887246-4887246 (2010)"},{"key":"6_CR6","unstructured":"Andreozzi, S., Forti, A., Magnoni, L., Zappi, R., Pichat, V.B.: Cloud Storage as a new Storage Class: QoS Characterization and Cost Analysis (S3) *, pp. 40127\u201340127 (2008)"},{"key":"6_CR7","unstructured":"Erlenmeyer, M.: Grid and Cloud Computing (2009)"},{"key":"6_CR8","unstructured":"Boursas, L.: Trust-Based Access Control in Federated Environments, vol. 10 (2009)"},{"key":"6_CR9","unstructured":"Marsh, S.: Formalising Trust as a Computational Concept (1994)"},{"key":"6_CR10","doi-asserted-by":"publisher","first-page":"549","DOI":"10.1016\/j.future.2004.10.006","volume":"21","author":"R Alfieri","year":"2005","unstructured":"Alfieri, R., Cecchini, R.: Ciaschini, V., dell\u2019Agnello, L., Frohner, \u00c1., L\u0151rentey, K., Spataro, F.: From gridmap-file to VOMS: managing authorization in a Grid environment. Future Generation Computer Systems 21, 549\u2013558 (2005)","journal-title":"Future Generation Computer Systems"},{"key":"6_CR11","doi-asserted-by":"publisher","first-page":"99","DOI":"10.1007\/s10922-009-9117-5","volume":"17","author":"L Boursas","year":"2009","unstructured":"Boursas, L., Hegering, H.-G., Hommel, W.: Standards and New Technology for Systems and Virtualization Management: A Report on Svm 2008. J. Netw. Syst. Manag. 17, 99\u2013104 (2009)","journal-title":"J. Netw. Syst. Manag."},{"issue":"3","key":"6_CR12","doi-asserted-by":"publisher","first-page":"583","DOI":"10.1016\/j.future.2010.12.006","volume":"28","author":"Dimitrios Zissis","year":"2012","unstructured":"Zissis, Dimitrios, Lekkas, Dimitrios: Addressing cloud computing security issues. Future Generation Computer Systems 28(3), 583\u2013592 (2012)","journal-title":"Future Generation Computer Systems"}],"container-title":["IFIP Advances in Information and Communication Technology","Technological Innovation for Cloud-Based Engineering Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-16766-4_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,29]],"date-time":"2019-05-29T14:09:06Z","timestamp":1559138946000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-16766-4_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319167657","9783319167664"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-16766-4_6","relation":{},"ISSN":["1868-4238","1868-422X"],"issn-type":[{"type":"print","value":"1868-4238"},{"type":"electronic","value":"1868-422X"}],"subject":[],"published":{"date-parts":[[2015]]},"assertion":[{"value":"28 March 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}