{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,3,31]],"date-time":"2022-03-31T14:44:49Z","timestamp":1648737889057},"reference-count":34,"publisher":"Elsevier BV","issue":"1","license":[{"start":{"date-parts":[[2004,1,1]],"date-time":"2004-01-01T00:00:00Z","timestamp":1072915200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Information Security Technical Report"],"published-print":{"date-parts":[[2004,1]]},"DOI":"10.1016\/s1363-4127(04)00016-0","type":"journal-article","created":{"date-parts":[[2004,3,16]],"date-time":"2004-03-16T10:24:03Z","timestamp":1079432643000},"page":"59-76","source":"Crossref","is-referenced-by-count":10,"title":["Virtual organisations in computer grids and identity management"],"prefix":"10.1016","volume":"9","author":[{"given":"Yuri","family":"Demchenko","sequence":"first","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/S1363-4127(04)00016-0_BIB1","series-title":"Grid Computing \u2013 Making the Global Infrastructure a Reality","first-page":"1012","author":"Berman","year":"2003"},{"key":"10.1016\/S1363-4127(04)00016-0_BIB2","first-page":"748","article-title":"The Grid 2: Blueprint for a New Computing Infrastructure","author":"Foster","year":"2003","journal-title":"Elsevier"},{"key":"10.1016\/S1363-4127(04)00016-0_BIB3","unstructured":"Utility Computing - http:\/\/utilitycomputing.itworld.com\/"},{"issue":"3","key":"10.1016\/S1363-4127(04)00016-0_BIB4","article-title":"Anatomy of Grids","volume":"15","author":"Foster","year":"2001","journal-title":"International J. Supercomputer Applications"},{"key":"10.1016\/S1363-4127(04)00016-0_BIB5","unstructured":"Open Grid Services Architecture Working Group - https:\/\/forge.gridforum.org\/projects\/ogsa-wg"},{"key":"10.1016\/S1363-4127(04)00016-0_BIB6","unstructured":"I. Foster, D. Gannon, and H. Kishimoto, The Open Grid Services Architecture, 2003 - https:\/\/forge.gridforum.org\/projects\/ogsa-wg\/document\/draft-ggf-ogsa-spec\/en\/13\/draft-ggf-ogsa-spec.doc"},{"key":"10.1016\/S1363-4127(04)00016-0_BIB7","unstructured":"D. Booth et. al., Web Services Architecture, W3C Working Draft 8 August 2003 - http:\/\/www.w3.org\/TR\/ws-arch\/"},{"key":"10.1016\/S1363-4127(04)00016-0_BIB8","unstructured":"S. Tuecke et. Al., Open Grid Services Infrastructure (OGSI), Version 1.0, June 2003 - http:\/\/forge.gridforum.org\/projects\/ogsi-wg\/document\/Final_OGSI_Specification_V1.0\/en\/1\/Final_OGSI_Specification_V1.0.pdf"},{"key":"10.1016\/S1363-4127(04)00016-0_BIB9","unstructured":"E. Christensen et al, Web Services Description Language (WSDL) 1.1., W3C Note 15 March 2001 - http:\/\/www.w3.org\/TR\/wsdl"},{"key":"10.1016\/S1363-4127(04)00016-0_BIB10","unstructured":"The Globus Alliance, The WS-Resource Framework - http:\/\/www-fp.globus.org\/wsrf\/default.asp"},{"key":"10.1016\/S1363-4127(04)00016-0_BIB11","unstructured":"N. Nagaratnam et al, Security Architecture for Open Grid Services, GGF OGSA Security Workgroup, July 2002 - https:\/\/forge.gridforum.org\/projects\/ogsa-sec-wg\/document\/Security_Architecture_for_Open_Grid_Services\/en\/2\/Security_Architecture_for_Open_Grid_Services.doc"},{"key":"10.1016\/S1363-4127(04)00016-0_BIB12","unstructured":"F. Siebenlist et al, OGSA Security Roadmap, GGF OGSA Security Workgroup, July 2002 - https:\/\/forge.gridforum.org\/projects\/ogsa-sec-wg\/document\/OGSA_Security_Roadmap\/en\/1\/OGSA_Security_Roadmap.doc"},{"key":"10.1016\/S1363-4127(04)00016-0_BIB13","unstructured":"Security Assertion Markup Language (SAML) v1.0, OASIS Standard, 5 November 2002 - http:\/\/www.oasis-open.org\/committees\/documents.php?wg_abbrev=security"},{"key":"10.1016\/S1363-4127(04)00016-0_BIB14","unstructured":"eXtensible Access Control Markup Language (XACML) Version 1.0, OASIS Standard, 18 February 2003 - http:\/\/www.oasis-open.org\/committees\/documents.php?wg_abbrev=xacml"},{"key":"10.1016\/S1363-4127(04)00016-0_BIB15","unstructured":"Liberty Alliance Phase 2 Final Specifications - http:\/\/www.projectliberty.org\/specs\/"},{"key":"10.1016\/S1363-4127(04)00016-0_BIB16","unstructured":"T. Mori, OGSA-WG, Security Use Cases - https:\/\/forge.gridforum.org\/docman2\/ViewProperties.php?group_id=42&category_id=623&document_content_id=1717"},{"key":"10.1016\/S1363-4127(04)00016-0_BIB17","unstructured":"Role Based Access Control (RBAC), NIST, April 2003 - http:\/\/csrc.nist.gov\/rbac\/"},{"key":"10.1016\/S1363-4127(04)00016-0_BIB18","unstructured":"ITU-T Rec. X.812(1995) \u2223 ISO\/IEC 10181-3:1996, Information technology, Open systems interconnection, Security frameworks in open systems: Access control framework."},{"key":"10.1016\/S1363-4127(04)00016-0_BIB19","unstructured":"IBM and Microsoft, Security in a Web Services World: A Proposed Architecture and Roadmap, April 2002 - http:\/\/www-106.ibm.com\/developerworks\/webservices\/library\/ws-secmap\/"},{"key":"10.1016\/S1363-4127(04)00016-0_BIB20","unstructured":"OASIS Web Services Security TC - http:\/\/www.oasis-open.org\/committees\/tc_home.php?wg_abbrev=wss"},{"key":"10.1016\/S1363-4127(04)00016-0_BIB21","unstructured":"IBM and Microsoft, Federation of Identities in a Web Services World, Whitepaper, Version 1.0, July 2003 - http:\/\/msdn.microsoft.com\/ws-federation\/"},{"key":"10.1016\/S1363-4127(04)00016-0_BIB22","unstructured":"S. Bajaj et al, Web Services Federation Language (WS-Federation), Version 1.0, MSDN Library, July 2003 \u2013 http:\/\/msdn.microsoft.com\/ws\/2003\/07\/ws-federation\/"},{"key":"10.1016\/S1363-4127(04)00016-0_BIB23","unstructured":"S. Bajaj et al, WS-Federation: Active Requestor Profile, Version 1.0, MSDN Library, July 2003 - http:\/\/msdn.microsoft.com\/ws\/2003\/07\/ws-active-profile\/"},{"key":"10.1016\/S1363-4127(04)00016-0_BIB24","unstructured":"S. Bajaj et al, WS-Federation: Passive Requestor Profile, Version 1.0, MSDS Library, July 2003 - http:\/\/msdn.microsoft.com\/ws\/2003\/07\/ws-passive-profile\/"},{"key":"10.1016\/S1363-4127(04)00016-0_BIB26","unstructured":"D. Box et al, Web Services Policy Framework (WS-Policy), Version 1.1, MSDN Library, May 2003 - http:\/\/msdn.microsoft.com\/ws\/2002\/12\/Policy\/"},{"key":"10.1016\/S1363-4127(04)00016-0_BIB27","unstructured":"D. Box et al, Web Services Policy Attachment (WS-PolicyAttachment), Version 1.1, MSDN Library, May 2003 \u2013 http:\/\/msdn.microsoft.com\/ws\/2002\/12\/PolicyAttachment"},{"key":"10.1016\/S1363-4127(04)00016-0_BIB30","unstructured":"T. Bellwood, L. Clement, and C. von Riegen (Editors), UDDI Version 3.0.1, UDDI Spec Technical Committee Specification, October 2003 - http:\/\/uddi.org\/pubs\/uddi-v3.0.1-20031014.pdf"},{"key":"10.1016\/S1363-4127(04)00016-0_BIB31","unstructured":"Liberty Alliance Project, Enabled Products. - http:\/\/www.projectliberty.org\/resources\/enabled.html"},{"key":"10.1016\/S1363-4127(04)00016-0_BIB32","unstructured":"Sun Microsystems, Interoperability Prototype for Liberty - http:\/\/wwws.sun.com\/software\/sunone\/identity\/ipl\/"},{"key":"10.1016\/S1363-4127(04)00016-0_BIB33","unstructured":"SourceID: Open Source Federated Identity Management - Liberty Alliance, SAML, and WS-Federation - http:\/\/www.sourceid.org\/"},{"key":"10.1016\/S1363-4127(04)00016-0_BIB34","unstructured":"Ping Identity Corporation. - http:\/\/www.pingidentity.com\/"},{"key":"10.1016\/S1363-4127(04)00016-0_BIB25","unstructured":"G. Della-Libera et al, Web Services Trust Language (WS-Trust), Version 1.0, MSDN Library, December 2002 - http:\/\/msdn.microsoft.com\/ws\/2002\/12\/ws-trust\/"},{"key":"10.1016\/S1363-4127(04)00016-0_BIB28","unstructured":"G. Della-Libera et al, Web Services Security Policy Language (WS-SecurityPolicy). Version 1.0, MSDN Library, December 2002. - http:\/\/msdn.microsoft.com\/ws\/2002\/12\/ws-security-policy\/"},{"key":"10.1016\/S1363-4127(04)00016-0_BIB29","unstructured":"G. Della-Libera et al, Web Services Secure Conversation Language (WS-SecureConversation), Version 1.0, MSDN Library, December 2002. - http:\/\/msdn.microsoft.com\/ws\/2002\/12\/ws-secure-conversation\/"}],"container-title":["Information Security Technical Report"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1363412704000160?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1363412704000160?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2019,2,14]],"date-time":"2019-02-14T16:54:04Z","timestamp":1550163244000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S1363412704000160"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004,1]]},"references-count":34,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2004,1]]}},"alternative-id":["S1363412704000160"],"URL":"https:\/\/doi.org\/10.1016\/s1363-4127(04)00016-0","relation":{},"ISSN":["1363-4127"],"issn-type":[{"value":"1363-4127","type":"print"}],"subject":[],"published":{"date-parts":[[2004,1]]}}}