{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,6]],"date-time":"2026-01-06T13:26:35Z","timestamp":1767705995636,"version":"3.41.2"},"reference-count":20,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2002,7,1]],"date-time":"2002-07-01T00:00:00Z","timestamp":1025481600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2002,7,1]],"date-time":"2002-07-01T00:00:00Z","timestamp":1025481600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Cluster Computing"],"published-print":{"date-parts":[[2002,7]]},"DOI":"10.1023\/a:1015621120332","type":"journal-article","created":{"date-parts":[[2002,12,28]],"date-time":"2002-12-28T19:22:22Z","timestamp":1041103342000},"page":"257-264","source":"Crossref","is-referenced-by-count":18,"title":["Security Implications of Typical Grid Computing Usage Scenarios"],"prefix":"10.1007","volume":"5","author":[{"given":"Marty","family":"Humphrey","sequence":"first","affiliation":[]},{"given":"Mary R.","family":"Thompson","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"5-6","key":"407926_CR1","doi-asserted-by":"crossref","first-page":"583","DOI":"10.1016\/S0167-739X(99)00011-4","volume":"15","author":"S. Chapin","year":"1999","unstructured":"S. Chapin, D. Katramatos, J. Karpovich and A. Grimshaw, Resource management in Legion, Future Generation Computer Systems 15(5-6) (1999) 583\u2013594.","journal-title":"Future Generation Computer Systems"},{"key":"407926_CR2","unstructured":"K. Czajkowski, S. Fitzgerald, I. Foster and C. Kesselman, Grid information services for distributed resource, in: Proc. of the 10th IEEE International Symposium on High-Performance Distributed Computing (HPDC-10) (IEEE Press, August 2001)."},{"key":"407926_CR3","unstructured":"Department of Energy Science Grid, http:\/\/www.itg.lbl.gov\/Grid"},{"key":"407926_CR4","doi-asserted-by":"crossref","unstructured":"T. Dierks and C. Allen, The TLS Protocol - Version 1.0. IETF RFC 2246 (January 1999) work-in-progress.","DOI":"10.17487\/rfc2246"},{"key":"407926_CR5","unstructured":"European EGrid, http:\/\/www.egrid.org"},{"key":"407926_CR6","doi-asserted-by":"crossref","unstructured":"S. Farrell, J. Vollbrecht, P. Calhoun, L. Gommans, G. Gross, B. de Bruijn, C. de Laat, M. Holdrege and D. Spence, AAA Authorization Requirements, RFC 2906, Informational, August 2000, work-inprogress.","DOI":"10.17487\/rfc2906"},{"key":"407926_CR7","doi-asserted-by":"crossref","unstructured":"A. Ferrari, F. Knabe, M. Humphrey, S. Chapin and A. Grimshaw, A flexible security system for metacomputing environments, in: Proc. High Performance Computing and Networking Europe 1999, Amsterdam, April 1999.","DOI":"10.1007\/BFb0100598"},{"issue":"2","key":"407926_CR8","first-page":"115","volume":"11","author":"I. Foster","year":"1997","unstructured":"I. Foster and C. Kesselman, Globus: A metacomputing infrastructure toolkit, International Journal of Supercomputer Applications 11(2) (1997) 115\u2013128.","journal-title":"International Journal of Supercomputer Applications"},{"key":"407926_CR9","doi-asserted-by":"crossref","unstructured":"I. Foster, C. Kesselman, G. Tsudik and S. Tuecke, A security architecture for computational Grids, in: Proc. 5th ACM Conference on Computer and Communications Security Conference (1998) pp. 83-92.","DOI":"10.1145\/288090.288111"},{"key":"407926_CR10","unstructured":"Global Grid Forum, http:\/\/www.gridforum.org\/"},{"issue":"1","key":"407926_CR11","doi-asserted-by":"crossref","first-page":"39","DOI":"10.1145\/242857.242867","volume":"40","author":"A. Grimshaw","year":"1997","unstructured":"A. Grimshaw, W.A. Wulf et al., The Legion vision of a worldwide virtual machine, Communications of the ACM 40(1) (1997) 39\u201345.","journal-title":"Communications of the ACM"},{"key":"407926_CR12","unstructured":"High Energy Physics Data Grid, http:\/\/les.home.cern.ch\/les\/grid\/ welcome.html"},{"key":"407926_CR13","unstructured":"M. Humphrey and M. Thompson, Security implications of typical grid computing usage scenarios, Informational Draft (October 2000), http:\/\/www.gridforum.org\/security\/drafts\/draft-gridforumsecurity-implications-01.pdf."},{"key":"407926_CR14","unstructured":"M. Humphrey and M. Thompson, Security implications of typical grid computing usage scenarios, in: Proc. of the 10th International Symposium on High Performance Distributed Computing (HPDC), San Francisco, CA (7-9 August 2001)."},{"key":"407926_CR15","unstructured":"W.E. Johnston, K. Jackson and S. Talwar, Security Considerations for Computational and Data Grids, in: Proc. of the 10th IEEE Symposium on High Performance Distributed Computing, August 2001."},{"key":"407926_CR16","unstructured":"NASA's Information Power Grid, http:\/\/www.ipg.nasa.gov\/"},{"issue":"9","key":"407926_CR17","doi-asserted-by":"crossref","first-page":"33","DOI":"10.1109\/35.312841","volume":"32","author":"B.C. Neuman","year":"1994","unstructured":"B.C. Neuman and T. Ts'o. Kerberos: An authentication service for computer networks, IEEE Communications Magazine 32(9) (1994) 33\u201338.","journal-title":"IEEE Communications Magazine"},{"key":"407926_CR18","doi-asserted-by":"crossref","unstructured":"C.M. Pancerell, L.A. Rahn and C.L. Yang, The Diesel combustion collaboratory: Combustion researchers collaborating over the Internet, in: Proc. of SC 99, Portland, OR (13-19 November 1999).","DOI":"10.2172\/758327"},{"key":"407926_CR19","doi-asserted-by":"crossref","unstructured":"G. Stoker, B. White, E. Stackpole, T.J. Highley and M. Humphrey, Toward realizable restricted delegation in Computational Grids, in: Proc. of the International Conference on High Performance Computing and Networking Europe (HPCN Europe 2001), Amsterdam, Netherlands (June 2001).","DOI":"10.1007\/3-540-48228-8_4"},{"key":"407926_CR20","doi-asserted-by":"crossref","unstructured":"J. Vollbrecht, P. Calhoun, S. Farrell, L. Gommans, G. Gross, B. de Bruijn, C. de Laat, M. Holdrege and D. Spence, AAA Authorization Application Examples, RFC 2905, Informational (August 2000) workin-progress.","DOI":"10.17487\/rfc2905"}],"container-title":["Cluster Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1023\/A:1015621120332.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1023\/A:1015621120332\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1023\/A:1015621120332.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,12]],"date-time":"2025-07-12T22:14:26Z","timestamp":1752358466000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1023\/A:1015621120332"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2002,7]]},"references-count":20,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2002,7]]}},"alternative-id":["407926"],"URL":"https:\/\/doi.org\/10.1023\/a:1015621120332","relation":{},"ISSN":["1386-7857","1573-7543"],"issn-type":[{"type":"print","value":"1386-7857"},{"type":"electronic","value":"1573-7543"}],"subject":[],"published":{"date-parts":[[2002,7]]}}}