{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T14:00:39Z","timestamp":1730210439264,"version":"3.28.0"},"reference-count":37,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1109\/csac.2003.1254344","type":"proceedings-article","created":{"date-parts":[[2004,7,8]],"date-time":"2004-07-08T20:05:44Z","timestamp":1089317144000},"page":"396-405","source":"Crossref","is-referenced-by-count":3,"title":["Differential data protection for dynamic distributed applications"],"prefix":"10.1109","author":[{"given":"P.","family":"Widener","sequence":"first","affiliation":[]},{"given":"K.","family":"Schwan","sequence":"additional","affiliation":[]},{"given":"F.E.","family":"Bustamante","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref33","article-title":"Dynamic allocation of security resources to client-server applications","author":"schneck","year":"1998","journal-title":"IEEE Workshop on Dependable and Real-Time E-Commerce Systems"},{"journal-title":"Schlumberger Limited","year":"0","key":"ref32"},{"key":"ref31","article-title":"The tele-immersive data explorer: A distributed architecture for collaborative interactive visualization of large data-sets","author":"sawant","year":"2000","journal-title":"Proceedings of the Fourth International Immersive Projection Technology Workshop"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/REAL.1997.641293"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/IPDPS.2001.924990"},{"key":"ref36","article-title":"Exploiting temporan and spatial constraints on distributed shared objects","author":"west","year":"1997","journal-title":"Proceedings of the IEEE International Conference on Distributed Computing Systems"},{"key":"ref35","article-title":"Gryphon: An information flow based approach to message brokering","author":"strom","year":"1998","journal-title":"International Symposium on Software Reliability Engineering '98 Fast Abstrac"},{"key":"ref34","article-title":"Toward realizable restricted delegation in computational grids","author":"stoker","year":"2001","journal-title":"Proceedings of European High Performance Computing and Networking (HPCN) 2001"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/IPDPS.2002.1015515"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/CSAC.2002.1176296"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/166117.166134"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/505586.505590"},{"key":"ref14","article-title":"The context toolkit: Aiding the development of context-aware applications","author":"dey","year":"2000","journal-title":"Proceedings of the Workshop on Software Engineering for Wearable and Pervasive Computing"},{"key":"ref15","first-page":"243","article-title":"Event services in high performance systems","volume":"4","author":"eisenhauer","year":"2001","journal-title":"Cluster Computing The Journal of Networks Software Tools and Applications"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2002.1158262"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/HPDC.2000.868641"},{"key":"ref18","article-title":"A flexible security system for metacomputing environments","author":"ferrari","year":"1998","journal-title":"Technical Report CS-98&#x2013;36 Department of Computer Science"},{"key":"ref19","article-title":"Quality of service specification in distributed operating systems design","author":"frolund","year":"1998","journal-title":"Conference on Object-Oriented Technologies and Systems USENIX"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/4434.678828"},{"key":"ref4","article-title":"Digital dynamic telepathology - the virtual micro-scope","author":"afework","year":"1998","journal-title":"Proceedings of the AMIA Annual Fall Symposium"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/POLICY.2002.1011293"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/REAL.1999.818827"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/BF01784241"},{"key":"ref29","article-title":"Quality objects (QuO): Adaptive management and control middleware for end-to-end QoS","author":"rodrigues","year":"2000","journal-title":"OMG's First Workshop on Real-Time and Embedded Distributed Object Computing"},{"key":"ref5","article-title":"A new security model for collaborative environments","author":"agarwal","year":"2003","journal-title":"LBNL-52894"},{"journal-title":"The Active Streams Approach to Adaptive Distributed Applications and Services","year":"2001","author":"bustamante","key":"ref8"},{"key":"ref7","article-title":"Efficient wire formats for high performance computing","author":"bustamante","year":"2000","journal-title":"Proceedings of Supercomputing 2000"},{"journal-title":"The Infosphere Project","year":"0","key":"ref2"},{"key":"ref9","first-page":"327","article-title":"Toward a compelling sensation of telepresence: Demonstrating a portal to a distant (static) office","author":"chen","year":"2000","journal-title":"Proceedings Visualization 2000"},{"journal-title":"The Extensible Markup Language (XML)","year":"0","key":"ref1"},{"article-title":"Keynote address at ARCS","year":"2001","author":"herttwich","key":"ref20"},{"key":"ref22","article-title":"QoS scalability for streamed media delivery","author":"kasic","year":"1999","journal-title":"Technical Report CSE-99&#x2013;011"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/IPDPS.2000.846046"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/HPDC.2001.945187"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/800213.806531"},{"key":"ref26","article-title":"Operational information systems - an example from the airline industry","author":"oleson","year":"2000","journal-title":"Proceedings of the First Workshop on Industrial Experiences with Systems Software (WEISS) 2000"},{"journal-title":"Technical Report","article-title":"Netegrity. S2ML: The xml standard for describing and sharing security services on the internet","year":"2001","key":"ref25"}],"event":{"name":"19th Annual Computer Security Applications Conference, 2003.","location":"Las Vegas, Nevada, USA"},"container-title":["19th Annual Computer Security Applications Conference, 2003. Proceedings."],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/8882\/28060\/01254344.pdf?arnumber=1254344","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,14]],"date-time":"2017-03-14T03:39:14Z","timestamp":1489462754000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1254344\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"references-count":37,"URL":"https:\/\/doi.org\/10.1109\/csac.2003.1254344","relation":{},"subject":[]}}