{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T17:53:27Z","timestamp":1730224407835,"version":"3.28.0"},"reference-count":21,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1109\/grid.2005.1542765","type":"proceedings-article","created":{"date-parts":[[2005,12,10]],"date-time":"2005-12-10T20:49:09Z","timestamp":1134247749000},"page":"6 pp.","source":"Crossref","is-referenced-by-count":10,"title":["Bridging organizational network boundaries on the grid"],"prefix":"10.1109","author":[{"given":"J.","family":"Tan","sequence":"first","affiliation":[]},{"given":"D.","family":"Abramson","sequence":"additional","affiliation":[]},{"given":"C.","family":"Enticott","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","first-page":"121","author":"tanaka","year":"2000","journal-title":"Performance Evaluation of a Firewall-compliant Globus-based Wide-area Cluster System"},{"key":"17","article-title":"GSS-API authentication method for SOCKS version 5","volume":"1961","author":"mcmahon","year":"1996","journal-title":"RFC"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1155\/2002\/757015"},{"key":"15","article-title":"Globus grid and firewalls: Issues and solutions in a utility data center environment","volume":"hpl 2002 278","author":"graupner","year":"2002","journal-title":"Technical Report"},{"journal-title":"SOCKS A Protocol for TCP Proxy Access Across Firewalls","year":"0","author":"lee","key":"16"},{"journal-title":"Overview of the grid security infrastructure (GSI)","year":"0","key":"13"},{"year":"0","key":"14"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1177\/109434200101500302"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1177\/109434209701100205"},{"journal-title":"Globus Toolkit Firewall Requirements","year":"0","author":"welch","key":"21"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/HPDC.1995.518701"},{"year":"0","key":"20"},{"key":"2","first-page":"36","article-title":"Job management in grids of MOSIX clusters","author":"abramson","year":"2003","journal-title":"16th International Conference on Parallel and Distributed Computing Systems"},{"key":"1","article-title":"Proxy chaining and policy implementation in roaming","volume":"2607","author":"aboba","year":"1999","journal-title":"RFC"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1145\/288090.288111"},{"journal-title":"The Condor Project Homepage","year":"0","key":"7"},{"journal-title":"Firewalls and Internet Security Repelling the Wily Hacker","year":"2003","author":"cheswick","key":"6"},{"key":"5","article-title":"A guide to understanding covert channel analysis of trusted systems","volume":"ncsc tg 30","year":"1993","journal-title":"Technical Report"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/HPC.2000.846563"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/APSEC.2002.1182978"},{"journal-title":"Dante A Free SOCKS Implementation","year":"0","key":"8"}],"event":{"name":"The 6th IEEE\/ACM International Workshop on Grid Computing, 2005.","start":{"date-parts":[[2005,11,13]]},"location":"Seattle, WA, USA","end":{"date-parts":[[2005,11,13]]}},"container-title":["The 6th IEEE\/ACM International Workshop on Grid Computing, 2005."],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/10354\/32950\/01542765.pdf?arnumber=1542765","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,10,14]],"date-time":"2020-10-14T15:53:32Z","timestamp":1602690812000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/1542765"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"references-count":21,"URL":"https:\/\/doi.org\/10.1109\/grid.2005.1542765","relation":{},"subject":[],"published":{"date-parts":[[2005]]}}}