{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T04:29:29Z","timestamp":1729657769887,"version":"3.28.0"},"reference-count":29,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1109\/hpdc.2005.1520963","type":"proceedings-article","created":{"date-parts":[[2005,10,24]],"date-time":"2005-10-24T18:41:07Z","timestamp":1130179267000},"page":"211-221","source":"Crossref","is-referenced-by-count":1,"title":["411 on scalable password service"],"prefix":"10.1109","author":[{"given":"F.D.","family":"Sacerdoti","sequence":"first","affiliation":[]},{"given":"M.J.","family":"Katz","sequence":"additional","affiliation":[]},{"given":"P.M.","family":"Papadopoulos","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1145\/1124153.1124155"},{"key":"17","first-page":"309","article-title":"A site configuration engine","volume":"8","author":"burgess","year":"1995","journal-title":"USENIX Computing Systems"},{"key":"18","article-title":"On distributed agreement for clusters","volume":"tr 2004 1","author":"sacerdoti","year":"2004","journal-title":"SDSC Technical Report"},{"key":"15","article-title":"A directory service for configuring high performance distributed computations","author":"fritzgerald","year":"1997","journal-title":"Proc 5th IEEE Symp on High Performance Distributed Computing"},{"year":"0","key":"16"},{"key":"13","article-title":"The Kerberos network authentication service (version 5)","author":"kohl","year":"1993","journal-title":"Internet Engineering Task Force RFC-1510"},{"key":"14","article-title":"Lightweight directory access protocol","volume":"2251","author":"yeong","year":"1997","journal-title":"Internet Engineering Task Force RFC"},{"key":"11","article-title":"System administration guide: Naming and Directory Services (DNS, NIS, and LDAP)","volume":"817","year":"2003","journal-title":"Sun Documentation #817-2655"},{"key":"12","article-title":"System administration guide: Naming and directory services (NIS+)","volume":"816","year":"2005","journal-title":"Sun Documentation #816-4558"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1109\/CLUSTR.2003.1253327"},{"key":"20","article-title":"The TLS protocol, version 1.0","volume":"2246","author":"dierks","year":"1999","journal-title":"Internet Engineering Task Force RFC"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1976.1055638"},{"journal-title":"OpenSSL The Open Source Toolkit for SSL\/TLS","year":"0","key":"23"},{"key":"24","article-title":"OpenPGP message format","volume":"2440","author":"callas","year":"1998","journal-title":"Internet Engineering Task Force RFC"},{"journal-title":"The Python Cryptography Toolkit","year":"0","key":"25"},{"journal-title":"The Rockstar Cluster","year":"0","key":"26"},{"journal-title":"The Ganglia Distributed Monitoring System Design Implementation and Experience","year":"2003","author":"massie","key":"27"},{"key":"28","doi-asserted-by":"crossref","first-page":"1414","DOI":"10.1109\/INFCOM.1996.493090","article-title":"RMTP: A reliable multicast transport protocol","author":"lin","year":"1996","journal-title":"Proceedings of IEEE Infocom"},{"key":"29","doi-asserted-by":"publisher","DOI":"10.1145\/144179.144275"},{"journal-title":"Distributed Algorithms","year":"1996","author":"lynch","key":"3"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/CCGRID.2001.923207"},{"journal-title":"The Rocks Cluster Register","year":"0","key":"10"},{"key":"1","article-title":"The rsync algorithm","author":"tridgell","year":"1998","journal-title":"Technical Report"},{"journal-title":"Managing NFS and NIS","year":"1991","author":"stern","key":"7"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1145\/141809.141811"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1145\/65950.65956"},{"key":"4","doi-asserted-by":"crossref","first-page":"707","DOI":"10.1002\/cpe.722","article-title":"NPACI Rocks: Tools and techniques for easily deploying manageable Linux clusters","volume":"15","author":"papadopoulos","year":"2002","journal-title":"Concurrency and Computation Practice and Experience"},{"key":"9","article-title":"The Kerberos network authentication service (version 5)","volume":"1510","author":"kohl","year":"1993","journal-title":"Internet Engineering Task Force RFC"},{"key":"8","article-title":"System administration guide: Security services","volume":"817","year":"2003","journal-title":"Sun Documentation #817-0365"}],"event":{"name":"HPDC-14. 14th IEEE International Symposium on High Performance Distributed Computing, 2005.","location":"Research Triangle Park, NC, USA"},"container-title":["HPDC-14. Proceedings. 14th IEEE International Symposium on High Performance Distributed Computing, 2005."],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/10194\/32533\/01520963.pdf?arnumber=1520963","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,17]],"date-time":"2017-06-17T00:22:09Z","timestamp":1497658929000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1520963\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"references-count":29,"URL":"https:\/\/doi.org\/10.1109\/hpdc.2005.1520963","relation":{},"subject":[]}}