{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T21:50:55Z","timestamp":1730238655823,"version":"3.28.0"},"reference-count":23,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010,7]]},"DOI":"10.1109\/icdim.2010.5662244","type":"proceedings-article","created":{"date-parts":[[2010,12,14]],"date-time":"2010-12-14T15:28:00Z","timestamp":1292340480000},"page":"359-366","source":"Crossref","is-referenced-by-count":1,"title":["2L-RBACG: A new framework for resource access control in grid environments"],"prefix":"10.1109","author":[{"given":"Hakimeh Alemi","family":"Baktash","sequence":"first","affiliation":[]},{"given":"MohammadBagher","family":"Karimi","sequence":"additional","affiliation":[]},{"given":"MohammadReza","family":"Meybodi","sequence":"additional","affiliation":[]},{"given":"Asgarali","family":"Bouyer","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/POLICY.2002.1011293"},{"key":"ref11","article-title":"VOMS, an Authorization System for Virtual Organizations","author":"alfieri","year":"2003","journal-title":"1st European across Grids conference"},{"key":"ref12","article-title":"A Comparison of the Akenti and PERMIS Authorization Infrastructures in Ensuring Security in IT Infrastructures","author":"chadwick","year":"2003","journal-title":"Proceedings of the ITI First International Conference on Information and Communications Technology"},{"key":"ref13","article-title":"Fine-Grained Authorization for Job and Resource Management Using Akenti and the Globus Toolkit&#x00AE;","author":"thompson","year":"2003","journal-title":"Lawrence Berkeley National Laboratory Paper LBNL-54853"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/507729.507732"},{"key":"ref15","article-title":"Managing Dynamic User Communities in a Grid of Autonomous Resources","author":"alfieri","year":"2003","journal-title":"Computing in High Energy and Nuclear Physics"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/HPDC.2003.1210015"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/1180367.1180372"},{"key":"ref18","first-page":"669","article-title":"A New Design Scheme of Role-Based Access Control Based on PKI","volume":"3","author":"deng","year":"2006","journal-title":"Proceeding of the First IEEE International Conference on Innovative Computing Information and Control ICICIC"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/s10723-004-5408-y"},{"key":"ref4","first-page":"77","article-title":"Grid Computing Security","author":"chakrabarti","year":"2007"},{"key":"ref3","article-title":"What is the Grid? A Three Point Checklist","author":"foster","year":"2002","journal-title":"GRIDtoday"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/HASE.2007.29"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/CCGRID.2001.923162"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ccnc08.2007.246"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/2.485845"},{"key":"ref2","first-page":"2","article-title":"The Grid: Blueprint for a New Computing Infrastructure","author":"foster","year":"1999"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1063\/1.1461327"},{"key":"ref9","article-title":"RBAC Policies in XML for X.509 Based Privilege Management","author":"chadwick","year":"2002","journal-title":"Proceedings of the 17th International Information Security Conference"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/CIT.2007.155"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1504\/IJGUC.2005.007061"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/AINA.2007.33"},{"article-title":"Role-Based Access Control for the Open Grid Services Architecture - Data Access and Integration (OGSA-DAI)","year":"2007","author":"pereira","key":"ref23"}],"event":{"name":"2010 Fifth International Conference on Digital Information Management (ICDIM)","start":{"date-parts":[[2010,7,5]]},"location":"Thunder Bay, ON, Canada","end":{"date-parts":[[2010,7,8]]}},"container-title":["2010 Fifth International Conference on Digital Information Management (ICDIM)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5644872\/5662242\/05662244.pdf?arnumber=5662244","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,21]],"date-time":"2017-03-21T05:54:45Z","timestamp":1490075685000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5662244\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,7]]},"references-count":23,"URL":"https:\/\/doi.org\/10.1109\/icdim.2010.5662244","relation":{},"subject":[],"published":{"date-parts":[[2010,7]]}}}