{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T17:07:38Z","timestamp":1729616858942,"version":"3.28.0"},"reference-count":38,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2007]]},"DOI":"10.1109\/seccom.2007.4550332","type":"proceedings-article","created":{"date-parts":[[2008,6,25]],"date-time":"2008-06-25T18:08:16Z","timestamp":1214417296000},"page":"199-205","source":"Crossref","is-referenced-by-count":0,"title":["Platform to enforce multiple access control policy in grid hosting environment"],"prefix":"10.1109","author":[{"given":"Leonardo","family":"Mattes","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Leonardo C.","family":"Militelli","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Joao Antonio","family":"Zuffo","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"263","reference":[{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1145\/581571.581573"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/HPDC.2003.1210015"},{"key":"ref32","article-title":"SensorGrid: Integrating Sensor Networks and Grid Computing","author":"tham","year":"2005","journal-title":"Special Issue on Grid Computing Computer Society of India"},{"key":"ref31","article-title":"Guide to LCAS, Version 1.1.16","author":"steenbakkers","year":"2003","journal-title":"Documentation of the European DataGrid Project"},{"journal-title":"The de facto Standard for Intrusion Detection\/Prevention","year":"2006","author":"snort","key":"ref30"},{"year":"0","key":"ref37"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/NCA.2006.4"},{"journal-title":"eXtensible Access Control Markup Language (XACML) Version 2 0","year":"2005","key":"ref35"},{"key":"ref34","article-title":"Attributes, Anonymity, and Access: Shibboleth and Globus Integration to Facilitate Grid Collaboration","author":"welch","year":"2005","journal-title":"Proceedings of the 4th annual PKI R&D Workshop"},{"journal-title":"International Grid Policy Management Authority","year":"2005","key":"ref10"},{"key":"ref11","first-page":"135","article-title":"Using the Java Sandbox for Resource Control","author":"herzog","year":"2005","journal-title":"7th Nordic Workshop on Secure IT Systems"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2004.842776"},{"key":"ref13","article-title":"Dynamic Creation and Management of Runtime Environments in the Grid","author":"keahey","year":"2004","journal-title":"Workshop on Designing and Building Web Services (GGF9)"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/s10723-004-5408-y"},{"key":"ref15","article-title":"Access Control Platform for Submitted Jobs in Communication","author":"mattes","year":"2006","journal-title":"Network and Information Security (CNIS 2006)"},{"journal-title":"Proposta de um agente de aplica&#x00E7;&#x00E3;o para detec&#x00E7;&#x00E3;o preven&#x00E7;&#x00E3;o e conten&#x00E7;&#x00E3;o de ataques em ambientes computacionais&#x201D;","year":"2006","author":"militelli","key":"ref16"},{"key":"ref17","article-title":"Grid-Based Access Control and User Management for Unix Environments, Filesystems, Web Sites and Virtual Organizations","author":"mcnab","year":"2003","journal-title":"CHEP 2003"},{"key":"ref18","first-page":"442","article-title":"A Framework for Supporting Distributed Access Control Policies","author":"meinel","year":"2005","journal-title":"10th IEEE Symposium on Computers and Communications (ISCC'05)"},{"journal-title":"Grid Resource Management State of the Art and Future Trends","year":"2003","author":"nabrzyski","key":"ref19"},{"journal-title":"Assertions and Protocols for the OASIS Security Assertion Markup Language (SAML) Version 2 0","year":"2005","key":"ref28"},{"journal-title":"The WS-Resource Framework","year":"2004","author":"czajkowski","key":"ref4"},{"journal-title":"Prelude 0 9 Handbook","year":"2006","key":"ref27"},{"key":"ref3","article-title":"Virtual enterprise access control requirements","author":"coetzee","year":"2003","journal-title":"South African Institute of Computer Scientists and Information Technologists (SAICSIT)"},{"key":"ref6","article-title":"RFC4765: The Intrusion Detection Message Exchange Format (IDMEF)","author":"debar","year":"2006","journal-title":"IETF"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/ICNICONSMCL.2006.15"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ISSPIT.2005.1577155"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/1028493.1028496"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/S1389-1286(98)00017-6"},{"key":"ref2","article-title":"Operating System Support for Planetary-Scale Network Services","author":"bavier","year":"2004","journal-title":"NSDI'04"},{"key":"ref9","first-page":"2","article-title":"Globus Toolkit Version 4: Software for Service-Oriented Systems","author":"foster","year":"2005","journal-title":"IFIP International Conference on Network and Parallel Computing Springer-Verlag LNCS 3779"},{"journal-title":"Java platform for creating and deploying web services applications","year":"2006","key":"ref1"},{"journal-title":"A Comparison of the Akenti and PERMIS Authorization Infrastructures","year":"2003","author":"otenko","key":"ref20"},{"key":"ref22","doi-asserted-by":"crossref","first-page":"844","DOI":"10.1109\/APCC.2003.1274479","article-title":"Supporting interoperability to heterogeneous IDS in secure networking framework","volume":"2","author":"park","year":"2003","journal-title":"The 9th Asia-Pacific Conference on Communications"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/E-SCIENCE.2006.261113"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2006.26"},{"key":"ref23","article-title":"The Community Authorization Service: Status and Future","author":"pearlman","year":"2003","journal-title":"Computing in High Energy and Nuclear Physics"},{"journal-title":"Snort-IDMEF plug-in","year":"2006","author":"poppi","key":"ref26"},{"journal-title":"Java 2 Network Security","year":"2005","author":"pistoia","key":"ref25"}],"event":{"name":"2007 3rd International Conference on Security and Privacy in Communications Networks and the Workshops - SecureComm 2007","start":{"date-parts":[[2007,9,17]]},"location":"Nice, France","end":{"date-parts":[[2007,9,21]]}},"container-title":["2007 Third International Conference on Security and Privacy in Communications Networks and the Workshops - SecureComm 2007"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4543879\/4550291\/04550332.pdf?arnumber=4550332","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,18]],"date-time":"2017-06-18T09:26:30Z","timestamp":1497777990000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/4550332\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007]]},"references-count":38,"URL":"https:\/\/doi.org\/10.1109\/seccom.2007.4550332","relation":{},"subject":[],"published":{"date-parts":[[2007]]}}}