{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T14:35:55Z","timestamp":1725460555629},"reference-count":24,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2007]]},"DOI":"10.1109\/seccom.2007.4550334","type":"proceedings-article","created":{"date-parts":[[2008,6,25]],"date-time":"2008-06-25T18:08:16Z","timestamp":1214417296000},"page":"207-216","source":"Crossref","is-referenced-by-count":2,"title":["Design patterns for secure virtual organization management architecture"],"prefix":"10.1109","author":[{"given":"Angelo","family":"Gaeta","sequence":"first","affiliation":[]},{"given":"Matteo","family":"Gaeta","sequence":"additional","affiliation":[]},{"given":"Alan","family":"Smith","sequence":"additional","affiliation":[]},{"given":"Ivan","family":"Djordjevic","sequence":"additional","affiliation":[]},{"given":"Theo","family":"Dimitrakos","sequence":"additional","affiliation":[]},{"given":"Maurizio","family":"Colombo","sequence":"additional","affiliation":[]},{"given":"Sergio","family":"Miranda","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Core J2EE Patterns Best Practices and Design Strategies","year":"2001","author":"alur","key":"ref10"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/0-387-23757-7_6"},{"journal-title":"Guidelines for Virtual Organizations _ Result of the EU VOSTER Project","year":"0","key":"ref12"},{"journal-title":"D32 1 _ Challenges in Virtual Organisations Management Report on methods for distributed business process management _ Deliverable of the ECOLEAD Project","year":"0","key":"ref13"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1177\/109434200101500302"},{"journal-title":"TrustCom Project","year":"0","key":"ref15"},{"journal-title":"Akogrimo project","year":"0","key":"ref16"},{"journal-title":"The EGEE Project","year":"0","key":"ref17"},{"journal-title":"Open Science Grid","year":"0","key":"ref18"},{"journal-title":"GRASP Project","year":"0","key":"ref19"},{"journal-title":"Patterns Emerging Patterns for Enterprise Grids","year":"0","author":"easton","key":"ref4"},{"journal-title":"NGG3 Future for European Grids GRIDs and Service Oriented Knowledge Utilities","year":"2006","key":"ref3"},{"journal-title":"BEinGRID project website","year":"0","key":"ref6"},{"journal-title":"Design Patterns Elements of Reusable Object-Oriented Software","year":"1995","author":"gamma","key":"ref5"},{"journal-title":"Patterns of Enterprise Application Architecture","year":"2003","author":"fowler","key":"ref8"},{"key":"ref7","article-title":"Service Design Patterns for Computational Grids","author":"rana","year":"2002","journal-title":"Patterns and Skeletons for Parallel and Distributed Computing"},{"key":"ref2","doi-asserted-by":"crossref","DOI":"10.1109\/MC.2002.1009167","article-title":"Grid Services for distributed systems","author":"foster","year":"2002","journal-title":"IEEE Computer"},{"key":"ref1","article-title":"The Physiology of the Grid: An Open Grid Services Architecture for Distributed Systems Integration","author":"foster","year":"2002","journal-title":"Technical Report Globus Alliance"},{"journal-title":"Pattern-Oriented Software Architecture","year":"1996","author":"buschmann","key":"ref9"},{"journal-title":"NextGRID Project","year":"0","key":"ref20"},{"journal-title":"Web Services Coordination Specification","year":"0","key":"ref22"},{"journal-title":"GridTrust Project","year":"0","key":"ref21"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/11552055_43"},{"journal-title":"Web Services Trust Specification","year":"0","key":"ref23"}],"event":{"name":"2007 3rd International Conference on Security and Privacy in Communications Networks and the Workshops - SecureComm 2007","start":{"date-parts":[[2007,9,17]]},"location":"Nice, France","end":{"date-parts":[[2007,9,21]]}},"container-title":["2007 Third International Conference on Security and Privacy in Communications Networks and the Workshops - SecureComm 2007"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4543879\/4550291\/04550334.pdf?arnumber=4550334","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,18]],"date-time":"2017-06-18T09:26:31Z","timestamp":1497777991000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/4550334\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007]]},"references-count":24,"URL":"https:\/\/doi.org\/10.1109\/seccom.2007.4550334","relation":{},"subject":[],"published":{"date-parts":[[2007]]}}}