{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:30:07Z","timestamp":1750307407927,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":9,"publisher":"ACM","license":[{"start":{"date-parts":[[2010,6,21]],"date-time":"2010-06-21T00:00:00Z","timestamp":1277078400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2010,6,21]]},"DOI":"10.1145\/1851476.1851524","type":"proceedings-article","created":{"date-parts":[[2010,9,22]],"date-time":"2010-09-22T12:04:33Z","timestamp":1285157073000},"page":"336-339","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["Early defense"],"prefix":"10.1145","author":[{"given":"Jan","family":"Wiebelitz","sequence":"first","affiliation":[{"name":"Gottfried Wilhelm Leibniz Universit\u00e4t, Hannover, Germany"}]},{"given":"Michael","family":"Brenner","sequence":"additional","affiliation":[{"name":"Gottfried Wilhelm Leibniz Universit\u00e4t, Hannover, Germany"}]},{"given":"Christopher","family":"Kunz","sequence":"additional","affiliation":[{"name":"Gottfried Wilhelm Leibniz Universit\u00e4t, Hannover, Germany"}]},{"given":"Matthew","family":"Smith","sequence":"additional","affiliation":[{"name":"Gottfried Wilhelm Leibniz Universit\u00e4t, Hannover, Germany"}]}],"member":"320","published-online":{"date-parts":[[2010,6,21]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"OASIS Access Control TC","author":"Control Markup Xtensible Access","year":"2005","unstructured":"}}e Xtensible Access Control Markup Language (XACML) Version 2.0. Technical report , OASIS Access Control TC , February 2005 . }}eXtensible Access Control Markup Language (XACML) Version 2.0. Technical report, OASIS Access Control TC, February 2005."},{"key":"e_1_3_2_1_2_1","first-page":"1","volume-title":"Fremilab White Paper","author":"Chadwick K.","year":"2008","unstructured":"}} K. Chadwick , T. Hesselroth , J. Hover , T. Levshina , J. Packard , V. Sergeev , I. Sfiligoi , J. Weigand , C. L. Joie , A. Ferraro , A. Forti , V. Venturi , J. Bester , F. Siebenlist , and Z. Miller . An XACML Attribute and Obligation Profile for Authorization Interoperability in Grids . Fremilab White Paper , pages 1 -- 41 , 2008 . }}K. Chadwick, T. Hesselroth, J. Hover, T. Levshina, J. Packard, V. Sergeev, I. Sfiligoi, J. Weigand, C. L. Joie, A. Ferraro, A. Forti, V. Venturi, J. Bester, F. Siebenlist, and Z. Miller. An XACML Attribute and Obligation Profile for Authorization Interoperability in Grids. Fremilab White Paper, pages 1--41, 2008."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/POLICY.2009.33"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.5555\/863632.883510"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2004.842776"},{"key":"e_1_3_2_1_6_1","first-page":"279","volume":"2","author":"M.","year":"2005","unstructured":"}} M. Lorch and D. Kafura. The PRIMA Grid Authorization System. Journal of Grid Computing , 2 : 279 -- 298 , M\u00e4rz 2005 . }}M. Lorch and D. Kafura. The PRIMA Grid Authorization System. Journal of Grid Computing, 2:279--298, M\u00e4rz 2005.","journal-title":"Lorch and D. Kafura. The PRIMA Grid Authorization System. Journal of Grid Computing"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.5555\/951948.952037"},{"key":"e_1_3_2_1_8_1","volume-title":"Globus Alliance","author":"Welch V.","year":"2006","unstructured":"}} V. Welch . Globus Toolkit Firewall Requirements. Technical report , Globus Alliance , 2006 . }}V. Welch. Globus Toolkit Firewall Requirements. Technical report, Globus Alliance, 2006."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICNS.2009.35"}],"event":{"name":"HPDC '10: The 19th International Symposium on High Performance Distributed Computing","sponsor":["University of Arizona University of Arizona","SIGARCH ACM Special Interest Group on Computer Architecture"],"location":"Chicago Illinois","acronym":"HPDC '10"},"container-title":["Proceedings of the 19th ACM International Symposium on High Performance Distributed Computing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1851476.1851524","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1851476.1851524","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T11:39:30Z","timestamp":1750246770000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1851476.1851524"}},"subtitle":["enabling attribute-based authorization in Grid firewalls"],"short-title":[],"issued":{"date-parts":[[2010,6,21]]},"references-count":9,"alternative-id":["10.1145\/1851476.1851524","10.1145\/1851476"],"URL":"https:\/\/doi.org\/10.1145\/1851476.1851524","relation":{},"subject":[],"published":{"date-parts":[[2010,6,21]]},"assertion":[{"value":"2010-06-21","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}