{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T02:10:45Z","timestamp":1725675045910},"reference-count":33,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,5]]},"DOI":"10.1109\/ccgrid.2014.95","type":"proceedings-article","created":{"date-parts":[[2014,7,29]],"date-time":"2014-07-29T15:21:54Z","timestamp":1406647314000},"page":"445-454","source":"Crossref","is-referenced-by-count":16,"title":["A Credential Store for Multi-tenant Science Gateways"],"prefix":"10.1109","author":[{"given":"Thejaka Amila","family":"Kanewala","sequence":"first","affiliation":[]},{"given":"Suresh","family":"Marru","sequence":"additional","affiliation":[]},{"given":"Jim","family":"Basney","sequence":"additional","affiliation":[]},{"given":"Marlon","family":"Pierce","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Securing Web Services with WS-Security Demystifying WS-Security WS-Policy SAML XML Signature and XML Encryption","year":"2004","author":"rosenberg","key":"19"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1088\/1742-6596\/119\/6\/062007"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.17487\/rfc5246"},{"journal-title":"The oauth2 0 Authorization Protocol 2011","year":"0","author":"hammer-lahav","key":"33"},{"key":"15","doi-asserted-by":"crossref","DOI":"10.1007\/3-540-44681-8_116","article-title":"Unicore: A grid computing environment","author":"erwin","year":"2001","journal-title":"Euro-Par 2001 Parallel Processing"},{"key":"16","article-title":"Condor - A hunter of idle workstations","author":"litzkow","year":"1988","journal-title":"Distributed Computing Systems 1988 8th International Conference on"},{"key":"13","article-title":"Amazon elastic compute cloud (amazon ec2)","author":"amazon","year":"2010","journal-title":"Amazon Elastic Compute Cloud (Amazon EC2)"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1177\/109434209701100205"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1145\/1838574.1838576"},{"year":"2013","key":"12"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1109\/GRID.2005.1542725"},{"key":"20","article-title":"Identity federation and attribute-based authorization through the globus toolkit, shibboleth, gridshib, and myproxy","author":"barton","year":"2006","journal-title":"5th Annual PKI R&D Workshop"},{"journal-title":"AES Advanced Encryption Standard","year":"0","author":"whaley","key":"22"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1145\/2110486.2110490"},{"journal-title":"MySql","year":"2001","author":"mysql","key":"24"},{"journal-title":"Apache derby","year":"2012","key":"25"},{"journal-title":"Binary Large Object","year":"2013","key":"26"},{"journal-title":"Bouncy Castle Crypto APIs","year":"2007","author":"castle","key":"27"},{"year":"2012","author":"yamanaka","key":"28"},{"year":"2013","key":"29"},{"key":"3","doi-asserted-by":"crossref","DOI":"10.1145\/2016741.2016779","article-title":"Molecular parameter optimization gateway (param-chem)","author":"ghosh","year":"2011","journal-title":"Proceedings of the 2011 TeraGrid Conference ACM"},{"key":"2","first-page":"210","article-title":"Ultrascan: A comprehensive data analysis software package for analytical ultracentrifugation experiments","author":"demeler","year":"2005","journal-title":"Modern Analytical Ultracentrifugation Techniques and Methods"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2012.11"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2008.470"},{"key":"30","doi-asserted-by":"publisher","DOI":"10.1145\/286942.286945"},{"key":"7","article-title":"Evolving from teragrid to xsede","author":"towns","year":"2011","journal-title":"Bulletin of the American Physical Society"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.1081"},{"key":"32","doi-asserted-by":"crossref","first-page":"353","DOI":"10.1145\/1368310.1368362","article-title":"Efficient signature schemes supporting redaction, pseudonymization, and data deidentification","author":"haber","year":"2008","journal-title":"Proceedings of the 2008 ACM Symposium on Information Computer and Communications Security ACM"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1145\/2110486.2110495"},{"year":"2013","key":"31"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1007\/s10723-012-9244-1"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1145\/2016741.2016776"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1002\/spe.688"}],"event":{"name":"2014 14th IEEE\/ACM International Symposium on Cluster, Cloud and Grid Computing (CCGrid)","start":{"date-parts":[[2014,5,26]]},"location":"Chicago, IL, USA","end":{"date-parts":[[2014,5,29]]}},"container-title":["2014 14th IEEE\/ACM International Symposium on Cluster, Cloud and Grid Computing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6844760\/6846423\/06846480.pdf?arnumber=6846480","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,4,12]],"date-time":"2022-04-12T23:41:48Z","timestamp":1649806908000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6846480\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,5]]},"references-count":33,"URL":"https:\/\/doi.org\/10.1109\/ccgrid.2014.95","relation":{},"subject":[],"published":{"date-parts":[[2014,5]]}}}