{"id":"https://openalex.org/W1484202666","doi":"https://doi.org/10.1109/scc.2004.1358019","title":"Enhancing grid security with trust management","display_name":"Enhancing grid security with trust management","publication_year":2004,"publication_date":"2004-12-23","ids":{"openalex":"https://openalex.org/W1484202666","doi":"https://doi.org/10.1109/scc.2004.1358019","mag":"1484202666"},"language":"en","primary_location":{"id":"doi:10.1109/scc.2004.1358019","is_oa":false,"landing_page_url":"https://doi.org/10.1109/scc.2004.1358019","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE International Conference onServices Computing, 2004. (SCC 2004). Proceedings. 2004","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5113732766","display_name":"Ching Lin","orcid":"https://orcid.org/0009-0003-4077-8271"},"institutions":[{"id":"https://openalex.org/I99043593","display_name":"Macquarie University","ror":"https://ror.org/01sf06y89","country_code":"AU","type":"education","lineage":["https://openalex.org/I99043593"]}],"countries":["AU"],"is_corresponding":true,"raw_author_name":"Ching Lin","raw_affiliation_strings":["Department of Computing, Macquarie University, Sydney, NSW, Australia"],"affiliations":[{"raw_affiliation_string":"Department of Computing, Macquarie University, Sydney, NSW, Australia","institution_ids":["https://openalex.org/I99043593"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5029458848","display_name":"Vijay Varadharajan","orcid":"https://orcid.org/0000-0002-3621-9114"},"institutions":[{"id":"https://openalex.org/I99043593","display_name":"Macquarie University","ror":"https://ror.org/01sf06y89","country_code":"AU","type":"education","lineage":["https://openalex.org/I99043593"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"V. Varadharajan","raw_affiliation_strings":["Department of Computing, Macquarie University, Sydney, NSW, Australia","Dept. of Comput., Macquarie Univ., North Ryde, NSW, Australia"],"affiliations":[{"raw_affiliation_string":"Department of Computing, Macquarie University, Sydney, NSW, Australia","institution_ids":["https://openalex.org/I99043593"]},{"raw_affiliation_string":"Dept. of Comput., Macquarie Univ., North Ryde, NSW, Australia","institution_ids":["https://openalex.org/I99043593"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100322712","display_name":"Yan Wang","orcid":"https://orcid.org/0000-0002-5344-1884"},"institutions":[{"id":"https://openalex.org/I99043593","display_name":"Macquarie University","ror":"https://ror.org/01sf06y89","country_code":"AU","type":"education","lineage":["https://openalex.org/I99043593"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Yan Wang","raw_affiliation_strings":["Department of Computing, Macquarie University, Sydney, NSW, Australia"],"affiliations":[{"raw_affiliation_string":"Department of Computing, Macquarie University, Sydney, NSW, Australia","institution_ids":["https://openalex.org/I99043593"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5002409125","display_name":"V. Pruthi","orcid":null},"institutions":[{"id":"https://openalex.org/I154851008","display_name":"Indian Institute of Technology Roorkee","ror":"https://ror.org/00582g326","country_code":"IN","type":"education","lineage":["https://openalex.org/I154851008"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"V. Pruthi","raw_affiliation_strings":["Department of Electronics and Computer Engineering, Indian Institute of Technology, Roorkee, India","Indian Institute of Technology Roorkee, India"],"affiliations":[{"raw_affiliation_string":"Department of Electronics and Computer Engineering, Indian Institute of Technology, Roorkee, India","institution_ids":["https://openalex.org/I154851008"]},{"raw_affiliation_string":"Indian Institute of Technology Roorkee, India","institution_ids":["https://openalex.org/I154851008"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5113732766"],"corresponding_institution_ids":["https://openalex.org/I99043593"],"apc_list":null,"apc_paid":null,"fwci":5.5621,"has_fulltext":false,"cited_by_count":91,"citation_normalized_percentile":{"value":0.96089872,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"303","last_page":"310"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10715","display_name":"Distributed and Parallel Computing Systems","score":0.996399998664856,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10715","display_name":"Distributed and Parallel Computing Systems","score":0.996399998664856,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9962999820709229,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T10772","display_name":"Distributed systems and fault tolerance","score":0.9402999877929688,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computational-trust","display_name":"Computational trust","score":0.8241404294967651},{"id":"https://openalex.org/keywords/trust-management","display_name":"Trust management (information system)","score":0.8016910552978516},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7699661254882812},{"id":"https://openalex.org/keywords/grid","display_name":"Grid","score":0.6550378203392029},{"id":"https://openalex.org/keywords/grid-computing","display_name":"Grid computing","score":0.6369028687477112},{"id":"https://openalex.org/keywords/trust-anchor","display_name":"Trust anchor","score":0.6185599565505981},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6177245378494263},{"id":"https://openalex.org/keywords/architecture","display_name":"Architecture","score":0.5166521668434143},{"id":"https://openalex.org/keywords/computer-security-model","display_name":"Computer security model","score":0.5013225078582764},{"id":"https://openalex.org/keywords/security-information-and-event-management","display_name":"Security information and event management","score":0.44542258977890015},{"id":"https://openalex.org/keywords/semantic-grid","display_name":"Semantic grid","score":0.4220723509788513},{"id":"https://openalex.org/keywords/security-management","display_name":"Security management","score":0.4204517900943756},{"id":"https://openalex.org/keywords/cloud-computing-security","display_name":"Cloud computing security","score":0.3719902038574219},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.11084768176078796},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.09860029816627502}],"concepts":[{"id":"https://openalex.org/C160521178","wikidata":"https://www.wikidata.org/wiki/Q5157345","display_name":"Computational trust","level":3,"score":0.8241404294967651},{"id":"https://openalex.org/C2776384856","wikidata":"https://www.wikidata.org/wiki/Q17145767","display_name":"Trust management (information system)","level":2,"score":0.8016910552978516},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7699661254882812},{"id":"https://openalex.org/C187691185","wikidata":"https://www.wikidata.org/wiki/Q2020720","display_name":"Grid","level":2,"score":0.6550378203392029},{"id":"https://openalex.org/C70429105","wikidata":"https://www.wikidata.org/wiki/Q249999","display_name":"Grid computing","level":3,"score":0.6369028687477112},{"id":"https://openalex.org/C154800190","wikidata":"https://www.wikidata.org/wiki/Q16941470","display_name":"Trust anchor","level":4,"score":0.6185599565505981},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6177245378494263},{"id":"https://openalex.org/C123657996","wikidata":"https://www.wikidata.org/wiki/Q12271","display_name":"Architecture","level":2,"score":0.5166521668434143},{"id":"https://openalex.org/C121822524","wikidata":"https://www.wikidata.org/wiki/Q5157582","display_name":"Computer security model","level":2,"score":0.5013225078582764},{"id":"https://openalex.org/C103377522","wikidata":"https://www.wikidata.org/wiki/Q3493999","display_name":"Security information and event management","level":4,"score":0.44542258977890015},{"id":"https://openalex.org/C103692084","wikidata":"https://www.wikidata.org/wiki/Q1765824","display_name":"Semantic grid","level":3,"score":0.4220723509788513},{"id":"https://openalex.org/C83163435","wikidata":"https://www.wikidata.org/wiki/Q3954104","display_name":"Security management","level":2,"score":0.4204517900943756},{"id":"https://openalex.org/C184842701","wikidata":"https://www.wikidata.org/wiki/Q370563","display_name":"Cloud computing security","level":3,"score":0.3719902038574219},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.11084768176078796},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.09860029816627502},{"id":"https://openalex.org/C144024400","wikidata":"https://www.wikidata.org/wiki/Q21201","display_name":"Sociology","level":0,"score":0.0},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C153349607","wikidata":"https://www.wikidata.org/wiki/Q36649","display_name":"Visual arts","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C48798503","wikidata":"https://www.wikidata.org/wiki/Q877546","display_name":"Reputation","level":2,"score":0.0},{"id":"https://openalex.org/C142362112","wikidata":"https://www.wikidata.org/wiki/Q735","display_name":"Art","level":0,"score":0.0},{"id":"https://openalex.org/C36289849","wikidata":"https://www.wikidata.org/wiki/Q34749","display_name":"Social science","level":1,"score":0.0},{"id":"https://openalex.org/C2129575","wikidata":"https://www.wikidata.org/wiki/Q54837","display_name":"Semantic Web","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/scc.2004.1358019","is_oa":false,"landing_page_url":"https://doi.org/10.1109/scc.2004.1358019","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE International Conference onServices Computing, 2004. (SCC 2004). Proceedings. 2004","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":25,"referenced_works":["https://openalex.org/W1505128236","https://openalex.org/W1540163902","https://openalex.org/W1541355693","https://openalex.org/W1599126799","https://openalex.org/W1989163006","https://openalex.org/W2100107987","https://openalex.org/W2110689325","https://openalex.org/W2121743635","https://openalex.org/W2130280511","https://openalex.org/W2132552077","https://openalex.org/W2141168497","https://openalex.org/W2146660676","https://openalex.org/W2154010459","https://openalex.org/W2167164511","https://openalex.org/W2340406763","https://openalex.org/W2439240014","https://openalex.org/W2557406161","https://openalex.org/W2782885640","https://openalex.org/W2797148637","https://openalex.org/W4285719527","https://openalex.org/W4301347335","https://openalex.org/W6630218232","https://openalex.org/W6674790463","https://openalex.org/W6718339961","https://openalex.org/W6730445751"],"related_works":["https://openalex.org/W4243605140","https://openalex.org/W2495963281","https://openalex.org/W4385687966","https://openalex.org/W2167620197","https://openalex.org/W2509590646","https://openalex.org/W2940914837","https://openalex.org/W2170496240","https://openalex.org/W2916013893","https://openalex.org/W2300110045","https://openalex.org/W2075589527"],"abstract_inverted_index":{"Recently,":[0],"trust":[1,16,20,27,37,49,55,61,74,89,103,108],"has":[2],"been":[3],"recognized":[4],"as":[5,113],"an":[6,132],"important":[7],"factor":[8],"for":[9,19,48,54,93,137],"grid":[10,22,43,69,138],"computing":[11,139],"security.":[12],"We":[13,78],"develop":[14],"a":[15,25,42],"management":[17,104],"architecture":[18,121],"enhanced":[21,75,90],"security":[23,70,76,91,117,136],"incorporating":[24],"novel":[26],"model":[28],"which":[29],"is":[30],"capable":[31],"of":[32,36,59,115,135],"capturing":[33],"various":[34],"types":[35],"relationships":[38],"that":[39,127],"exist":[40],"in":[41],"system":[44,71],"and":[45,52,96,110],"providing":[46],"mechanisms":[47],"evaluation,":[50],"recommendations":[51],"update":[53],"decisions.":[56],"The":[57],"outcomes":[58],"the":[60,68,88,101,116,119],"decisions":[62],"can":[63,86],"then":[64],"be":[65],"employed":[66],"by":[67],"to":[72,82,130],"formulate":[73],"solutions.":[77],"design":[79],"several":[80,123],"algorithms":[81],"demonstrate":[83],"how":[84],"one":[85],"derive":[87],"solutions":[92],"both":[94],"user":[95],"resource":[97],"provider":[98],"protection":[99],"with":[100],"proposed":[102,120],"architecture.":[105],"Leveraging":[106],"on":[107],"knowledge":[109],"forming":[111],"it":[112,129],"part":[114],"decisions,":[118],"possesses":[122],"desirable":[124],"emerging":[125],"properties":[126],"enable":[128],"provide":[131],"improved":[133],"level":[134],"systems.":[140]},"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":2},{"year":2018,"cited_by_count":2},{"year":2017,"cited_by_count":1},{"year":2016,"cited_by_count":1},{"year":2015,"cited_by_count":9},{"year":2014,"cited_by_count":3},{"year":2013,"cited_by_count":6},{"year":2012,"cited_by_count":4}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
