{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T17:00:30Z","timestamp":1729616430146,"version":"3.28.0"},"reference-count":13,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008,8]]},"DOI":"10.1109\/chinagrid.2008.52","type":"proceedings-article","created":{"date-parts":[[2008,9,17]],"date-time":"2008-09-17T11:24:51Z","timestamp":1221650691000},"page":"167-173","source":"Crossref","is-referenced-by-count":0,"title":["An Authentic Measurement Mechanism of Service for Trusted Grid"],"prefix":"10.1109","author":[{"given":"Yunfa","family":"Li","sequence":"first","affiliation":[]},{"given":"Xiangha","family":"Xu","sequence":"additional","affiliation":[]},{"given":"Jian","family":"Wan","sequence":"additional","affiliation":[]},{"given":"Hai","family":"Jin","sequence":"additional","affiliation":[]},{"given":"Zongfen","family":"Han","sequence":"additional","affiliation":[]},{"given":"Xindong","family":"You","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/IMSCCS.2006.72"},{"key":"11","article-title":"trusted computing platforms","author":"balacheff","year":"2003","journal-title":"HP Professional Series"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/PTP.2003.1231493"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1016\/S1353-4858(06)70400-7"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/PRDC.2001.992712"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2002.1009167"},{"journal-title":"Trusted Platform Module (TPM) Specification Version Lib","year":"2005","key":"10"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.1996.502679"},{"key":"6","article-title":"the keynote trust management system","volume":"rfc 2704","author":"blaze","year":"1999","journal-title":"Internet Engineering Task Force (IETF)"},{"key":"5","doi-asserted-by":"crossref","first-page":"185","DOI":"10.1007\/3-540-48749-2_8","article-title":"the role of trust management in distributed systems security","volume":"1063","author":"blaze","year":"1999","journal-title":"Secure Internet Programming - Lecture Notes in Computer Science"},{"key":"4","doi-asserted-by":"crossref","first-page":"204","DOI":"10.1109\/CSAC.2004.22","article-title":"if al is the answer, what was the question? an edgy naifs retrospective on promulgating the trusted computer systems evaluation criteria","author":"schaefer","year":"2004","journal-title":"Proceeding of 20th Annual Computer Security Applications Conference (CSAC 2004)"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.2000.848442"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1016\/S0169-7552(97)00009-3"}],"event":{"name":"2008 Third ChinaGrid Annual Conference (CHINAGRID)","start":{"date-parts":[[2008,8,20]]},"location":"Dunhuang, Gansu, China","end":{"date-parts":[[2008,8,22]]}},"container-title":["The Third ChinaGrid Annual Conference (chinagrid 2008)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4624452\/4624453\/04624485.pdf?arnumber=4624485","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,18]],"date-time":"2017-06-18T07:48:43Z","timestamp":1497772123000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/4624485\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,8]]},"references-count":13,"URL":"https:\/\/doi.org\/10.1109\/chinagrid.2008.52","relation":{},"subject":[],"published":{"date-parts":[[2008,8]]}}}