{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T18:47:02Z","timestamp":1729622822819,"version":"3.28.0"},"reference-count":34,"publisher":"IEEE Comput. Soc","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1109\/hpdc.2003.1210029","type":"proceedings-article","created":{"date-parts":[[2004,1,23]],"date-time":"2004-01-23T23:33:03Z","timestamp":1074900783000},"page":"194-204","source":"Crossref","is-referenced-by-count":2,"title":["Using views for customizing reusable components in component-based frameworks"],"prefix":"10.1109","author":[{"given":"A.-A.","family":"Ivan","sequence":"first","affiliation":[]},{"given":"V.","family":"Karamcheti","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"3rd Intl Workshop on Java for Parallel and Distributed Computing","article-title":"Eager Handlers – Communication Optimization in Java-based Distributed Applications with Reconfigurable Fine-grained Code Migration","year":"2001","author":"zhou","key":"ref33"},{"journal-title":"Technical Report CS-95-34","article-title":"A New Model of Security for Distributed Systems","year":"1995","author":"wulf","key":"ref32"},{"journal-title":"Web Services Description Language (WSDL) 1 1","year":"2003","key":"ref31"},{"journal-title":"Understanding DCOM","year":"1999","author":"rubin","key":"ref30"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.1999.766718"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/288090.288111"},{"journal-title":"Internet draft","article-title":"The SSL Protocol, Version 3.0","year":"1996","author":"freier","key":"ref11"},{"journal-title":"USITS","article-title":"CANS: Composable, Adaptive Network Services Infrastructure","year":"2001","author":"fu","key":"ref12"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/40.591650"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/2.762790"},{"journal-title":"Security in a Web Services World A Proposed Architecture and Roadmap","year":"2002","key":"ref15"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/HPDC.2002.1029908"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/0140-3664(94)90105-8"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/IPDPS.2003.1213075"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/POLICY.2002.1011293"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/313451.313462"},{"journal-title":"HOTOS","article-title":"Active Streams: An Approach to Adaptive Distributed Systems","year":"2001","author":"bustamante","key":"ref4"},{"journal-title":"Understanding DCE","year":"1992","author":"rosenberry","key":"ref27"},{"key":"ref3","doi-asserted-by":"crossref","first-page":"254","DOI":"10.1007\/BFb0055488","article-title":"Compliance checking in the policymaker trust management system","author":"blaze","year":"1998","journal-title":"Financial Cryptography"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCSW.2002.1030844"},{"journal-title":"A Bytecode Translator for Distributed Execution of Legacy Java Software","first-page":"236","year":"2001","author":"tatsubori","key":"ref29"},{"journal-title":"ICDCS","article-title":"dRBAC: Distributed Role-based Access Control for Dynamic Coalition Environments","year":"2001","author":"freudenthal","key":"ref5"},{"key":"ref8","first-page":"370","article-title":"A Flexible Security System for Metacomputing Environments","author":"ferrari","year":"1999","journal-title":"HPCN"},{"journal-title":"Internet Network Working Group","article-title":"Spki certificate theory, rfc 2693","year":"1999","author":"ellison","key":"ref7"},{"key":"ref2","doi-asserted-by":"crossref","first-page":"59","DOI":"10.1007\/3-540-49135-X_9","article-title":"KeyNote: Trust Management for Public-Key Infrastructures","volume":"1550","author":"blaze","year":"1998","journal-title":"Security Protocols International Workshop"},{"journal-title":"The Physiology of the Grid An Open Grid Services Architecture for Distributed Systems Integration","year":"2002","author":"foster","key":"ref9"},{"journal-title":"Technical Report 01-14","article-title":"A Practical Distributed Authorization System for GARA","year":"2001","author":"adamson","key":"ref1"},{"key":"ref20","doi-asserted-by":"crossref","first-page":"285","DOI":"10.1109\/CSAC.1999.816038","article-title":"User authentication and authorization in the Java platform","author":"lai","year":"1999","journal-title":"15th Annual Computer Security Applications Conference"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/320384.320433"},{"journal-title":"Openarch","article-title":"Securing Distributed Adaptation","year":"2001","author":"li","key":"ref21"},{"journal-title":"CORBA Security Services Ver 1 8","year":"2002","key":"ref24"},{"journal-title":"HPDC","article-title":"Support for Interactive Heavyweight Services","year":"2001","author":"lopez","key":"ref23"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/2.889094"},{"journal-title":"CORBA component model","year":"2003","key":"ref25"}],"event":{"name":"12th IEEE International Symposium on High Performance Distributed Computing","acronym":"HPDC-03","location":"Seattle, WA, USA"},"container-title":["High Performance Distributed Computing, 2003. Proceedings. 12th IEEE International Symposium on"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/8591\/27230\/01210029.pdf?arnumber=1210029","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,15]],"date-time":"2017-06-15T23:18:20Z","timestamp":1497568700000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1210029\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"references-count":34,"URL":"https:\/\/doi.org\/10.1109\/hpdc.2003.1210029","relation":{},"subject":[]}}