{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T20:29:00Z","timestamp":1725568140804},"reference-count":15,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010,6]]},"DOI":"10.1109\/wcins.2010.5541857","type":"proceedings-article","created":{"date-parts":[[2010,8,10]],"date-time":"2010-08-10T11:51:40Z","timestamp":1281441100000},"page":"635-639","source":"Crossref","is-referenced-by-count":1,"title":["An attack-resilient Grid auditing infrastructure"],"prefix":"10.1109","author":[{"given":"Christopher","family":"Kunz","sequence":"first","affiliation":[]},{"given":"Jan","family":"Wiebelitz","sequence":"additional","affiliation":[]},{"given":"Matthew","family":"Smith","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ICNICONSMCL.2006.15"},{"journal-title":"Linux Kernel ‘sock_sendpage()’ NULL Pointer Dereference Vulnerability","year":"2009","author":"ormandy","key":"ref11"},{"journal-title":"Common Vulnerabilities and Exposures Project (2009) CVE-2009–3547","year":"0","key":"ref12"},{"journal-title":"European Policy Management Authority for Grid Authentication","year":"2006","key":"ref13"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ESCIW.2009.5407985"},{"journal-title":"FTP Security Extensions RFC 2228","year":"1997","author":"horowitz","key":"ref15"},{"journal-title":"RFC 3820 Internet X 509 Public Key Infrastructure (PKI) Proxy Certificate Profile","year":"2004","author":"tuecke","key":"ref4"},{"journal-title":"Recommendation X 509 - The Directory Public-key and attribute certificate frameworks","year":"2005","key":"ref3"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1177\/109434209701100205"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/288090.288111"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ICNS.2009.51"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/288090.288111"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1023\/A:1015621120332"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2004.842776"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ESCIW.2009.5407982"}],"event":{"name":"2010 IEEE International Conference on Wireless Communications, Networking and Information Security (WCNIS)","start":{"date-parts":[[2010,6,25]]},"location":"Beijing, China","end":{"date-parts":[[2010,6,27]]}},"container-title":["2010 IEEE International Conference on Wireless Communications, Networking and Information Security"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5524730\/5541718\/05541857.pdf?arnumber=5541857","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,18]],"date-time":"2017-03-18T16:40:56Z","timestamp":1489855256000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5541857\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,6]]},"references-count":15,"URL":"https:\/\/doi.org\/10.1109\/wcins.2010.5541857","relation":{},"subject":[],"published":{"date-parts":[[2010,6]]}}}