{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,26]],"date-time":"2026-03-26T14:12:31Z","timestamp":1774534351804,"version":"3.50.1"},"publisher-location":"New York, NY","reference-count":12,"publisher":"Springer New York","isbn-type":[{"value":"9781461492771","type":"print"},{"value":"9781461492788","type":"electronic"}],"license":[{"start":{"date-parts":[[2013,12,7]],"date-time":"2013-12-07T00:00:00Z","timestamp":1386374400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2013,12,7]],"date-time":"2013-12-07T00:00:00Z","timestamp":1386374400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-1-4614-9278-8_1","type":"book-chapter","created":{"date-parts":[[2014,1,23]],"date-time":"2014-01-23T08:28:40Z","timestamp":1390465720000},"page":"1-30","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":32,"title":["Cryptographic Key Management Issues and Challenges in Cloud Services"],"prefix":"10.1007","author":[{"given":"Ramaswamy","family":"Chandramouli","sequence":"first","affiliation":[]},{"given":"Michaela","family":"Iorga","sequence":"additional","affiliation":[]},{"given":"Santosh","family":"Chokhani","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2013,12,7]]},"reference":[{"key":"1_CR1","doi-asserted-by":"crossref","unstructured":"F. Liu, J. Tong, J. Mao, R. Bohn, J. Messina, L. Badger, and D. Leaf, NIST Cloud Computing Reference Architecture (NIST SP 500-292), National Institute of Standards and Technology, U.S. Department of Commerce (2011). http:\/\/www.nist.gov\/customcf\/get_pdf.cfm?pub_id=909505","DOI":"10.6028\/NIST.SP.500-292"},{"key":"1_CR2","doi-asserted-by":"crossref","unstructured":"P. Mell and T. Grance, The NIST definition of cloud computing (NIST SP 800-145), National Institute of Standards and Technology, U.S. Department of Commerce (2011) http:\/\/csrc.nist.gov\/publications\/nistpubs\/800-145\/SP800-145.pdf","DOI":"10.6028\/NIST.SP.800-145"},{"key":"1_CR3","unstructured":"L. Badger, D. Berstein, R. Bohn, F. de Valux, M. Hogan, J. Mao, J. Messina, K. Mills, A. Sokol, J. Tong, F. Whiteside, and D. Leaf, US government cloud computing technology roadmap volume 1: High-priority requirements to further USG agency cloud computing adoption (NIST SP 500-293, Vol. 1), National Institute of Standards and Technology, U.S. Department of Commerce (2011). http:\/\/www.nist.gov\/itl\/cloud\/upload\/SP_500_293_volumeI-2.pdf"},{"key":"1_CR4","unstructured":"L. Badger, R. Bohn, S. Chu, M. Hogan, F. Liu, V. Kaufmann, J. Mao, J. Messina, K. Mills, A. Sokol, J. Tong, F. Whiteside, and D. Leaf, US government cloud computing technology roadmap volume II: Useful information for cloud adopters (NIST SP 500-293, Vol. 2), National Institute of Standards and Technology, U.S. Department of Commerce (2011). http:\/\/www.nist.gov\/itl\/cloud\/upload\/SP_500_293_volumeII.pdf."},{"key":"1_CR5","doi-asserted-by":"crossref","unstructured":"L. Badger, T. Grance, R. Patt-Corner, and J. Voas, Cloud Computing Synopsis and Recommendations (NIST SP 800-146), National Institute of Standards and Technology, U.S. Department of Commerce (2012). http:\/\/csrc.nist.gov\/publications\/nistpubs\/800-146\/sp800-146.pdf","DOI":"10.6028\/NIST.SP.800-146"},{"key":"1_CR6","unstructured":"W. Jansen and T. Grance, Guidelines on Security and Privacy in Public Cloud Computing (NIST SP 800-144). National Institute of Standards and Technology, U.S. Department of Commerce (2011). http:\/\/csrc.nist.gov\/publications\/nistpubs\/800-144\/SP800-144.pdf."},{"key":"1_CR7","unstructured":"Secure Shell (SSH) Transport Layer Protocol, http:\/\/www.ietf.org\/rfc\/rfc4253.txt"},{"key":"1_CR8","unstructured":"The Transport Layer Security (TLS) Protocol Version 1.2, http:\/\/tools.ietf.org\/html\/rfc5246"},{"key":"1_CR9","unstructured":"Internet Security Glossary, Version 2, http:\/\/tools.ietf.org\/rfc\/rfc4949.txt"},{"key":"1_CR10","doi-asserted-by":"crossref","unstructured":"F.Bracci, A.Corradi and L.Foschini, Database Security Management for Healthcare SaaS in the Amazon AWS Cloud, IEEE Computer, 2012.","DOI":"10.1109\/ISCC.2012.6249401"},{"key":"1_CR11","unstructured":"Understanding and Selecting a Database Encryption or Tokenization Solution, http:\/\/securosis.com"},{"key":"1_CR12","unstructured":"Best Practices in Securing Your Customer Data in Salesforce, Force.com, and Chatter, http:\/\/www.ciphercloud.com"}],"container-title":["Secure Cloud Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-1-4614-9278-8_1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,19]],"date-time":"2023-02-19T22:50:38Z","timestamp":1676847038000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-1-4614-9278-8_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,12,7]]},"ISBN":["9781461492771","9781461492788"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-1-4614-9278-8_1","relation":{},"subject":[],"published":{"date-parts":[[2013,12,7]]},"assertion":[{"value":"7 December 2013","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}