{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T16:01:21Z","timestamp":1743091281051,"version":"3.40.3"},"publisher-location":"Cham","reference-count":11,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030150341"},{"type":"electronic","value":"9783030150358"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-15035-8_98","type":"book-chapter","created":{"date-parts":[[2019,3,14]],"date-time":"2019-03-14T08:30:46Z","timestamp":1552552246000},"page":"996-1006","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["A Context-Aware Service for Authorizing Multi-cloud Deployments"],"prefix":"10.1007","author":[{"given":"Yiannis","family":"Verginadis","sequence":"first","affiliation":[]},{"given":"Ioannis","family":"Patiniotakis","sequence":"additional","affiliation":[]},{"given":"Gregoris","family":"Mentzas","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,3,15]]},"reference":[{"key":"98_CR1","doi-asserted-by":"crossref","unstructured":"Verginadis, Y., Patiniotakis, I., Mentzas, G.: Metadata schema for data-aware multi-cloud computing. In: INISTA, pp. 1\u20139. IEEE (SMC) (2018)","DOI":"10.1109\/INISTA.2018.8466270"},{"key":"98_CR2","doi-asserted-by":"publisher","unstructured":"Horn, G., Skrzypek, P.: MELODIC: utility based cross cloud deployment optimisation. In: Proceedings of the 32nd International Conference on Advanced Information Networking and Applications Workshops (WAINA) (2018). \n                    https:\/\/doi.org\/10.1109\/waina.2018.00112","DOI":"10.1109\/waina.2018.00112"},{"key":"98_CR3","unstructured":"CSA: The Treacherous 12 - Cloud Computing Top Threats in 2016. \n                    https:\/\/cloudsecurityalliance.org\/group\/top-threats"},{"key":"98_CR4","doi-asserted-by":"publisher","unstructured":"Verginadis, Y., Michalas, A., Gouvas, P., Schiefer, G., H\u00fcbsch, G., Paraskakis, I.: PaaSword: a holistic data privacy and security by design framework for cloud services. J. Grid Comput. 1\u201316 (2017). \n                    https:\/\/doi.org\/10.1007\/s10723-017-9394-2","DOI":"10.1007\/s10723-017-9394-2"},{"key":"98_CR5","unstructured":"Decker, M.: Modelling of location-aware access control rules. In: Maria Cruz-Cunha, F.M. (ed.), Handbook of Research on Mobility and Computing: Evolving Technologies and Ubiquitous Impacts, Information Science Reference, Hershey, PA, USA, 2011, incollection 57, pp. 912\u2013929 (2011)"},{"key":"98_CR6","doi-asserted-by":"crossref","unstructured":"Hu, V.C., Ferraiolo, D., Kuhn, R., Friedman, A.R., Lang, A.J., Cogdell, M.M., Schnitzer, A., Sandlin, K., Miller, R., Scarfone, K.: Guide to attribute based access control (ABAC) definition and considerations (draft). NIST Special Publication 800, 162 (2013)","DOI":"10.6028\/NIST.SP.800-162"},{"key":"98_CR7","unstructured":"Ferraiolo, D., Cugini, J., Kuhn, D.R.: Role-based access control (RBAC): features and motivations. In: Proceedings of 11th Annual Computer Security Application Conference, pp. 241\u2013248 (1995)"},{"key":"98_CR8","doi-asserted-by":"crossref","unstructured":"Ferraiolo, D., Chandramouli, R., Kuhn, R., Hu, V.: Extensible access control markup language (XACML) and next generation access control (NGAC). In: Proceedings of the ACM International Workshop on Attribute Based Access Control, pp. 13\u201324. ACM (2016)","DOI":"10.1145\/2875491.2875496"},{"key":"98_CR9","doi-asserted-by":"crossref","unstructured":"Garcia-Alfaro, J., Navarro-Arribas, G.: Prevention of cross-site scripting attacks on current web applications. In: OTM Confederated International Conferences on the Move to Meaningful Internet Systems, pp. 1770\u20131784. Springer (2007)","DOI":"10.1007\/978-3-540-76843-2_45"},{"key":"98_CR10","doi-asserted-by":"crossref","unstructured":"Abowd, G.D., Dey, A.K., Brown, P.J., Davies, N., Smith, M., Steggles, P.: Towards a better understanding of context and context-awareness. In: International Symposium on Handheld and Ubiquitous Computing, pp. 304\u2013307. Springer (1999)","DOI":"10.1007\/3-540-48157-5_29"},{"key":"98_CR11","doi-asserted-by":"crossref","unstructured":"Kiczales, G., Lamping, J., Mendhekar, A., Maeda, C., Lopes, C., Loingtier, J., M., Irwin, J.: Aspect-oriented programming. In: European conference on object-oriented programming, pp. 220\u2013242. Springer (1997)","DOI":"10.1007\/BFb0053381"}],"container-title":["Advances in Intelligent Systems and Computing","Web, Artificial Intelligence and Network Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-15035-8_98","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,18]],"date-time":"2019-05-18T02:58:37Z","timestamp":1558148317000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-15035-8_98"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030150341","9783030150358"],"references-count":11,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-15035-8_98","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"15 March 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"WAINA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Workshops of  the International Conference on Advanced Information Networking and Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Matsue","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Japan","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27 March 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29 March 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"33","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"waina2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/voyager.ce.fit.ac.jp\/conf\/aina\/2019\/workshops.php","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}