{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T11:26:05Z","timestamp":1743074765506,"version":"3.40.3"},"publisher-location":"Cham","reference-count":25,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030615024"},{"type":"electronic","value":"9783030615031"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-61503-1_30","type":"book-chapter","created":{"date-parts":[[2021,4,26]],"date-time":"2021-04-26T08:31:00Z","timestamp":1619425860000},"page":"299-312","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["A NetLogo Extension to Secure Data Using GNUs Pretty Good Privacy Software Suite"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-5186-9388","authenticated-orcid":false,"given":"Doug","family":"Salt","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8596-0590","authenticated-orcid":false,"given":"Gary","family":"Polhill","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,4,27]]},"reference":[{"key":"30_CR1","unstructured":"A. Barker, B. Varghese, J.S. Ward, I. Sommerville, Academic cloud computing research: five pitfalls and five opportunities, in 6th $$\\{$$USENIX$$\\}$$Workshop on Hot Topics in Cloud Computing (HotCloud 14) (2014)"},{"issue":"4","key":"30_CR2","doi-asserted-by":"publisher","first-page":"1062","DOI":"10.1016\/j.future.2012.06.004","volume":"29","author":"J Spillner","year":"2013","unstructured":"J. Spillner, J. M\u00fcller, A. Schill, Creating optimal cloud storage systems. Future Gener. Comput. Syst. 29(4), 1062\u20131072 (2013)","journal-title":"Future Gener. Comput. Syst."},{"key":"30_CR3","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4614-7699-3","volume-title":"Cloud Computing Basics","author":"S Srinivasan","year":"2014","unstructured":"S. Srinivasan, Cloud Computing Basics (Springer, Berlin, 2014)"},{"key":"30_CR4","unstructured":"A. Huth, J. Cebula, The basics of cloud computing. United States Computer (2011)"},{"key":"30_CR5","unstructured":"User Guide dropbox, https:\/\/www.dropbox.com\/en_GB\/guide. Accessed 05 May 2018"},{"key":"30_CR6","unstructured":"One drive helop - office support, https:\/\/support.office.com\/en-gb\/onedrive. Accessed 05 May 2018"},{"key":"30_CR7","unstructured":"Google drive help, https:\/\/support.google.com\/drive\/?hl=en#topic=14940. Accessed 05 May 2018"},{"key":"30_CR8","unstructured":"General data protection reulation (GDPR) - final text neatly arranged, https:\/\/gdpr-info.eu. Accessed 05 May 2018"},{"key":"30_CR9","unstructured":"British Government, Data protection act 2018 (Chap. 12). Technical report, British Government (2018)"},{"key":"30_CR10","doi-asserted-by":"crossref","unstructured":"N. Joukov, H. Papaxenopoulos, E. Zadok, Secure deletion myths, issues, and solutions, in Proceedings of the Second ACM Workshop on Storage Security and Survivability (ACM, 2006), pp. 61\u201366","DOI":"10.1145\/1179559.1179571"},{"key":"30_CR11","unstructured":"M. Arora, How secure is AES against brute force attacks? (2012), https:\/\/www.eetimes.com\/document.asp?doc_id=1279619. Accessed 05 May 2018"},{"issue":"4","key":"30_CR12","doi-asserted-by":"publisher","first-page":"146","DOI":"10.1109\/MCOM.2006.1632662","volume":"44","author":"SV Kartalopoulos","year":"2006","unstructured":"S.V. Kartalopoulos, A primer on cryptography in communications. IEEE Commun. Mag. 44(4), 146\u2013151 (2006)","journal-title":"IEEE Commun. Mag."},{"key":"30_CR13","unstructured":"Data Protection - rules for the protection of personal data inside and outside the EU, https:\/\/ec.europa.eu\/info\/law\/law-topic\/data-protection_en. Accessed 05 May 2018"},{"key":"30_CR14","doi-asserted-by":"crossref","unstructured":"D. Lazar, H. Chen, X. Wang, N. Zeldovich, Why does cryptographic software fail?: a case study and open problems, in Proceedings of 5th Asia-Pacific Workshop on Systems (ACM, 2014), p.\u00a07","DOI":"10.1145\/2637166.2637237"},{"issue":"8","key":"30_CR15","doi-asserted-by":"publisher","first-page":"972","DOI":"10.1016\/j.envsoft.2010.02.008","volume":"25","author":"JC Thiele","year":"2010","unstructured":"J.C. Thiele, V. Grimm, Netlogo meets R: linking agent-based models with a toolbox for their analysis. Environ. Model. Softw. 25(8), 972\u2013974 (2010)","journal-title":"Environ. Model. Softw."},{"key":"30_CR16","doi-asserted-by":"crossref","unstructured":"J. Callas, L. Donnerhacke, H. Finney, D. Shaw, R. Thayer, RFC 4880 - openpgp message format. Technical report (2007)","DOI":"10.17487\/rfc4880"},{"key":"30_CR17","unstructured":"M. Copeland, J. Grahn, Wheeler: The GNU Privacy Handbook (1999), https:\/\/www.gnupg.org\/gph\/en\/manual.html. Accessed 05 May 2018"},{"key":"30_CR18","unstructured":"N.H. Walfield, An advanced introduction to GnuPG (2017). Accessed 05 May 2018"},{"key":"30_CR19","unstructured":"M. Odersky, P. Altherr, V. Cremet, B. Emir, S. Micheloud, N. Mihaylov, M. Schinz, E. Stenman, M. Zenger, The scala language specification (2004)"},{"key":"30_CR20","unstructured":"J. Swartz, Learning Scala: Practical Functional Programming for the JVM (O\u2019Reilly Media, Inc., 2014)"},{"key":"30_CR21","unstructured":"S. Arciszewski, How and why developers use asymmetric (public key) cryptography in real-world applications (2018), https:\/\/paragonie.com\/blog\/2018\/08\/how-and-why-developers-use-asymmetric-public-key-cryptography-in-real-world-applications. Accessed 05 May 2018"},{"key":"30_CR22","unstructured":"E. Perla, M. Oldani, A Guide to Kernel Exploitation: Attacking the Core (Elsevier, 2010)"},{"key":"30_CR23","unstructured":"R. Stallman, The GNU project and the free software movement, in Open Sources: Voices from the Open Source Revolution (O\u2019Reilly Media, Inc., 1999), pp. 53\u201370"},{"key":"30_CR24","doi-asserted-by":"crossref","unstructured":"J.G. Polhill, J. Ge, M.P. Hare, K.B. Matthews, A. Gimona, D. Salt, J. Yeluripati, Crossing the chasm: a \u2018tube-map\u2019 for agent-based social simulation of policy scenarios in spatially-distributed systems. GeoInformatica 1\u201331 (2019)","DOI":"10.1007\/s10707-018-00340-z"},{"key":"30_CR25","unstructured":"The legion of the bouncy castle, https:\/\/www.bouncycastle.org\/. Accessed 05 May 2018"}],"container-title":["Springer Proceedings in Complexity","Advances in Social Simulation"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-61503-1_30","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,2]],"date-time":"2021-05-02T12:34:50Z","timestamp":1619958890000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-61503-1_30"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9783030615024","9783030615031"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-61503-1_30","relation":{},"ISSN":["2213-8684","2213-8692"],"issn-type":[{"type":"print","value":"2213-8684"},{"type":"electronic","value":"2213-8692"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"27 April 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ESSA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Conference of the European Social Simulation Association","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Mainz","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Germany","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23 September 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27 September 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"essa2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/ssc2019.uni-mainz.de\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}