{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T14:47:23Z","timestamp":1725806843876},"publisher-location":"Cham","reference-count":23,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319116976"},{"type":"electronic","value":"9783319116983"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-11698-3_4","type":"book-chapter","created":{"date-parts":[[2014,10,9]],"date-time":"2014-10-09T05:18:13Z","timestamp":1412831893000},"page":"41-53","source":"Crossref","is-referenced-by-count":6,"title":["A Formal Model for Isolation Management in Cloud Infrastructure-as-a-Service"],"prefix":"10.1007","author":[{"given":"Khalid Zaman","family":"Bijon","sequence":"first","affiliation":[]},{"given":"Ram","family":"Krishnan","sequence":"additional","affiliation":[]},{"given":"Ravi","family":"Sandhu","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"4_CR1","unstructured":"Aws identity and access management, \n                    \n                      http:\/\/aws.amazon.com\/iam\/"},{"issue":"1","key":"4_CR2","doi-asserted-by":"publisher","first-page":"40","DOI":"10.1145\/1341312.1341321","volume":"42","author":"S. Berger","year":"2008","unstructured":"Berger, S., et al.: TVDc: managing security in the trusted virtual datacenter. ACM SIGOPS Operating Systems Review\u00a042(1), 40\u201347 (2008)","journal-title":"ACM SIGOPS Operating Systems Review"},{"key":"4_CR3","doi-asserted-by":"crossref","unstructured":"Berger, S., et al.: Security for the cloud infrastructure: Trusted virtual data center implementation. IBM Journal of R&D\u00a053(4), 6:1\u20136:12 (2009)","DOI":"10.1147\/JRD.2009.5429060"},{"issue":"3","key":"4_CR4","first-page":"131","volume":"2","author":"K.Z. Bijon","year":"2013","unstructured":"Bijon, K.Z., Krishman, R., Sandhu, R.: Constraints specication in attribute based access control. SCIENCE\u00a02(3), 131 (2013)","journal-title":"SCIENCE"},{"key":"4_CR5","doi-asserted-by":"crossref","unstructured":"Bijon, K.Z., Krishnan, R., Sandhu, R.: Towards an attribute based constraints specification language. In: Social Computing, pp. 108\u2013113. IEEE (2013)","DOI":"10.1109\/SocialCom.2013.23"},{"key":"4_CR6","doi-asserted-by":"crossref","unstructured":"Bleikertz, S., Gro\u00df, T.: A virtualization assurance language for isolation and deployment. In: Policies for Distributed Systems and Networks. IEEE (2011)","DOI":"10.1109\/POLICY.2011.10"},{"key":"4_CR7","doi-asserted-by":"crossref","unstructured":"Bleikertz, S., Kurmus, A., Nagy, Z., Schunter, M.: Secure cloud maintenance - protecting workloads against insider attacks. In: Proc. of the ASIACCS (2012)","DOI":"10.1145\/2414456.2414505"},{"issue":"1","key":"4_CR8","doi-asserted-by":"crossref","first-page":"89","DOI":"10.3233\/JCS-2010-0376","volume":"18","author":"S. Cabuk","year":"2010","unstructured":"Cabuk, S., et al.: Towards automated security policy enforcement in multi-tenant virtual data centers. Journal of Computer Security\u00a018(1), 89\u2013121 (2010)","journal-title":"Journal of Computer Security"},{"issue":"6","key":"4_CR9","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1109\/MSP.2010.194","volume":"8","author":"J.M.A. Calero","year":"2010","unstructured":"Calero, J.M.A., et al.: Toward a multi-tenancy authorization system for cloud services. IEEE Security & Privacy\u00a08(6), 48\u201355 (2010)","journal-title":"IEEE Security & Privacy"},{"issue":"2","key":"4_CR10","doi-asserted-by":"publisher","first-page":"42","DOI":"10.1145\/1330555.1330556","volume":"35","author":"L. Cherkasova","year":"2007","unstructured":"Cherkasova, L., et al.: Comparison of the three cpu schedulers in xen. SIGMETRICS Performance Evaluation Review\u00a035(2), 42\u201351 (2007)","journal-title":"SIGMETRICS Performance Evaluation Review"},{"key":"4_CR11","unstructured":"Claybrook, B.: Comparing cloud risks and virtualization risks for data center apps, \n                    \n                      http:\/\/searchdatacenter.techtarget.com\/tip\/0,289483,sid80~gci1380652,00.html"},{"key":"4_CR12","unstructured":"Dawoud, W., Takouna, I., Meinel, C.: Infrastructure as a service security: Challenges and solutions. In: IEEE INFOS, pp. 1\u20138 (2010)"},{"key":"4_CR13","doi-asserted-by":"crossref","unstructured":"Gupta, A., et al.: Hpc-aware vm placement in infrastructure clouds. In: IEEE Intl. Conf. on Cloud Engineering, vol.\u00a013 (2013)","DOI":"10.1109\/IC2E.2013.38"},{"issue":"1","key":"4_CR14","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/1869-0238-4-5","volume":"4","author":"K. Hashizume","year":"2013","unstructured":"Hashizume, K., et al.: An analysis of security issues for cloud computing. Journal of Internet Services and Applications\u00a04(1), 1\u201313 (2013)","journal-title":"Journal of Internet Services and Applications"},{"key":"4_CR15","doi-asserted-by":"crossref","unstructured":"Jasti, A., Shah, P., Nagaraj, R., Pendse, R.: Security in multi-tenancy cloud. In: IEEE ICCST, pp. 35\u201341 (2010)","DOI":"10.1109\/CCST.2010.5678682"},{"key":"4_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1007\/978-3-642-31540-4_4","volume-title":"Data and Applications Security and Privacy XXVI","author":"X. Jin","year":"2012","unstructured":"Jin, X., Krishnan, R., Sandhu, R.: A Unified Attribute-Based Access Control Model Covering DAC, MAC and RBAC. In: Cuppens-Boulahia, N., Cuppens, F., Garcia-Alfaro, J. (eds.) DBSec 2012. LNCS, vol.\u00a07371, pp. 41\u201355. Springer, Heidelberg (2012)"},{"key":"4_CR17","doi-asserted-by":"crossref","unstructured":"L\u00f6hr, H., et al.: Securing the e-health cloud. In: Proceedings of the 1st ACM International Health Informatics Symposium, pp. 220\u2013229. ACM (2010)","DOI":"10.1145\/1882992.1883024"},{"key":"4_CR18","doi-asserted-by":"crossref","unstructured":"Mills, K., Filliben, J., Dabrowski, C.: Comparing vm-placement algorithms for on-demand clouds. In: IEEE CloudCom, pp. 91\u201398 (2011)","DOI":"10.1109\/CloudCom.2011.22"},{"key":"4_CR19","doi-asserted-by":"crossref","unstructured":"Ristenpart, T., et al.: Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds. In: Proc. of the ACM CCS (2009)","DOI":"10.1145\/1653662.1653687"},{"key":"4_CR20","doi-asserted-by":"crossref","unstructured":"Rocha, F., Correia, M.: Lucy in the sky without diamonds: Stealing confidential data in the cloud. In: Proc. of the IEEE DSN-W (2011)","DOI":"10.1109\/DSNW.2011.5958798"},{"key":"4_CR21","unstructured":"Shieh, A., et al.: Sharing the data center network. In: Proceedings of the 8th USENIX Conference on Networked Systems Design and Implementation (2011)"},{"key":"4_CR22","doi-asserted-by":"crossref","unstructured":"Sivathanu, S., Liu, L., Yiduo, M., Pu, X.: Storage management in virtualized cloud environment. In: IEEE CLOUD, pp. 204\u2013211 (2010)","DOI":"10.1109\/CLOUD.2010.27"},{"key":"4_CR23","doi-asserted-by":"crossref","unstructured":"Wei, J., et al.: Managing security of virtual machine images in a cloud environment. In: Proc. of the ACM Workshop on Cloud Computing Security (2009)","DOI":"10.1145\/1655008.1655021"}],"container-title":["Lecture Notes in Computer Science","Network and System Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-11698-3_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,28]],"date-time":"2019-05-28T03:02:19Z","timestamp":1559012539000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-11698-3_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319116976","9783319116983"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-11698-3_4","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]}}}