{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,14]],"date-time":"2025-05-14T04:22:08Z","timestamp":1747196528853,"version":"3.40.5"},"publisher-location":"Cham","reference-count":21,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319127170"},{"type":"electronic","value":"9783319127187"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-12718-7_2","type":"book-chapter","created":{"date-parts":[[2014,11,15]],"date-time":"2014-11-15T07:46:45Z","timestamp":1416037605000},"page":"15-34","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Sealed Cloud - A Novel Approach to Safeguard against Insider Attacks"],"prefix":"10.1007","author":[{"given":"Hubert A.","family":"J\u00e4ger","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Arnold","family":"Monitzer","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Ralf","family":"Rieken","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Edmund","family":"Ernst","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Khiem Dau","family":"Nguyen","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2014,11,16]]},"reference":[{"key":"2_CR1","doi-asserted-by":"crossref","unstructured":"Barak, B., Goldreich, O., Impagliazzo, R., Rudich, S., Sahai, A., Vadhan, S., Yang, K.: On the (Im)possibility of Obfuscating Programs. In: J. Kilian (ed.) Advances in Cryptology \u2013 CRYPTO \u201901, volume 2139 of Lecture Notes in Computer Science, pp. 1\u201318. Springer (2001)","DOI":"10.1007\/3-540-44647-8_1"},{"key":"2_CR2","unstructured":"Brunette, G., Mogull, R., editors: Security Guidance for Critical Areas of focus in Cloud Computing v2.1. Cloud Security Alliance (2009)"},{"key":"2_CR3","unstructured":"Bryant, E.D., Atallah, M.J., Stytz, M.R.: A Survey of Anti-Tamper Technologies (2004). URL https:\/\/www.cerias.purdue.edu\/assets\/pdf\/bibtex_archive\/2004-55.pdf"},{"key":"2_CR4","doi-asserted-by":"crossref","unstructured":"Catteddu, D., Hogben, G., Perilli, A., Manieri, A., Algom, A., Rhoton, J., Rohr, M., Biran, O., Samani, R.: Cloud Computing: Benefits, Risks and Recommendations for Information Security. European Network and Information Security Agency (ENISA) (2009)","DOI":"10.1007\/978-3-642-16120-9_9"},{"key":"2_CR5","unstructured":"Dawoud, W., Takouna, I., Meinel, C.: Infrastructure as a Service Security: Challenges and Solutions. In Informatics and Systems (infos). In Informatics and Systems (INFOS), 2010 The 7th International Conference on Informatics and Systems (INFOS) p. 1 to 8 (2010)"},{"key":"2_CR6","unstructured":"Eckert, C.: Itk-Kompendium 2010. in: Marlene Neud\u00f6rffer (Hrsg.), IT-Sicherheit der n\u00e4chsten Generation \u2013 Herausforderungen und Entwicklungen, FAZ-Institut (2009)"},{"key":"2_CR7","doi-asserted-by":"crossref","unstructured":"Garfinkel, T., Pfaff, B., Chow, J., Rosenblum, M., Boneh, D.: Terra: a Virtual Machinebased Platform for Trusted Computing. In Proceedings of the nineteenth ACM symposium on Operating systems principles, SOSP\u201903 p. 193 to 206 (2003)","DOI":"10.1145\/1165389.945464"},{"key":"2_CR8","unstructured":"Gentry, C.: Computing Arbitrary Functions of Encrypted Data (2008). URL http:\/\/crypto.stanford.edu\/craig\/easy-fhe.pdf"},{"key":"2_CR9","unstructured":"Holmlund, L., Mucisko, D., Kimberland, K., Freyre, J.: 2010 Cybersecurity Watch Survey: Cybercrime Increasing Faster than some Company Defenses. Carnegie Mellon University, Software Engineering Institute, CERT Program (2010)"},{"key":"2_CR10","unstructured":"www.idgard.de (2013)"},{"key":"2_CR11","unstructured":"Jaeger, H.A., Monitzer, A.: Device for Generating a Virtual Network User. Patent application WO 2010\/084017 (January 22nd 2009)"},{"key":"2_CR12","unstructured":"Keeney, M., Kowalski, E., Cappelli, D., Moore, A., Shimeall, T., Rogers, S.: Insider Threat Study: Computer System Sabotage in Critical Infrastructure Sectors. Carnegie Mellon University, Software Engineering Institute, CERT Program (2005)"},{"key":"2_CR13","unstructured":"Kroschwald, S.: Anwendung des Daten- und Geheimnisschutzrechts auf \u201cbetreibersichere\u201d Clouds am Beispiel der \u201cSealed Cloud\u201d. In: J. Taeger (ed.) Law as a Service (LaaS): Recht im Internet- und Cloud- Zeitalter, vol. 1, pp. 289\u2013308. Oldenburger Verlag, Edewecht (2013)"},{"key":"2_CR14","doi-asserted-by":"crossref","unstructured":"Kroschwald, S., Wicker, M.: Kanzleien und Praxen in der Cloud - Strafbarkeit nach \u00a7 203 StGB. Computer und Recht 11, 758\u2013764 (2012)","DOI":"10.9785\/ovs-cr-2012-758"},{"key":"2_CR15","unstructured":"Leutheusser-Schnarrenberger, S.: Regelungsbedarf bei Cloud Computing in Kanzleien. AnwBl 2012 6, 477 (2012)"},{"key":"2_CR16","unstructured":"Mishra, S., Dhillon, G.: Defining Internal Control Objectives for Information Systems Security: A Value Focused Assessment. In: W. Golden, T. Acton, K. Conboy, H. van der Heijden, V.K. Tuunainen (eds.) 16th European Conference on Information Systems, pp. 1334\u20131345. Galway, Ireland (2008)"},{"key":"2_CR17","doi-asserted-by":"crossref","unstructured":"Paillier, P.: Public-Key Cryptosystems Based on Composite Degree Residuosity Classes. in Advances in Cryptology. EUROCRYPT\u201999, LNCS, Volume 1592 p. 223 to 238 (1999)","DOI":"10.1007\/3-540-48910-X_16"},{"key":"2_CR18","unstructured":"Santos, N., Gummadi, K.P., Rodrigues, R.: Infrastructure as a Service Security: Challenges and Solutions. In Informatics and Systems (infos). In Proceedings of the 2009 Conference on Hot Topics in Cloud Computing, HotCloud\u201909, Berkeley, CA, USA (2009)"},{"key":"2_CR19","doi-asserted-by":"crossref","unstructured":"Smart, N.P., Vercauteren, F.: Fully Homomorphic Encryption with Relatively Small Key and Ciphertext Sizes. In Proceedings of the Conference on Practice and Theory in Public Key Cryptography (2010)","DOI":"10.1007\/978-3-642-13013-7_25"},{"key":"2_CR20","doi-asserted-by":"crossref","unstructured":"Syverson, P., Reed, M., Goldschlag, D.: Anonymous Connections and Onion Routing. Proceedings of IEEE Symposium on Security and Privacy, Oakland, CA pp. 44\u201354 (1997) 34 Hubert A. J\u00e4ger, Arnold Monitzer, Ralf Rieken, Edmund Ernst, Khiem Dau Nguyen","DOI":"10.1109\/SECPRI.1997.601314"},{"key":"2_CR21","unstructured":"Bundesministerium f\u00a8urWirtschaft und Technologie (BMWi) Referat Entwicklung konvergenter IKT, D.Z.f.L.u.R.e.P.i.D.: Sichere Internet-Dienste \u2013 Sicheres Cloud Computing fu\u0307r Mittelstand und \u00f6ffentlichen Sektor (Trusted Cloud). Ein Technologiewettbewerb des Bundesministeriums f\u00a8ur Wirtschaft und Technologie, http:\/\/www.bmwi.de (2010)"}],"container-title":["Trusted Cloud Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-12718-7_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,13]],"date-time":"2025-05-13T18:42:21Z","timestamp":1747161741000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-12718-7_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319127170","9783319127187"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-12718-7_2","relation":{},"subject":[],"published":{"date-parts":[[2014]]},"assertion":[{"value":"16 November 2014","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}