{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T18:11:57Z","timestamp":1771697517362,"version":"3.50.1"},"publisher-location":"Cham","reference-count":13,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319184906","type":"print"},{"value":"9783319184913","type":"electronic"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-18491-3_21","type":"book-chapter","created":{"date-parts":[[2015,4,29]],"date-time":"2015-04-29T07:37:47Z","timestamp":1430293067000},"page":"251-261","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":22,"title":["Security-as-a-Service in Multi-cloud and Federated Cloud Environments"],"prefix":"10.1007","author":[{"given":"Pramod S.","family":"Pawar","sequence":"first","affiliation":[]},{"given":"Ali","family":"Sajjad","sequence":"additional","affiliation":[]},{"given":"Theo","family":"Dimitrakos","sequence":"additional","affiliation":[]},{"given":"David W.","family":"Chadwick","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,4,30]]},"reference":[{"key":"21_CR1","doi-asserted-by":"crossref","unstructured":"Mell, P., Grance, T.: The NIST Definition of Cloud Computing, September 2011. \n                    http:\/\/csrc.nist.gov\/publications\/nistpubs\/800-145\/SP800-145.pdf","DOI":"10.6028\/NIST.SP.800-145"},{"key":"21_CR2","unstructured":"Ibrahim, A.S., Hamlyn-harris, J.H., Grundy, J.: Emerging security challenges of cloud virtual infrastructure (2010)"},{"issue":"1","key":"21_CR3","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/1869-0238-4-5","volume":"4","author":"K Hashizume","year":"2013","unstructured":"Hashizume, K., Rosado, D.G., Fern\u00e1ndez-Medina, E., Fernandez, E.B.: An analysis of security issues for cloud computing. J. Internet Serv. Appl. 4(1), 1\u201313 (2013)","journal-title":"J. Internet Serv. Appl."},{"key":"21_CR4","unstructured":"Dropbox. \n                    https:\/\/dropbox.com\/\n                    \n                  . Accessed 13 March 2015"},{"key":"21_CR5","unstructured":"Google drive. \n                    https:\/\/drive.google.com\/\n                    \n                  . Accessed 13 March 2015"},{"key":"21_CR6","unstructured":"Microsoft Sky Drive. \n                    https:\/\/skydrive.live.com\/\n                    \n                  . Accessed 13 March 2015"},{"key":"21_CR7","unstructured":"Boxcryptor | Encryption for cloud storage | Window, Mac, Android, iOS | boxcryptor.com. \n                    https:\/\/www.boxcryptor.com\/\n                    \n                  . Accessed 13 March 2015"},{"key":"21_CR8","unstructured":"TERENA\/CloudDrive \u00b7 GitHub. \n                    https:\/\/github.com\/TERENA\/CloudDrive\/\n                    \n                  . Accessed 13 March 2015"},{"key":"21_CR9","unstructured":"Fed4Fire. \n                    http:\/\/www.fed4fire.eu\/\n                    \n                  . Accessed 13 March 2015"},{"key":"21_CR10","doi-asserted-by":"crossref","unstructured":"Daniel, J., Dimitrakos, T., El-Moussa, F., Ducatel, G., Pawar, P., Sajjad, A.: Seamless Enablement of intelligent protection for enterprise cloud applications through service store, pp. 1021\u20131026 (2014)","DOI":"10.1109\/CloudCom.2014.92"},{"key":"21_CR11","unstructured":"Amazon Web Services, 22 May 2013. \n                    http:\/\/aws.amazon.com\/\n                    \n                  . Accessed 22 May 2013"},{"key":"21_CR12","unstructured":"vCloud. \n                    http:\/\/vcloud.vmware.com\/\n                    \n                  . Accessed 13 March 2015"},{"key":"21_CR13","unstructured":"Flexible I\/O tester GitHub. \n                    https:\/\/github.com\/axboe\/fio\/\n                    \n                  . Accessed 13 March 2015"}],"container-title":["IFIP Advances in Information and Communication Technology","Trust Management IX"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-18491-3_21","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,29]],"date-time":"2019-05-29T19:06:47Z","timestamp":1559156807000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-18491-3_21"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319184906","9783319184913"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-18491-3_21","relation":{},"ISSN":["1868-4238","1868-422X"],"issn-type":[{"value":"1868-4238","type":"print"},{"value":"1868-422X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015]]},"assertion":[{"value":"30 April 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}