{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T21:21:51Z","timestamp":1725830511506},"publisher-location":"Cham","reference-count":16,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319248578"},{"type":"electronic","value":"9783319248585"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-24858-5_3","type":"book-chapter","created":{"date-parts":[[2015,9,19]],"date-time":"2015-09-19T13:09:52Z","timestamp":1442668192000},"page":"37-51","source":"Crossref","is-referenced-by-count":2,"title":["Security Metrics, Secure Elements, and Operational Measurement Trust in Cloud Environments"],"prefix":"10.1007","author":[{"given":"Teemu","family":"Kanstr\u00e9n","sequence":"first","affiliation":[]},{"given":"Antti","family":"Evesti","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,12,9]]},"reference":[{"unstructured":"Amazon, AWS CloudHSM. http:\/\/aws.amazon.com\/cloudhsm\/ . Accessed May 2015","key":"3_CR1"},{"unstructured":"Berger, S., C\u00e1ceres, R., Goldman, K., Perez, R., Sailer, R., van Doorn, L.: vTPM: virtualizing the trusted platform module. In: Proceedings of the 15th USENIX Security Symposium (2006)","key":"3_CR2"},{"doi-asserted-by":"crossref","unstructured":"Berger, S., et al.: Scalable attestation: a step toward secure and trusted clouds. In: IEEE International Conference on Cloud Engineering (2015)","key":"3_CR3","DOI":"10.1109\/IC2E.2015.32"},{"unstructured":"Chen, C., Raj, H., Saroiu, S., Wolman, A.: cTPM: a cloud TPM for cross-device trusted applications. In: Proceedings of the 11th USENIX Conference on Networked Systems Design and Implementation (NSDI) (2014)","key":"3_CR4"},{"doi-asserted-by":"crossref","unstructured":"Haddad, S., Hecker, A., Marquet, B., Dubus, S., Kanstr\u00e9n, T., Savola, R.: Operational security assurance evaluation in open infrastructures. In: 6th IEEE International Conference on Risk and Security of Internet and Systems (CRISIS), Timisoara, Romania, 26\u201328 September 2011","key":"3_CR5","DOI":"10.1109\/CRiSIS.2011.6061831"},{"unstructured":"ISO\/IEC Guide 99:2007, International vocabulary of metrology e basic and general concepts and associated terms (VIM), International Organization for Standardization and the International Electrotechnical Commission (2007)","key":"3_CR6"},{"doi-asserted-by":"crossref","unstructured":"Kanstr\u00e9n, T., Lehtonen, S., Savola, R., Kukkohovi, H., Hatonen, K.: Architecture for high confidence cloud security monitoring. In: Proceedings of IEEE International Conference on Cloud Engineering (IC2E) (2015)","key":"3_CR7","DOI":"10.1109\/IC2E.2015.21"},{"doi-asserted-by":"crossref","unstructured":"Kanstr\u00e9n, T., Lehtonen, S., Kukkohovi, H.: Opportunities in using a secure element to increase confidence in cloud security monitoring. In: Proceedings of the 8th IEEE International Conference on Cloud Computing (CLOUD) (2015)","key":"3_CR8","DOI":"10.1109\/CLOUD.2015.159"},{"doi-asserted-by":"crossref","unstructured":"Latvala, O-M., et al.: A tool for security metrics modeling and visualization. In: Proceedings of the European Conference on Software Architecture Workshops (2014)","key":"3_CR9","DOI":"10.1145\/2642803.2642806"},{"issue":"1","key":"3_CR10","doi-asserted-by":"publisher","first-page":"193","DOI":"10.1016\/j.jss.2011.08.013","volume":"8","author":"M Ouedraogo","year":"2012","unstructured":"Ouedraogo, M., et al.: Appraisal and reporting of security assurance at operational systems level. J. Syst. Softw. 8(1), 193\u2013208 (2012)","journal-title":"J. Syst. Softw."},{"key":"3_CR11","doi-asserted-by":"publisher","first-page":"67","DOI":"10.1007\/s11219-011-9169-0","volume":"21","author":"M Ouedraogo","year":"2013","unstructured":"Ouedraogo, M., et al.: Taxonomy of quality metrics for assessing assurance of security correctness. Softw. Qual. J. 21, 67\u201397 (2013)","journal-title":"Softw. Qual. J."},{"issue":"4","key":"3_CR12","doi-asserted-by":"publisher","first-page":"197","DOI":"10.3745\/JIPS.2009.5.4.197","volume":"5","author":"R Savola","year":"2009","unstructured":"Savola, R.: A security taxonomization model for software-intensive systems. J. Inf. Process. Syst. 5(4), 197\u2013206 (2009)","journal-title":"J. Inf. Process. Syst."},{"key":"3_CR13","doi-asserted-by":"publisher","first-page":"78","DOI":"10.1016\/j.cose.2013.05.002","volume":"37","author":"R Savola","year":"2013","unstructured":"Savola, R.: Quality of security metrics and measurements. Comput. Secur. 37, 78\u201390 (2013)","journal-title":"Comput. Secur."},{"doi-asserted-by":"crossref","unstructured":"Schryen, G., Volkamer, M., Ries, S., Habib, S.-M.: A formal approach towards measuring trust in distributed systems. In: Proceedings of the ACM Symposium on Applied Computing, (SAC) (2011)","key":"3_CR14","DOI":"10.1145\/1982185.1982548"},{"key":"3_CR15","doi-asserted-by":"crossref","first-page":"155","DOI":"10.1007\/978-0-387-72198-9_7","volume-title":"Smart Cards, Tokens, Security and Applications","author":"Allan Tomlinson","year":"2008","unstructured":"Tomlinson, A.: Introduction to the TPM. In: Smart Cards, Tokens, Security and Applications, pp. 155\u2013172. Springer, Heidelberg (2008)"},{"unstructured":"Trusted Computing Group, TPM Main Specification Version 1.2 Level 2, Revision 116 (2011)","key":"3_CR16"}],"container-title":["Lecture Notes in Computer Science","Security and Trust Management"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-24858-5_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,8,14]],"date-time":"2023-08-14T09:10:39Z","timestamp":1692004239000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-24858-5_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319248578","9783319248585"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-24858-5_3","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]}}}