{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,31]],"date-time":"2025-05-31T04:11:59Z","timestamp":1748664719079,"version":"3.41.0"},"publisher-location":"Cham","reference-count":43,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319253596"},{"type":"electronic","value":"9783319253602"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-25360-2_2","type":"book-chapter","created":{"date-parts":[[2015,10,7]],"date-time":"2015-10-07T06:23:32Z","timestamp":1444199012000},"page":"14-25","source":"Crossref","is-referenced-by-count":7,"title":["Towards a New Paradigm for Privacy and\u00a0Security in Cloud Services"],"prefix":"10.1007","author":[{"given":"Thomas","family":"Lor\u00fcnser","sequence":"first","affiliation":[]},{"given":"Charles Bastos","family":"Rodriguez","sequence":"additional","affiliation":[]},{"given":"Denise","family":"Demirel","sequence":"additional","affiliation":[]},{"given":"Simone","family":"Fischer-H\u00fcbner","sequence":"additional","affiliation":[]},{"given":"Thomas","family":"Gro\u00df","sequence":"additional","affiliation":[]},{"given":"Thomas","family":"L\u00e4nger","sequence":"additional","affiliation":[]},{"given":"Mathieu","family":"des Noes","sequence":"additional","affiliation":[]},{"given":"Henrich C.","family":"P\u00f6hls","sequence":"additional","affiliation":[]},{"given":"Boris","family":"Rozenberg","sequence":"additional","affiliation":[]},{"given":"Daniel","family":"Slamanig","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,11,6]]},"reference":[{"key":"2_CR1","doi-asserted-by":"crossref","unstructured":"Andersson, C., Camenisch, J., Crane, S., Fischer-H\u00fcbner, S., Leenes, R., Pearson, S., Pettersson, J.S., Sommer, D.: Trust in PRIME. In: ISSPIT, pp. 552\u2013559 (2005)","DOI":"10.1109\/ISSPIT.2005.1577157"},{"key":"2_CR2","doi-asserted-by":"crossref","unstructured":"Backes, M., Fiore, D., Reischuk, R.M.: Verifiable delegation of computation on outsourced data. In: ACM CCS, pp. 863\u2013874. ACM (2013)","DOI":"10.1145\/2508859.2516681"},{"key":"2_CR3","doi-asserted-by":"crossref","unstructured":"Beek, M.T., Bucchiarone, A., Gnesi, S.: A Survey on Service Composition Approaches: From Industrial Standards to Formal Methods. Technical report 2006-TR-15 (2006)","DOI":"10.1109\/ICIW.2007.71"},{"issue":"4","key":"2_CR4","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2535929","volume":"9","author":"A Bessani","year":"2013","unstructured":"Bessani, A., Correia, M., Quaresma, B., Andr\u00e9, F., Sousa, P.: Depsky: dependable and secure storage in a cloud-of-clouds. Trans. Storage 9(4), 1\u201312 (2013)","journal-title":"Trans. Storage"},{"key":"2_CR5","doi-asserted-by":"crossref","unstructured":"Bleikertz, S., Gro\u00df, T.: A virtualization assurance language for isolation and deployment. In: POLICY. IEEE, June 2011","DOI":"10.1109\/POLICY.2011.10"},{"key":"2_CR6","unstructured":"Bleikertz, S., Gro\u00df, T., M\u00f6dersheim, S.: Security analysis of dynamic infrastructure clouds (extended abstract), September 2013"},{"key":"2_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"392","DOI":"10.1007\/978-3-642-23822-2_22","volume-title":"Computer Security \u2013 ESORICS 2011","author":"S Bleikertz","year":"2011","unstructured":"Bleikertz, S., Gro\u00df, T., Schunter, M., Eriksson, K.: Automated information flow analysis of virtualized infrastructures. In: Atluri, V., Diaz, C. (eds.) ESORICS 2011. LNCS, vol. 6879, pp. 392\u2013415. Springer, Heidelberg (2011)"},{"key":"2_CR8","doi-asserted-by":"crossref","unstructured":"Bleikertz, S., Vogel, C., Gro\u00df, T.: Cloud radar: near real-time detection of security failures in dynamic virtualized infrastructures. In: ACSAC, pp. 26\u201335. ACM (2014)","DOI":"10.1145\/2664243.2664274"},{"key":"2_CR9","doi-asserted-by":"crossref","unstructured":"Brickell, E., Camenisch, J., Chen, L.: Direct anonymous attestation. In: ACM CCS, pp. 225\u2013234. ACM Press (2004)","DOI":"10.1145\/1030083.1030103"},{"key":"2_CR10","doi-asserted-by":"crossref","unstructured":"Buchmann, J., Demirel, D., van de Graaf, J.: Towards a publicly-verifiable mix-net providing everlasting privacy. In: Financial Cryptography, pp. 197\u2013204 (2013)","DOI":"10.1007\/978-3-642-39884-1_16"},{"key":"2_CR11","doi-asserted-by":"crossref","unstructured":"Camenisch, J., Herreweghen, E.V.: Design and implementation of the idemix anonymous credential system. In: ACM CCS, pp. 21\u201330. ACM (2002)","DOI":"10.1145\/586110.586114"},{"key":"2_CR12","doi-asserted-by":"crossref","unstructured":"Canard, S., Lescuyer, R.: Protecting privacy by sanitizing personal data: a new approach to anonymous credentials. In: ASIA CCS, pp. 381\u2013392. ACM (2013)","DOI":"10.1145\/2484313.2484363"},{"key":"2_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"514","DOI":"10.1007\/978-3-319-10879-7_29","volume-title":"Security and Cryptography for Networks","author":"D Catalano","year":"2014","unstructured":"Catalano, D.: Homomorphic signatures and message authentication codes. In: Abdalla, M., De Prisco, R. (eds.) SCN 2014. LNCS, vol. 8642, pp. 514\u2013519. Springer, Heidelberg (2014)"},{"key":"2_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"193","DOI":"10.1007\/978-3-662-45608-8_11","volume-title":"Advances in Cryptology \u2013 ASIACRYPT 2014","author":"D Catalano","year":"2014","unstructured":"Catalano, D., Marcedone, A., Puglisi, O.: Authenticating computation on groups: new homomorphic primitives and applications. In: Sarkar, P., Iwata, T. (eds.) ASIACRYPT 2014, Part II. LNCS, vol. 8874, pp. 193\u2013212. Springer, Heidelberg (2014)"},{"key":"2_CR15","doi-asserted-by":"crossref","unstructured":"Chase, M., Kohlweiss, M., Lysyanskaya, A., Meiklejohn, S.: Malleable signatures: new definitions and delegatable anonymous credentials. In: CSF, pp. 199\u2013213. IEEE (2014)","DOI":"10.1109\/CSF.2014.22"},{"key":"2_CR16","unstructured":"Cloud Security Alliance: Cloud security alliance website (2009). https:\/\/cloudsecurityalliance.org . Accessed 31 March 2015"},{"key":"2_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"148","DOI":"10.1007\/978-3-642-24178-9_11","volume-title":"Information Hiding","author":"G Danezis","year":"2011","unstructured":"Danezis, G., Kohlweiss, M., Rial, A.: Differentially private billing with rebates. In: Filler, T., Pevn\u00fd, T., Craver, S., Ker, A. (eds.) IH 2011. LNCS, vol. 6958, pp. 148\u2013162. Springer, Heidelberg (2011)"},{"issue":"1","key":"2_CR18","doi-asserted-by":"publisher","first-page":"59","DOI":"10.1145\/1558334.1558343","volume":"38","author":"G Lorenzo Di","year":"2009","unstructured":"Di Lorenzo, G., Hacid, H., Benatallah, B., Paik, H.Y.: Data integration in mashups. Sigmod Rec. 38(1), 59\u201366 (2009)","journal-title":"Sigmod Rec."},{"key":"2_CR19","volume-title":"Service-Oriented Architecture: Concepts, Technology, and Design","author":"T Erl","year":"2006","unstructured":"Erl, T.: Service-Oriented Architecture: Concepts, Technology, and Design. Pearson Education India, Delhi (2006)"},{"key":"2_CR20","unstructured":"European Commission: European cloud computing strategy \u201cunleashing the potential of cloud computing in europe\u201d (2012). http:\/\/ec.europa.eu\/digital-agenda\/en\/european-cloud-computing-strategy . Accessed 31 March 2015"},{"key":"2_CR21","unstructured":"European Union Agency for Network and Information Security-ENISA: Cloud computing repository. http:\/\/www.enisa.europa.eu\/activities\/Resilience-and-CIIP\/cloud-computing"},{"key":"2_CR22","doi-asserted-by":"crossref","unstructured":"Fiore, D., Gennaro, R., Pastro, V.: Efficiently verifiable computation on encrypted data. In: ACM CCS, pp. 844\u2013855 (2014)","DOI":"10.1145\/2660267.2660366"},{"key":"2_CR23","doi-asserted-by":"publisher","DOI":"10.1201\/b15441","volume-title":"Cyber Power - Crime. Conflict and Security in Cyberspace","author":"S Ghernaouti-Helie","year":"2013","unstructured":"Ghernaouti-Helie, S.: Cyber Power - Crime. Conflict and Security in Cyberspace. EPFL Press, Burlington (2013)"},{"key":"2_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"293","DOI":"10.1007\/978-3-662-47854-7_18","volume-title":"Financial Cryptography and Data Security","author":"T Gro\u00df","year":"2015","unstructured":"Gro\u00df, T.: Signatures and efficient proofs on committed graphs and NP-statements. In: B\u00f6hme, R., Okamoto, T. (eds.) FC 2015. LNCS, vol. 8975, pp. 293\u2013314. Springer, Heidelberg (2015)"},{"key":"2_CR25","doi-asserted-by":"crossref","unstructured":"Gupta, V.H., Gopinath, K.: $$\\text{ G }_{\\text{ its }}^2$$ G its 2 vsr: an information theoretical secure verifiable secret redistribution protocol for long-term archival storage. In: Security in Storage Workshop, SISW 2007, pp. 22\u201333. IEEE Computer Society, Washington, DC, USA (2007). http:\/\/dx.doi.org\/10.1109\/SISW.2007.9","DOI":"10.1109\/SISW.2007.9"},{"key":"2_CR26","doi-asserted-by":"crossref","unstructured":"Hanser, C., Slamanig, D.: Blank digital signatures. In: ASIA CCS. ACM (2013)","DOI":"10.1145\/2484313.2484324"},{"key":"2_CR27","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"491","DOI":"10.1007\/978-3-662-45611-8_26","volume-title":"Advances in Cryptology \u2013 ASIACRYPT 2014","author":"C Hanser","year":"2014","unstructured":"Hanser, C., Slamanig, D.: Structure-preserving signatures on equivalence classes and their application to anonymous credentials. In: Sarkar, P., Iwata, T. (eds.) ASIACRYPT 2014. LNCS, vol. 8873, pp. 491\u2013511. Springer, Heidelberg (2014)"},{"key":"2_CR28","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"245","DOI":"10.1007\/978-3-642-39077-7_13","volume-title":"Privacy Enhancing Technologies","author":"M Harbach","year":"2013","unstructured":"Harbach, M., Fahl, S., Rieger, M., Smith, M.: On the acceptance of privacy-preserving authentication technology: the curious case of national identity cards. In: De Cristofaro, E., Wright, M. (eds.) PETS 2013. LNCS, vol. 7981, pp. 245\u2013264. Springer, Heidelberg (2013)"},{"key":"2_CR29","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"244","DOI":"10.1007\/3-540-45760-7_17","volume-title":"Topics in Cryptology - CT-RSA 2002","author":"R Johnson","year":"2002","unstructured":"Johnson, R., Molnar, D., Song, D., Wagner, D.: Homomorphic signature schemes. In: Preneel, B. (ed.) CT-RSA 2002. LNCS, vol. 2271, pp. 244\u2013262. Springer, Heidelberg (2002)"},{"issue":"2","key":"2_CR30","doi-asserted-by":"publisher","first-page":"246","DOI":"10.1145\/1698750.1698756","volume":"13","author":"T Moran","year":"2010","unstructured":"Moran, T., Naor, M.: Split-ballot voting: everlasting privacy with distributed trust. ACM Trans. Inf. Syst. Secur. 13(2), 246\u2013255 (2010)","journal-title":"ACM Trans. Inf. Syst. Secur."},{"issue":"4","key":"2_CR31","doi-asserted-by":"publisher","first-page":"594","DOI":"10.1007\/s00145-010-9068-8","volume":"23","author":"J M\u00fcller-Quade","year":"2010","unstructured":"M\u00fcller-Quade, J., Unruh, D.: Long-term security and universal composability. J. Cryptol. 23(4), 594\u2013671 (2010)","journal-title":"J. Cryptol."},{"key":"2_CR32","unstructured":"National Institute of Standards and Technology-NIST: Cloud computing program. http:\/\/www.nist.gov\/itl\/cloud\/index.cfm . Accessed 31 March 2015"},{"key":"2_CR33","unstructured":"Paquin, C., Zaverucha, G.: U-prove cryptographic specification v1.1, revision 3. Technical report, Microsoft Corporation (2013)"},{"key":"2_CR34","doi-asserted-by":"crossref","unstructured":"Pfeffer, H., Linner, D., Steglich, S.: Modeling and controlling dynamic service compositions. In: Computing in the Global Information Technology, pp. 210\u2013216. IEEE (2008)","DOI":"10.1109\/ICCGI.2008.40"},{"key":"2_CR35","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"457","DOI":"10.1007\/978-3-319-07536-5_27","volume-title":"Applied Cryptography and Network Security","author":"HC P\u00f6hls","year":"2014","unstructured":"P\u00f6hls, H.C., Samelin, K.: On updatable redactable signatures. In: Boureanu, I., Owesarski, P., Vaudenay, S. (eds.) ACNS 2014. LNCS, vol. 8479, pp. 457\u2013475. Springer, Heidelberg (2014)"},{"key":"2_CR36","unstructured":"PRWeb: A cloud computing forecast summary for 2013\u20132017 from idc, gartner and kpmg, citing a study by accenture (2013). http:\/\/www.prweb.com\/releases\/2013\/11\/prweb11341594.htm . Accessed 31 March 2015"},{"key":"2_CR37","doi-asserted-by":"crossref","unstructured":"Schiffman, J., Sun, Y., Vijayakumar, H., Jaeger, T.: Cloud verifier: verifiable auditing service for IaaS clouds. In: CSA, June 2013","DOI":"10.1109\/SERVICES.2013.37"},{"key":"2_CR38","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"73","DOI":"10.1007\/978-3-642-28496-0_5","volume-title":"Selected Areas in Cryptography","author":"D Slamanig","year":"2012","unstructured":"Slamanig, D.: Efficient schemes for anonymous yet authorized and bounded use of cloud resources. In: Miri, A., Vaudenay, S. (eds.) SAC 2011. LNCS, vol. 7118, pp. 73\u201391. Springer, Heidelberg (2012)"},{"key":"2_CR39","unstructured":"Slamanig, D., Hanser, C.: On cloud storage and the cloud of clouds approach. In: ICITST-2012, pp. 649\u2013655. IEEE Press (2012)"},{"key":"2_CR40","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"285","DOI":"10.1007\/3-540-45861-1_22","volume-title":"Information Security and Cryptology - ICISC 2001","author":"R Steinfeld","year":"2002","unstructured":"Steinfeld, R., Bull, L., Zheng, Y.: Content extraction signatures. In: Kim, K. (ed.) ICISC 2001. LNCS, vol. 2288, p. 285. Springer, Heidelberg (2002)"},{"key":"2_CR41","unstructured":"Transparency Market Research: Cloud computing services market - global industry size, share, trends, analysis and forecasts 2012\u20132018 (2012). http:\/\/www.transparencymarketresearch.com\/cloud-computing-services-market.html . Accessed 31 March 2015"},{"issue":"2","key":"2_CR42","doi-asserted-by":"publisher","first-page":"74","DOI":"10.1145\/2641562","volume":"58","author":"M Walfish","year":"2015","unstructured":"Walfish, M., Blumberg, A.J.: Verifying computations without reexecuting them. Commun. ACM 58(2), 74\u201384 (2015)","journal-title":"Commun. ACM"},{"key":"2_CR43","doi-asserted-by":"crossref","unstructured":"W\u00e4stlund, E., Angulo, J., Fischer-H\u00fcbner, S.: Evoking comprehensive mental models of anonymous credentials. In: iNetSeC, pp. 1\u201314 (2011)","DOI":"10.1007\/978-3-642-27585-2_1"}],"container-title":["Communications in Computer and Information Science","Cyber Security and Privacy"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-25360-2_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,30]],"date-time":"2025-05-30T22:55:57Z","timestamp":1748645757000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-25360-2_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319253596","9783319253602"],"references-count":43,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-25360-2_2","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2015]]}}}