{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T20:57:05Z","timestamp":1742936225630,"version":"3.40.3"},"publisher-location":"Cham","reference-count":74,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319271606"},{"type":"electronic","value":"9783319271613"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-27161-3_6","type":"book-chapter","created":{"date-parts":[[2015,11,17]],"date-time":"2015-11-17T23:38:40Z","timestamp":1447803520000},"page":"57-70","source":"Crossref","is-referenced-by-count":3,"title":["STRATUS: Towards Returning Data Control to Cloud Users"],"prefix":"10.1007","author":[{"given":"Ryan K. L.","family":"Ko","sequence":"first","affiliation":[]},{"given":"Giovanni","family":"Russello","sequence":"additional","affiliation":[]},{"given":"Richard","family":"Nelson","sequence":"additional","affiliation":[]},{"given":"Shaoning","family":"Pang","sequence":"additional","affiliation":[]},{"given":"Aloysius","family":"Cheang","sequence":"additional","affiliation":[]},{"given":"Gill","family":"Dobbie","sequence":"additional","affiliation":[]},{"given":"Abdolhossein","family":"Sarrafzadeh","sequence":"additional","affiliation":[]},{"given":"Sivadon","family":"Chaisiri","sequence":"additional","affiliation":[]},{"given":"Muhammad Rizwan","family":"Asghar","sequence":"additional","affiliation":[]},{"given":"Geoffrey","family":"Holmes","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,12,29]]},"reference":[{"key":"6_CR1","unstructured":"Goldman, D., Pagliery, J., Segall, L.: How celebrities\u2019 nude photos get leaked. CNN Money (2014). \n                      http:\/\/money.cnn.com\/2014\/09\/01\/technology\/celebrity-nude-photos\/index.html?iid=EL\n                      \n                    . Accessed 7 September 2015"},{"key":"6_CR2","unstructured":"Quenqua, D.: Guardians of Their Smiles. The New York Times (2009). \n                      http:\/\/www.nytimes.com\/2009\/10\/25\/fashion\/25facebook.html\n                      \n                    . Accessed 7 September 2015"},{"key":"6_CR3","unstructured":"Isidore, C., Goldman, D.: Ashley Madison hackers post millions of customer names. CNN Money (2015). \n                      http:\/\/money.cnn.com\/2015\/08\/18\/technology\/ashley-madison-data-dump\/\n                      \n                    . Accessed 7 September 2015"},{"key":"6_CR4","unstructured":"Chen, A.: GCreep: Google Engineer Stalked Teens, Spied on Chats. GAWKER (2010). \n                      http:\/\/gawker.com\/5637234\/gcreep-google-engineer-stalked-teens-spied-on-chats\n                      \n                    . Accessed 7 September 2015"},{"key":"6_CR5","unstructured":"Cloud Controls Matrix v3.0 Info Sheet (2013). \n                      https:\/\/downloads.cloudsecurityalliance.org\/initiatives\/ccm\/CCM_v3_Info_Sheet.pdf\n                      \n                    . Accessed 7 September 2015"},{"key":"6_CR6","volume-title":"Information Security Based on ISO 27001\/ISO 1779: A Management Guide","author":"A Calder","year":"2006","unstructured":"Calder, A.: Information Security Based on ISO 27001\/ISO 1779: A Management Guide. Van Haren Publishing, Zaltbommel (2006)"},{"issue":"6","key":"6_CR7","doi-asserted-by":"publisher","first-page":"540","DOI":"10.1016\/j.clsr.2008.07.001","volume":"24","author":"EA Morse","year":"2008","unstructured":"Morse, E.A., Raval, V.: PCI DSS: payment card industry data security standards in context. Comput. Law Secur. Rev. 24(6), 540\u2013554 (2008)","journal-title":"Comput. Law Secur. Rev."},{"key":"6_CR8","doi-asserted-by":"crossref","unstructured":"Alhazmi, O.H., Malaiya, Y.K.: Assessing disaster recovery alternatives: on-site, colocation or cloud. In: The IEEE 23rd International Symposium on Software Reliability Engineering Workshops (ISSREW), pp. 19\u201320 (2012)","DOI":"10.1109\/ISSREW.2012.20"},{"key":"6_CR9","unstructured":"Wood, T., Cecchet, E., Ramakrishnan, K.K., Shenoy, P., Van der Merwe, J., Venkataramani, A.: Disaster recovery as a cloud service: economic benefits & deployment challenges. In: Proceedings of the 2nd USENIX Conference on Hot Topics in Cloud Computing (HotCloud 2010), Berkeley, CA, USA (2010)"},{"key":"6_CR10","doi-asserted-by":"crossref","unstructured":"Ko, R.K.L., Jagadpramana, P., Mowbray, M.: TrustCloud - a framework for accountability and trust in cloud computing. In: IEEE 2nd Cloud Forum for Practitioners (ICFP 2011), pp. 1\u20135. IEEE, Washington DC (2011)","DOI":"10.1109\/SERVICES.2011.91"},{"key":"6_CR11","doi-asserted-by":"crossref","unstructured":"Ko, R.K.L., Kirchberg, M., Lee, B.S.: From system-centric to data-centric logging-Accountability, trust & security in cloud computing. In: Defense Science Research Conference and Expo (DSR), pp. 1\u20134 (2011)","DOI":"10.1109\/DSR.2011.6026885"},{"key":"6_CR12","doi-asserted-by":"crossref","unstructured":"Ko, R.K.L., Lee, B.S., Pearson, S.: Towards achieving accountability, auditability and trust in cloud computing. In: International Workshop on Cloud Computing: Architecture, Algorithms and Applications (CloudComp2011), pp. 5\u201318, Kochi, India (2011)","DOI":"10.1007\/978-3-642-22726-4_45"},{"key":"6_CR13","doi-asserted-by":"crossref","unstructured":"Tan, Y.S., Ko, R.K.L., Jagadpramana, P., et al.: Tracking of data leaving the cloud. In: IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), pp. 137\u2013144 (2012)","DOI":"10.1109\/TrustCom.2012.282"},{"key":"6_CR14","doi-asserted-by":"crossref","unstructured":"Zhang, O.Q., Ko, R.K.L., Kirchberg, M., Suen, C.H., Jagadpramana, P., Lee, B.S.: How to track your data: rule-based data provenance tracing algorithms. In: 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), pp. 1429\u20131437 (2012)","DOI":"10.1109\/TrustCom.2012.175"},{"key":"6_CR15","unstructured":"RACKSPACE Cloud Monitoring (2015). \n                      http:\/\/www.rackspace.com\/cloud\/monitoring\/\n                      \n                    . Accessed 7 September 2015"},{"key":"6_CR16","unstructured":"vRealize Hyperic (2015). \n                      http:\/\/www.vmware.com\/products\/vrealize-hyperic\/\n                      \n                    . Accessed 7 September 2015"},{"key":"6_CR17","unstructured":"HyTrust Products (2015). \n                      http:\/\/www.hytrust.com\/products\/\n                      \n                    . Accessed 7 September 2015"},{"key":"6_CR18","unstructured":"Kim, G.H., Spafford, E.H.: Experiences with tripwire: using integrity checkers for intrusion detection. Purdue University Technical Reports (1994)"},{"key":"6_CR19","doi-asserted-by":"crossref","unstructured":"Ko, R.K.L., Jagadpramana, P., Lee, B.S.: Flogger: a file-centric logger for monitoring file access and transfers within cloud computing environments. In: 2011 IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), pp. 765\u2013771 (2011)","DOI":"10.1109\/TrustCom.2011.100"},{"key":"6_CR20","unstructured":"Ko R.K.L., Goh G., Mather T., Jaini S., Lim R.: Cloud Consumer Advocacy Questionnaire and Information Survey Results (CCAQIS) v1.0. Cloud Security Alliance (2011)"},{"key":"6_CR21","volume-title":"The Logic of Scientific Discovery","author":"KR Popper","year":"1959","unstructured":"Popper, K.R.: The Logic of Scientific Discovery. Taylor and Francis Group, Routledge (1959)"},{"key":"6_CR22","unstructured":"American Bar Association.: Achieving Legal and Business Order in Cyberspace: A Report on Global Jurisdiction Issues Created by the Internet. The Business Lawyer, vol. 55, pp. 1801\u20131946 (2000)"},{"key":"6_CR23","doi-asserted-by":"publisher","first-page":"187","DOI":"10.1093\/ijlit\/ear005","volume":"19","author":"S Bradshaw","year":"2011","unstructured":"Bradshaw, S., Millard, C., Walden, I.: Contracts for clouds: comparison and analysis of the terms and conditions of cloud computing services. Int. J. Law Inf. Technol. 19, 187\u2013223 (2011)","journal-title":"Int. J. Law Inf. Technol."},{"key":"6_CR24","doi-asserted-by":"crossref","unstructured":"Hon, W.K., Millard, C., Walden, I.: Negotiating cloud contracts - looking at clouds from both sides Now. Queen Mary School of Law Legal Studies Research Paper (2012)","DOI":"10.2139\/ssrn.2055199"},{"key":"6_CR25","unstructured":"Regulation (EC) No 45\/2001 of The European Parliament and of The Council. The European Parliament (2001)"},{"key":"6_CR26","unstructured":"Government of New Zealand. Summary Comparison with Overseas Jurisdictions (2010). \n                      http:\/\/www.consumeraffairs.govt.nz\/legislation-policy\/policy-reports-and-papers\/discussion-papers\/international-comparison-discussion-paper\/part-2-summary-comparison-with-overseas-jurisdictions\/\n                      \n                    . Accessed 7 September 2015"},{"key":"6_CR27","unstructured":"Susanto, H., Almunawar, M.N., Tuan, Y.C.: Information security management system standards: a comparative study of the big five (2011)"},{"key":"6_CR28","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"181","DOI":"10.1007\/978-3-642-38541-4_15","volume-title":"Distributed Applications and Interoperable Systems","author":"D Eyers","year":"2013","unstructured":"Eyers, D., Russello, G.: Toward unified and flexible security policies enforceable within the cloud. In: Dowling, J., Ta\u00efani, F. (eds.) DAIS 2013. LNCS, vol. 7891, pp. 181\u2013186. Springer, Heidelberg (2013)"},{"key":"6_CR29","doi-asserted-by":"publisher","first-page":"367","DOI":"10.3233\/JCS-2010-0415","volume":"19","author":"C Dong","year":"2011","unstructured":"Dong, C., Russello, G., Dulay, N.: Shared and searchable encrypted data for untrusted servers. J. Comput. Secur. 19, 367\u2013397 (2011)","journal-title":"J. Comput. Secur."},{"key":"6_CR30","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"264","DOI":"10.1007\/978-3-540-68265-3_17","volume-title":"Coordination Models and Languages","author":"G Russello","year":"2008","unstructured":"Russello, G., Dong, C., Dulay, N., Chaudron, M.R.V., van Steen, M.: Encrypted shared data spaces. In: Lea, D., Zavattaro, G. (eds.) COORDINATION 2008. LNCS, vol. 5052, pp. 264\u2013279. Springer, Heidelberg (2008)"},{"key":"6_CR31","doi-asserted-by":"publisher","first-page":"426","DOI":"10.1016\/j.scico.2009.07.011","volume":"75","author":"G Russello","year":"2010","unstructured":"Russello, G., Dong, C., Dulay, N., Chaudron, M.R.V., van Steen, M.: Providing data confidentiality against malicious hosts in shared data spaces. Sci. Comput. Program. 75, 426\u2013439 (2010)","journal-title":"Sci. Comput. Program."},{"key":"6_CR32","doi-asserted-by":"crossref","unstructured":"Asghar, M.R., Ion, M., Russello, G., Crispo, B.: ESPOON: enforcing encrypted security policies in outsourced environments. In: ARES (2011)","DOI":"10.1109\/ARES.2011.23"},{"key":"6_CR33","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"145","DOI":"10.1007\/978-3-642-27585-2_12","volume-title":"Open Problems in Network Security","author":"MR Asghar","year":"2012","unstructured":"Asghar, M.R., Ion, M., Russello, G., Crispo, B.: Securing data provenance in the cloud. In: Camenisch, J., Kesdogan, D. (eds.) iNetSec 2011. LNCS, vol. 7039, pp. 145\u2013160. Springer, Heidelberg (2012)"},{"key":"6_CR34","doi-asserted-by":"crossref","unstructured":"Ion, M., Russello, G., Crispo, B.: An implementation of event and filter confidentiality in pub\/sub systems and its application to e-health. In: ACM Conference on Computer and Communications Security (2010)","DOI":"10.1145\/1866307.1866401"},{"key":"6_CR35","unstructured":"Ion, M., Russello, G., Crispo, B.: Providing confidentiality in content-based publish\/subscribe systems. In: SECRYPT (2010)"},{"key":"6_CR36","series-title":"Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","doi-asserted-by":"publisher","first-page":"272","DOI":"10.1007\/978-3-642-16161-2_16","volume-title":"Security and Privacy in Communication Networks","author":"M Ion","year":"2010","unstructured":"Ion, M., Russello, G., Crispo, B.: Supporting publication and subscription confidentiality in pub\/sub networks. In: Jajodia, S., Zhou, J. (eds.) SecureComm 2010. LNICST, vol. 50, pp. 272\u2013289. Springer, Heidelberg (2010)"},{"key":"6_CR37","doi-asserted-by":"crossref","unstructured":"Ion, M., Russello, G., Crispo, B.: Enforcing multi-user access policies to encrypted cloud databases. In: POLICY (2011)","DOI":"10.1109\/POLICY.2011.14"},{"key":"6_CR38","doi-asserted-by":"publisher","first-page":"2014","DOI":"10.1016\/j.comnet.2012.02.013","volume":"56","author":"M Ion","year":"2012","unstructured":"Ion, M., Russello, G., Crispo, B.: Design and implementation of a confidentiality and access control solution for publish\/subscribe systems. Comput. Netw. 56, 2014\u20132037 (2012)","journal-title":"Comput. Netw."},{"key":"6_CR39","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"114","DOI":"10.1007\/978-3-642-23556-6_8","volume-title":"Secure Data Management","author":"C B\u00f6sch","year":"2011","unstructured":"B\u00f6sch, C., Brinkman, R., Hartel, P., Jonker, W.: Conjunctive wildcard search over encrypted data. In: Jonker, W., Petkovi\u0107, M. (eds.) SDM 2011. LNCS, vol. 6933, pp. 114\u2013127. Springer, Heidelberg (2011)"},{"key":"6_CR40","doi-asserted-by":"crossref","unstructured":"Popa, R.A., Redfield, C.M.S., Zeldovich N., Balakrishnan, H.: CryptDB: protecting confidentiality with encrypted query processing. In: SOSP (2011)","DOI":"10.1145\/2043556.2043566"},{"key":"6_CR41","unstructured":"Song, D.X., Wagner, D., Perrig, A.: Practical techniques for searches on encrypted data. In: IEEE Symposium on Security and Privacy (2000)"},{"key":"6_CR42","doi-asserted-by":"crossref","unstructured":"Li, M., Yu, S., Cao, N., Lou, W.: Authorized private keyword search over encrypted data in cloud computing. In: 2011 31st International Conference on Distributed Computing Systems (ICDCS) (2011)","DOI":"10.1109\/ICDCS.2011.55"},{"key":"6_CR43","doi-asserted-by":"publisher","first-page":"763","DOI":"10.1016\/j.jss.2009.11.726","volume":"83","author":"HS Rhee","year":"2010","unstructured":"Rhee, H.S., Park, J.H., Susilo, W., Lee, D.H.: Trapdoor security in a searchable public-key encryption scheme with a designated tester. J. Syst. Softw. 83, 763\u2013771 (2010)","journal-title":"J. Syst. Softw."},{"key":"6_CR44","doi-asserted-by":"crossref","unstructured":"Yang, Y., Lu, H., Weng, J.: Multi-user private keyword search for cloud computing. In: 2011 IEEE Third International Conference on the Cloud Computing Technology and Science (CloudCom) (2011)","DOI":"10.1109\/CloudCom.2011.43"},{"key":"6_CR45","doi-asserted-by":"crossref","unstructured":"Zhu, B., Zhu, B., Ren, K.: PEKSrand: providing predicate privacy in public-key encryption with keyword search. In: ICC (2011)","DOI":"10.1109\/icc.2011.5962452"},{"key":"6_CR46","unstructured":"Gentry, C.: A fully homomorphic encryption scheme. Stanford University (2009)"},{"key":"6_CR47","doi-asserted-by":"crossref","unstructured":"Naehrig M., Lauter K., Vaikuntanathan V.: Can homomorphic encryption be practical? In: Proceedings of the 3rd ACM Workshop on Cloud Computing Security Workshop, pp. 113\u2013124 (2011)","DOI":"10.1145\/2046660.2046682"},{"key":"6_CR48","doi-asserted-by":"crossref","unstructured":"Brakerski, Z., Gentry, C., Vaikuntanathan, V.: (Leveled) fully homomorphic encryption without bootstrapping. In: ITCS (2012)","DOI":"10.1145\/2090236.2090262"},{"key":"6_CR49","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"465","DOI":"10.1007\/978-3-642-29011-4_28","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2012","author":"C Gentry","year":"2012","unstructured":"Gentry, C., Halevi, S., Smart, N.P.: Fully homomorphic encryption with polylog overhead. In: Pointcheval, D., Johansson, T. (eds.) EUROCRYPT 2012. LNCS, vol. 7237, pp. 465\u2013482. Springer, Heidelberg (2012)"},{"key":"6_CR50","unstructured":"Witten, I.H., Frank, E., Trig, L.E., Hall, M.A., Holmes, G., Cunningham, S.J.: Weka: practical machine learning tools and techniques with Java implementations (1999)"},{"key":"6_CR51","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1145\/1052812.1052824","volume":"35","author":"R Nelson","year":"2005","unstructured":"Nelson, R., Lawson, D., Lorier, P.: Analysis of long duration traces. ACM SIGCOMM Comput. Commun. Rev. 35, 45\u201352 (2005)","journal-title":"ACM SIGCOMM Comput. Commun. Rev."},{"key":"6_CR52","unstructured":"Alcock, S., Nelson, R., Miles, D.: Investigating the impact of service provider NAT on residential broadband users (2010)"},{"key":"6_CR53","doi-asserted-by":"crossref","unstructured":"Lof, A., Nelson, R.: Comparing anomaly detection methods in computer networks. In: Fifth International Conference on Internet Monitoring and Protection (ICIMP), pp. 7\u201310 (2010)","DOI":"10.1109\/ICIMP.2010.9"},{"key":"6_CR54","doi-asserted-by":"publisher","first-page":"42","DOI":"10.1145\/2185376.2185382","volume":"42","author":"S Alcock","year":"2012","unstructured":"Alcock, S., Lorier, P., Nelson, R.: Libtrace: a packet capture and analysis library. ACM SIGCOMM Comput. Commun. Rev. 42, 42\u201348 (2012)","journal-title":"ACM SIGCOMM Comput. Commun. Rev."},{"key":"6_CR55","unstructured":"Cloud Security Alliance. The notorious nine: cloud computing top threats in 2013 (2013). \n                      https:\/\/cloudsecurityalliance.org\/group\/top-threats\/\n                      \n                    . Accessed 7 September 2015"},{"key":"6_CR56","unstructured":"Krautheim, F.J.: Private virtual infrastructure for cloud computing. In: Proceedings of the 2009 Conference on Hot Topics in Cloud Computing (2009)"},{"key":"6_CR57","unstructured":"Dr Dobbs Journal. SIEM: A Market Snapshot (2007). \n                      http:\/\/www.drdobbs.com\/siem-a-market-snapshot\/197002909\n                      \n                    . Accessed 7 September 2015"},{"issue":"12","key":"6_CR58","first-page":"84","volume":"49","author":"RKL Ko","year":"2013","unstructured":"Ko, R.K.L., Lee, S.S.G., Rajan, V.: Understanding cloud failures. IEEE Spectr. 49(12), 84 (2013)","journal-title":"IEEE Spectr."},{"key":"6_CR59","volume-title":"Fuzzing: Brute Force Vulnerability Discovery","author":"M Sutton","year":"2007","unstructured":"Sutton, M., Greene, A., Amini, P.: Fuzzing: Brute Force Vulnerability Discovery. Pearson Education, Upper Saddle River (2007)"},{"key":"6_CR60","volume-title":"Fuzzing for Software Security Testing and Quality Assurance","author":"A Takanen","year":"2008","unstructured":"Takanen, A., Demott, J.D., Miller, C.: Fuzzing for Software Security Testing and Quality Assurance. Artech House, Norwood (2008)"},{"key":"6_CR61","unstructured":"THC.org. THC-IPV6 (2015). \n                      http:\/\/www.thc.org\/thc-ipv6\/\n                      \n                    . Accessed 7 September 2015"},{"key":"6_CR62","unstructured":"Trend Micro. SecureCloud - Securing and Controlling Sensitive Data in the Cloud. SecureCloud (2015). \n                      http:\/\/www.trendmicro.com\/us\/enterprise\/cloud-solutions\/secure-cloud\/index.html\n                      \n                    . Accessed 7 September 2015"},{"key":"6_CR63","unstructured":"Aura Information Security (2012). Aura RedShield (2015). \n                      https:\/\/auraredshield.com\/\n                      \n                    . Accessed 7 September 2015"},{"key":"6_CR64","first-page":"21","volume":"32","author":"E Bertino","year":"2009","unstructured":"Bertino, E., Paci, F., Ferrini, R., Shang, N.: Privacy-preserving digital identity management for cloud computing. IEEE Data Eng. Bull. 32, 21\u201327 (2009)","journal-title":"IEEE Data Eng. Bull."},{"key":"6_CR65","first-page":"45","volume":"7","author":"A Gopalakrishnan","year":"2009","unstructured":"Gopalakrishnan, A.: Cloud computing identity management. SETLabs Briefings 7, 45\u201354 (2009)","journal-title":"SETLabs Briefings"},{"key":"6_CR66","doi-asserted-by":"crossref","unstructured":"Celesti, A., Tusa, F., Villari, M., Puliafito, A.: Security and cloud computing: intercloud identity management infrastructure. In: The 19th IEEE International Workshop on Enabling Technologies: Infrastructures for Collaborative Enterprises (WETICE), pp. 263\u2013265 (2010)","DOI":"10.1109\/WETICE.2010.49"},{"key":"6_CR67","unstructured":"Agrafiotis, I., Creese, S., Goldsmith, M., Papanikolaou, N., Mont, M.C., Pearson, S.: Defining consent and revocation policies. In: Proceedings of 2010 IFIP\/PrimeLife Summer School (2010)"},{"key":"6_CR68","doi-asserted-by":"crossref","unstructured":"Yu, S., Wang, C., Ren, K., Lou, W.: Attribute based data sharing with attribute revocation. In: Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security, pp. 261\u2013270 (2010)","DOI":"10.1145\/1755688.1755720"},{"key":"6_CR69","unstructured":"Mont, M.C., Sharma, V., Pearson, S.: EnCoRe: dynamic consent, policy enforcement and accountable information sharing within and across organisations. Technical report, HP Laboratories HPL-2012-36 (2012)"},{"key":"6_CR70","unstructured":"Pang, S.: Research and development on decentralized analytical methods for network traffics with regional information. Unitec-NICT Research Center on Computational Intelligence for CyberSecurity (2012)"},{"issue":"2","key":"6_CR71","doi-asserted-by":"publisher","first-page":"552","DOI":"10.1109\/TSMCB.2011.2169056","volume":"42","author":"S Pang","year":"2012","unstructured":"Pang, S., Ban, T., Kadobayashi, Y., Kasabov, N.: LDA merging and splitting with applications to multi-agent cooperative learning and system alteration. IEEE Trans. Syst. Man Cybern. Part B. 42(2), 552\u2013564 (2012)","journal-title":"IEEE Trans. Syst. Man Cybern. Part B."},{"key":"6_CR72","unstructured":"Wood, T., Gerber, A., Ramakrishnan, K., Van der Merwe, J., Shenoy, P.: The case for enterprise ready virtual private clouds. In: Proceedings of the Usenix Workshop on Hot Topics in Cloud Computing (HotCloud), San Diego, CA, USA (2009)"},{"key":"6_CR73","unstructured":"Citrix Systems Inc., Business Continuity (2015). \n                      https:\/\/www.citrix.com\/solutions\/business-continuity\/overview.html\n                      \n                    . Accessed 7 September 2015"},{"key":"6_CR74","doi-asserted-by":"crossref","unstructured":"Pokharel, M., Lee, S., Park, J.S.: Disaster recovery for system architecture using cloud computing. In: The 10th IEEE\/IPSJ International Symposium on Applications and the Internet (SAINT), pp. 304\u2013307 (2010)","DOI":"10.1109\/SAINT.2010.23"}],"container-title":["Lecture Notes in Computer Science","Algorithms and Architectures for Parallel Processing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-27161-3_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,31]],"date-time":"2019-05-31T11:44:55Z","timestamp":1559303095000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-27161-3_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319271606","9783319271613"],"references-count":74,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-27161-3_6","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]}}}