{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,7]],"date-time":"2025-10-07T11:35:39Z","timestamp":1759836939419},"publisher-location":"Cham","reference-count":24,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319647005"},{"type":"electronic","value":"9783319647012"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-64701-2_51","type":"book-chapter","created":{"date-parts":[[2017,7,25]],"date-time":"2017-07-25T04:56:55Z","timestamp":1500958615000},"page":"643-656","source":"Crossref","is-referenced-by-count":7,"title":["Towards Dependably Detecting Geolocation of Cloud Servers"],"prefix":"10.1007","author":[{"given":"Leo","family":"Hippelainen","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Ian","family":"Oliver","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Shankar","family":"Lal","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2017,7,26]]},"reference":[{"key":"51_CR1","doi-asserted-by":"crossref","unstructured":"Palad, N., Michalas, A.: One of our hosts in another country: challenges of data geolocation in cloud storage. In: 4th International Conference on Wireless Communications, Vehicular Technology, Information Theory and Aerospace & Electronic Systems (VITAE), pp. 1\u20136 (2014)","DOI":"10.1109\/VITAE.2014.6934507"},{"key":"51_CR2","unstructured":"The OECD Privacy Framework, https:\/\/www.oecd.org\/sti\/ieconomy\/oecd_privacy_framework.pdf . Accessed 2013"},{"key":"51_CR3","doi-asserted-by":"crossref","unstructured":"Hippel\u00e4inen, L., Oliver, I., Shankar, L.: Survey of cloud server geolocating techniques. In: Proceedings of 19th FRUCT Conference, http:\/\/fruct.org\/publications\/fruct19\/files\/Hip.pdf . Accessed 21 Nov 2016","DOI":"10.23919\/FRUCT.2016.7892183"},{"key":"51_CR4","unstructured":"Lawful interception. http:\/\/www.etsi.org\/technologies-clusters\/technologies\/lawful-interception"},{"key":"51_CR5","unstructured":"Kittleson, N.: Trusted computing overview. National Institute of Standards and Technology, https:\/\/scap.nist.gov\/events\/2012\/itsac\/presentations\/day2\/4oct_11am_kittleson.pdf . Accessed 04 Oct 2012"},{"key":"51_CR6","unstructured":"Wilkins, R., Nixon, T.: The Chain of Trust, http:\/\/www.uefi.org\/sites\/default\/files\/resources\/UEFI%20Forum%20White%20Paper%20-%20Chain%20of%20Trust%20Introduction_Final.pdf . Accessed 21 June 2016"},{"key":"51_CR7","unstructured":"Trusted Computing Group: Trusted Platform Module Library Specification, Family \u201c2.0\u201d, Level 00, Revision 01.38 https:\/\/trustedcomputinggroup.org\/tpm-library-specification\/ . Accessed Sept. 2016"},{"key":"51_CR8","doi-asserted-by":"crossref","unstructured":"Futral, W., Greene, J.: Intel Trusted Execution Technology for Server Platforms. Apress (2013)","DOI":"10.1007\/978-1-4302-6149-0"},{"key":"51_CR9","unstructured":"Jurisdiction. Legal Information Institute, https:\/\/www.law.cornell.edu\/wex\/jurisdiction"},{"key":"51_CR10","unstructured":"Definition: data sovereignty. WhatIs, http:\/\/whatis.techtarget.com\/definition\/data-sovereignty . Accessed Mar 2013"},{"key":"51_CR11","doi-asserted-by":"crossref","unstructured":"Kuner, C.: Regulation of transborder data flows under data protection and privacy law: past, present and future. OECD Digital Economy Papers, No. 187 (2011)","DOI":"10.2139\/ssrn.1689483"},{"key":"51_CR12","unstructured":"Regulation on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing Directive 95\/46\/EC (General Data Protection Regulation), European Union, April 2016"},{"issue":"2","key":"51_CR13","doi-asserted-by":"crossref","first-page":"148","DOI":"10.1109\/TDSC.2015.2482484","volume":"13","author":"S Zawoad","year":"2016","unstructured":"Zawoad, S., Kumar Dutta, A.: Hasan: Towards Building Forensics Enabled Cloud Through Secure Logging-as-a-Service. IEEE Trans. Dependable Secure Comput. 13(2), 148\u2013162 (2016)","journal-title":"IEEE Trans. Dependable Secure Comput."},{"key":"51_CR14","doi-asserted-by":"crossref","unstructured":"Khan, S., Gani, A., Wahab, A., Bagiwa, M., Shiraz, M., Khan, S., Buyya, R., Zomaya, A.: Cloud log forensics: foundations, state-of-the-art, and future directions. ACM Comput. Surv. 49(1), Article 7 (2016)","DOI":"10.1145\/2906149"},{"key":"51_CR15","doi-asserted-by":"crossref","unstructured":"Albeshri, A.A., Boyd, C., Gonzalez Nieto, J.: Geoproof: proofs of geographic location for cloud computing environment. In: Proceedings of the 32nd International Conference on Distributed Computing Systems Workshops 2012, Macau, China, pp. 506\u2013514 (2012)","DOI":"10.1109\/ICDCSW.2012.50"},{"key":"51_CR16","unstructured":"Information technology \u2013 Trusted Platform Module Library \u2013 Parts 1 to 4. Standard 11889-2015, ISO\/IEC (2015)"},{"key":"51_CR17","unstructured":"ARM Limited: ARM Security Technology Building a Secure System using TrustZone Technology. ARM Infocenter, http:\/\/infocenter.arm.com\/help\/index.jsp?topic=\/com.arm.doc.prd29-genc-009492c\/CACGCHFE.html"},{"key":"51_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"344","DOI":"10.1007\/3-540-48285-7_30","volume-title":"Advances in Cryptology \u2014 EUROCRYPT \u201993","author":"S Brands","year":"1994","unstructured":"Brands, S., Chaum, D.: Distance-bounding protocols. In: Helleseth, T. (ed.) EUROCRYPT 1993. LNCS, vol. 765, pp. 344\u2013359. Springer, Heidelberg (1994). doi: 10.1007\/3-540-48285-7_30"},{"key":"51_CR19","unstructured":"LAN\/MAN Standards Committee: Station and Media Access Control Connectivity Discovery, New York, USA (2009)"},{"key":"51_CR20","unstructured":"Ochoa Aday, L., Cervell\u00f3 Pastor, C., Fern\u00e1ndez Fern\u00e1ndez, A.: Current Trends of Topology Discovery in OpenFlow-based Software Defined Networks, http:\/\/upcommons.upc.edu\/handle\/2117\/77672 . Accessed 14 Oct 2015"},{"issue":"2","key":"51_CR21","doi-asserted-by":"crossref","first-page":"191","DOI":"10.1007\/s10207-013-0217-6","volume":"13","author":"A Albeshri","year":"2013","unstructured":"Albeshri, A., Boyd, C., Nieto, J.: Enhanced GeoProof: improved geographic assurance for data in the cloud. Int. J. Inf. Secur. 13(2), 191\u2013198 (2013)","journal-title":"Int. J. Inf. Secur."},{"key":"51_CR22","doi-asserted-by":"crossref","unstructured":"Yu, D.-Y., Ranganathan, A., Masti, R., Soriente, C., Capkun, S.: SALVE: server authentication with location verification. In: 22nd ACM International Conference on Mobile Computing and Networking (MobiCom 2016) (2016)","DOI":"10.1145\/2973750.2973766"},{"key":"51_CR23","unstructured":"Hoeyveld, B.: Galileo satellite signals will become more difficult to falsify. KU Leuven News, https:\/\/nieuws.kuleuven.be\/en\/content\/2017\/falsifying-galileo-satellite-signals-will-become-more-difficult"},{"key":"51_CR24","volume-title":"Incorporating Trust in NFV: Addressing the Challenges","author":"S Ravidas","year":"2017","unstructured":"Ravidas, S., Lal, S., Oliver, I., Hippel\u00e4inen, L.: Incorporating Trust in NFV: Addressing the Challenges. IEEE Xplore Digital Library, Paris (2017)"}],"container-title":["Lecture Notes in Computer Science","Network and System Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-64701-2_51","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,1]],"date-time":"2019-10-01T11:14:40Z","timestamp":1569928480000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-64701-2_51"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319647005","9783319647012"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-64701-2_51","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]}}}