{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T00:50:46Z","timestamp":1740099046529,"version":"3.37.3"},"publisher-location":"Cham","reference-count":43,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319732039"},{"type":"electronic","value":"9783319732046"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-73204-6_58","type":"book-chapter","created":{"date-parts":[[2018,2,9]],"date-time":"2018-02-09T07:12:47Z","timestamp":1518160367000},"page":"526-539","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Comparable and Analytical Study Between Some Security Issues in Cloud Computing"],"prefix":"10.1007","author":[{"given":"M. Samir","family":"Abou El-Seoud","sequence":"first","affiliation":[]},{"given":"Hosam F.","family":"El-Sofany","sequence":"additional","affiliation":[]},{"given":"Islam A. T. F.","family":"Taj-Eddin","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,2,10]]},"reference":[{"issue":"11: ICL2012","key":"58_CR1","doi-asserted-by":"crossref","first-page":"37","DOI":"10.3991\/ijet.v8iS1.2344","volume":"8","author":"HF El-Sofany","year":"2013","unstructured":"El-Sofany, H.F., Al Tayeb, A., Alghatani, K., El-Seoud, S.A.: The impact of cloud computing technologies in e-learning. Int. J. Emerg. Technol. Learn. iJET. 8(11: ICL2012), 37\u201343 (2013). http:\/\/dx.doi.org\/:10.3991\/ijet.v8iS1.2344","journal-title":"Int. J. Emerg. Technol. Learn. iJET."},{"key":"58_CR2","unstructured":"NIST: National Institute of Standards and Technology - Patrick D. Gallagher, Under Secretary of Commerce for Standards and Technology and Director. \u201cNIST Cloud Computing Standards Roadmap Working Group\u201d. NIST Cloud Computing Program, Information Technology Laboratory. NIST Special Publication 500-291, Version 2 July 2013. http:\/\/dx.doi.org\/:10.6028\/NIST.SP.500-291r2"},{"key":"58_CR3","unstructured":"Delettre, C., Boudaoud, K., Riveill, M.: Cloud Computing, Security and Data Concealment. IEEE (2011), ISBN 978-1-4577-0681- 3\/11\/$26.00 \u00a92011"},{"key":"58_CR4","unstructured":"Technical White Papers. https:\/\/support.rackspace.com\/white-paper\/understanding-the-cloud-computing-stack-saas-paas-iaas\/"},{"key":"58_CR5","unstructured":"Google: Google Apps. http:\/\/www.google.com\/apps , 2012"},{"key":"58_CR6","unstructured":"Microsoft Corporation. Office Online Services \u2013 Hosted in the Cloud \u2013 Microsoft Office 365 (2012). http:\/\/www.microsoft.com\/en-us\/office365"},{"key":"58_CR7","unstructured":"NetSuite (2012). http:\/\/www.netsuite.com\/portal\/home.shtml"},{"key":"58_CR8","unstructured":"Salesforce. Salesforce.com. (2012). http:\/\/www.salesforce.com"},{"key":"58_CR9","unstructured":"SurveyTool.com. (2012). http:\/\/www.surveytool.com"},{"key":"58_CR10","unstructured":"Zoho (2012). http:\/\/www.zoho.com"},{"key":"58_CR11","unstructured":"Cloud Bees. Cloud Platform as a Service for Java Web Apps (2012). http:\/\/www.cloudbees.com"},{"key":"58_CR12","unstructured":"Engine Yard. Ruby on Rails and PHP Cloud Hosting PaaS (2012). http:\/\/www.engineyard.com"},{"key":"58_CR13","unstructured":"Google. Google App Engine (2012). http:\/\/code.google.com\/appengine"},{"key":"58_CR14","unstructured":"Heroku. Heroku - Cloud Application Platform (2012). http:\/\/www.heroku.com"},{"key":"58_CR15","unstructured":"Microsoft Corporation. Windows Azure (2012). http:\/\/www.microsoft.com\/windowsazure"},{"key":"58_CR16","unstructured":"Salesforce. Force.com. (2012). http:\/\/www.force.com"},{"key":"58_CR17","unstructured":"Amazon. Amazon Elastic Compute Cloud (Amazon EC2) (2012). http:\/\/aws.amazon.com\/ec2"},{"key":"58_CR18","unstructured":"Amazon Simple Storage Service (Amazon S3) (2012). http:\/\/mazon.com\/s3"},{"key":"58_CR19","unstructured":"GoGrid (2012). http:\/\/www.gogrid.com"},{"key":"58_CR20","unstructured":"Rackspace, The Rackspace Cloud (2012). http:\/\/www.rackspace.com\/cloud"},{"key":"58_CR21","unstructured":"Bluepiit, \u201cDifferent Types of Cloud Computing Service Models\u201d. https:\/\/www.bluepiit.com\/blog\/different-types-of-cloud-computing-service-models\/"},{"key":"58_CR22","unstructured":"OrBytes Website Admin, (2009). \u201cCloud Computing\u201d. http:\/\/www.orbytesolutions.com\/services\/index.php?option=com_content&view=article&id=55&Itemid=40 . Accessed 8 Nov 2010"},{"key":"58_CR23","unstructured":"Waxer, B.: \u201cThe Benefits of Cloud Computing\u201d (2009). http:\/\/www.webhostingunleashed.com\/features\/cloud-computing-benefits\/ . Accessed 21 Dec 2010"},{"key":"58_CR24","unstructured":"Dans, E.: \u201cBenefits and Disadvantages of Cloud Computing\u201d (2011). http:\/\/algramrandomramblings.blogspot.com\/2011\/01\/benefits-and-disadvantages-ofcloud.html . Accessed 14 Mar 2011"},{"key":"58_CR25","unstructured":"Kynetix Technology group, \u201cCloud Computing Strategy Guide\u201d (2009). https:\/\/sites.google.com\/site\/cloudmanual\/success-factors . Accessed 2 Dec 2010"},{"issue":"4","key":"58_CR26","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1145\/1721654.1721672","volume":"53","author":"M Armbrust","year":"2010","unstructured":"Armbrust, M., Fox, A., Grith, R., Joseph, A.D., Katz, R., Konwinski, A., Lee, G., Patterson, D., Rabkin, A., Stoica, I., Zaharia, M.: A view of cloud computing. Commun. ACM 53(4), 50\u201358 (2010). https:\/\/doi.org\/10.1145\/1721654.1721672","journal-title":"Commun. ACM"},{"key":"58_CR27","doi-asserted-by":"crossref","unstructured":"Jensen, M., Schwenk, J., Gruschka, N., Iacono, L.: On technical security issues in cloud computing. In: IEEE International Conference on Cloud Computing, Bangalore, 21\u201325 September 2009, pp. 109-116 (2009)","DOI":"10.1109\/CLOUD.2009.60"},{"key":"58_CR28","unstructured":"Gens, F.: New IDC It Cloud Services Survey: Top Benefits and Challenges (2009). http:\/\/blogs.idc.com\/ie\/?p=730"},{"key":"58_CR29","doi-asserted-by":"crossref","unstructured":"Sengupta, S., Kaulgud, V., Sharma, V.S.: Cloud computing security\u2013trends and research directions. In: 2011 IEEE World Congress on Services (SERVICES), pp. 524\u2013531. IEEE, July 2011","DOI":"10.1109\/SERVICES.2011.20"},{"issue":"1","key":"58_CR30","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1186\/1869-0238-4-5","volume":"4","author":"K Hashizume","year":"2013","unstructured":"Hashizume, K., Rosado, D.G., Fern\u00e1ndez-Medina, E., Fernandez, E.B.: An analysis of security issues for cloud computing. J. Internet Serv. Appl. 4(1), 1\u201313 (2013)","journal-title":"J. Internet Serv. Appl."},{"key":"58_CR31","doi-asserted-by":"crossref","unstructured":"Gonzalez, N., Miers, C., Redigolo, F.: A quantity analysis of current security concerns and solutions for cloud computing. In: 3rd International Conference on cloud computing Technology and Science (2011)","DOI":"10.1109\/CloudCom.2011.39"},{"issue":"1","key":"58_CR32","doi-asserted-by":"crossref","first-page":"47","DOI":"10.1016\/j.compeleceng.2012.04.015","volume":"39","author":"C Rong","year":"2013","unstructured":"Rong, C., Nguyen, S.T., Jaatun, M.G.: Beyond lightning: A survey on security challenges in cloud computing. Comput. Electr. Eng. 39(1), 47\u201354 (2013)","journal-title":"Comput. Electr. Eng."},{"key":"58_CR33","doi-asserted-by":"crossref","unstructured":"Behl, A., Behl, K.: An analysis of cloud computing security issues. In: 2012 World Congress on Information and Communication Technologies (WICT), pp. 109\u2013114. IEEE, October 2012","DOI":"10.1109\/WICT.2012.6409059"},{"issue":"19","key":"58_CR34","first-page":"4","volume":"44","author":"R Shaikh","year":"2012","unstructured":"Shaikh, R., Sasikumar, M.: Security issues in cloud computing: a survey. Int. J. Comput. Appl. 44(19), 4\u201310 (2012)","journal-title":"Int. J. Comput. Appl."},{"issue":"2","key":"58_CR35","first-page":"48","volume":"6","author":"F Sharif","year":"2012","unstructured":"Sharif, F., Hafeez, A.: The analysis of cloud computing major security concerns & their solutions. J. Inf. Commun. Technol. 6(2), 48\u201353 (2012)","journal-title":"J. Inf. Commun. Technol."},{"key":"58_CR36","doi-asserted-by":"crossref","unstructured":"Kulkarni, G., Gambhir, J., Patil, T., Dongare, A.A: security aspects in cloud computing. In: 2012 IEEE 3rd International Conference on Software Engineering and Service Science (ICSESS), pp. 547\u2013550. IEEE, June 2012","DOI":"10.1109\/ICSESS.2012.6269525"},{"key":"58_CR37","doi-asserted-by":"crossref","unstructured":"El-Sofany, H.F., Al Tayeb, A., Alghatani, K., El-Seoud, S.A.: The Impact of cloud computing technologies in e-learning, ICL2012, 8(1) (2013)","DOI":"10.3991\/ijet.v8iS1.2344"},{"issue":"3","key":"58_CR38","first-page":"62","volume":"3","author":"MS El-Seoud","year":"2013","unstructured":"El-Seoud, M.S., El-Sofany, H.F., Taj-Eddin, I.A.T.F., Nosseir, A.F., El-Khouly, M.M.: Implementation of web-based education in Egypt through cloud computing technologies and its effect on higher education. High. Educ. Stud. 3(3), 62 (2013)","journal-title":"High. Educ. Stud."},{"key":"58_CR39","doi-asserted-by":"publisher","unstructured":"El-Seoud, M.S.A., Taj-Eddin, I.A.T.F.: Developing an android mobile bluetooth chat messenger as an interactive and collaborative learning aid. In: Auer M., Guralnick D., Uhomoibhi J. (eds) Interactive Collaborative Learning, ICL 2016. Intelligent Systems and Computing, vol 545, pp. 3\u201315. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-50340-0_1 . http:\/\/www.icl-conference.org\/icl2016\/","DOI":"10.1007\/978-3-319-50340-0_1"},{"key":"58_CR40","doi-asserted-by":"publisher","unstructured":"El-Seoud, M.S.A., Taj-Eddin, IA.T.F.: Beyond android: an essential integration for better utilization, International Conference on Interactive Mobile Communication Technologies and Learning (IMCL2016), pp. 98\u2013102. IEEE (2016). https:\/\/doi.org\/10.1109\/IMCTL.2016.7753780 . http:\/\/www.imcl-conference.org\/imcl2016\/","DOI":"10.1109\/IMCTL.2016.7753780"},{"issue":"3","key":"58_CR41","doi-asserted-by":"publisher","first-page":"42","DOI":"10.3991\/ijim.v10i3.5770","volume":"10","author":"MSA El-Seoud","year":"2016","unstructured":"El-Seoud, M.S.A., El-Sofany, H.F., Taj-Eddin, I.A.T.F.: Mobile applications and semantic-web a case study on automated course management. Int. J. Interact. Mob. Technol. (iJIM) 10(3), 42\u201353 (2016). https:\/\/doi.org\/10.3991\/ijim.v10i3.5770 . International Association of Online Engineering. http:\/\/online-journals.org\/index.php","journal-title":"Int. J. Interact. Mob. Technol. (iJIM)"},{"key":"58_CR42","doi-asserted-by":"publisher","unstructured":"El-Seoud, M.S.A., El-Khouly, M., Taj-Eddin, I.A.T.F.: Strategies to enhance learner\u2019s motivation in e-learning environment. In: Proceedings of 18th International Conference on Interactive Collaborative Learning (ICL2015), pp. 944\u2013949. IEEE (2015). https:\/\/doi.org\/10.1109\/ICL.2015.7318154 . http:\/\/www.icl-conference.org\/icl2015\/ . ISBN 978-1-4799-8706-1\/15 \u00a92015","DOI":"10.1109\/ICL.2015.7318154"},{"key":"58_CR43","doi-asserted-by":"publisher","unstructured":"El-Seoud, M.S.A., El-Sofany, H.F., Karkar, A., Dandashi, A., Taj-Eddin, I.A.T.F., AL-Ja\u2019am, J.M.: Semantic-web automated course management and evaluation system using mobile applications. In: Proceedings of 18th International Conference on Interactive Collaborative Learning (ICL2015), pp. 271\u2013282. IEEE (2015). https:\/\/doi.org\/10.1109\/ICL.2015.7318037 . http:\/\/www.icl-conference.org\/icl2015\/ . ISBN 978-1-4799-8706-1\/15 \u00a92015","DOI":"10.1109\/ICL.2015.7318037"}],"container-title":["Advances in Intelligent Systems and Computing","Teaching and Learning in a Digital World"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-73204-6_58","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,8,14]],"date-time":"2022-08-14T03:32:47Z","timestamp":1660447967000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-73204-6_58"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783319732039","9783319732046"],"references-count":43,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-73204-6_58","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2018]]}}}