{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T19:36:42Z","timestamp":1725565002042},"publisher-location":"Berlin, Heidelberg","reference-count":20,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642164439"},{"type":"electronic","value":"9783642164446"}],"license":[{"start":{"date-parts":[[2010,1,1]],"date-time":"2010-01-01T00:00:00Z","timestamp":1262304000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-16444-6_79","type":"book-chapter","created":{"date-parts":[[2010,9,8]],"date-time":"2010-09-08T23:19:29Z","timestamp":1283987969000},"page":"629-637","source":"Crossref","is-referenced-by-count":10,"title":["State of the Art of Network Security Perspectives in Cloud Computing"],"prefix":"10.1007","author":[{"given":"Tae Hwan","family":"Oh","sequence":"first","affiliation":[]},{"given":"Shinyoung","family":"Lim","sequence":"additional","affiliation":[]},{"given":"Young","family":"B.Choi","sequence":"additional","affiliation":[]},{"given":"Kwang-Roh","family":"Park","sequence":"additional","affiliation":[]},{"given":"Heejo","family":"Lee","sequence":"additional","affiliation":[]},{"given":"Hyunsang","family":"Choi","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"79_CR1","doi-asserted-by":"crossref","unstructured":"Kimball, A., Michels-Slettvet, S., Biscigilia, C.: Cluster Computing for Web-Scale Data Processing. In: SIGCSE 2008, Portland, Oregon, pp. 116\u2013120 (2008)","DOI":"10.1145\/1352135.1352177"},{"key":"79_CR2","unstructured":"Wikipedia, http:\/\/en.wikipedia.org\/wiki\/Cloud_computing"},{"key":"79_CR3","unstructured":"Vision, Hype, and Reliability for Delivering IT Services as Computing Utilities, HPCC 2008 Keynote (2008)"},{"key":"79_CR4","doi-asserted-by":"crossref","unstructured":"Thomas, D.: Enabling Application Agility-Software as a Service, Cloud Computing and Dynamic Languages. Journal of Object Technology\u00a017(4) (May-June 2008)","DOI":"10.5381\/jot.2008.7.4.c3"},{"key":"79_CR5","doi-asserted-by":"crossref","unstructured":"Lawton, G.: Developing Software Online with Platform-as-a-Service Technology. Computer (June 2008)","DOI":"10.1109\/MC.2008.185"},{"key":"79_CR6","unstructured":"Armbrust, M., et al.: Above the Clouds: A Berkeley View of Cloud Computing (February 2009), http:\/\/radlab.cs.berkeley.edu"},{"key":"79_CR7","unstructured":"Amazon Elastic Compute Cloud (Amazon EC2), http:\/\/aws.amazon.com\/ec2"},{"key":"79_CR8","unstructured":"Amazon Simple Storage Service (Amazon S3), http:\/\/aws.amazon.com\/s3"},{"key":"79_CR9","unstructured":"Valdes, R.: Google App Engine Goes Up Against Amazon Web Services. Gartners (April 2008)"},{"key":"79_CR10","unstructured":"Mitchell, A.: Google Apps: Education Edition Overview Webinar, http:\/\/www.google.com"},{"key":"79_CR11","unstructured":"Cloud Security Alliance, http:\/\/cloudsecurityalliance.org\/"},{"key":"79_CR12","unstructured":"Open Cloud Consortium, http:\/\/opencloudconsortium.org\/"},{"key":"79_CR13","unstructured":"Storage Networking Industry Association, http:\/\/www.snia.org\/home\/"},{"key":"79_CR14","unstructured":"European Network & Information Security Agency (ENISA), http:\/\/www.enisa.europa.eu\/"},{"key":"79_CR15","unstructured":"National Institute of Standards and Technology, Computer Security Resource Center, http:\/\/csrc.nist.gov\/groups\/SNS\/cloud-computing\/"},{"key":"79_CR16","unstructured":"Andrei, T., Jain, R.: Cloud Computing Challenges and Related Security Issues. Project report, Washington University in St. Louis (April 2009)"},{"key":"79_CR17","doi-asserted-by":"crossref","unstructured":"Security Guidance for Critical Areas of Focus in Cloud Computing V2.1, Cloud Computing Alliance (December 2009)","DOI":"10.1201\/9781439806814.ch1"},{"key":"79_CR18","unstructured":"The Role of Security in Trustworthy Cloud Computing, White Paper, RSA"},{"key":"79_CR19","unstructured":"Brodkin, J.: Gartner: Seven cloud-computing security risks (July 2, 2008), http:\/\/www.infoworld.com"},{"key":"79_CR20","unstructured":"European Network and Information Security Agency (ENISA), Cloud Computing: benefits, risks and recommendations for information security (November 2009)"}],"container-title":["Communications in Computer and Information Science","Security-Enriched Urban Computing and Smart Grid"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-16444-6_79","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,4]],"date-time":"2019-06-04T03:43:32Z","timestamp":1559619812000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-16444-6_79"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642164439","9783642164446"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-16444-6_79","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2010]]}}}