{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,29]],"date-time":"2025-09-29T07:46:58Z","timestamp":1759132018609},"publisher-location":"Berlin, Heidelberg","reference-count":14,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642192272"},{"type":"electronic","value":"9783642192289"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-19228-9_13","type":"book-chapter","created":{"date-parts":[[2011,2,10]],"date-time":"2011-02-10T00:59:53Z","timestamp":1297299593000},"page":"140-148","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["Cloud Infrastructure Security"],"prefix":"10.1007","author":[{"given":"Dimiter","family":"Velev","sequence":"first","affiliation":[]},{"given":"Plamena","family":"Zlateva","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"13_CR1","unstructured":"Cloud Computing, http:\/\/en.wikipedia.org\/wiki\/Cloud_computing"},{"key":"13_CR2","unstructured":"Cloud Computing: Business Benefits With Security, Governance and Assurance Perspectives. An ISACA Emerging Technology White Paper, http:\/\/www.isaca.org"},{"key":"13_CR3","volume-title":"acking: The Next Generation","author":"N. Dhanjani","year":"2009","unstructured":"Dhanjani, N., Rios, B., Hardi, B.: acking: The Next Generation. HO\u2019Reilly Media, Inc., Sebastopol (2009)"},{"key":"13_CR4","unstructured":"ENISA.: Cloud Computing: Information Assurance Framework. ENISA (November 2009), http:\/\/www.enisa.europa.eu\/"},{"key":"13_CR5","unstructured":"ENISA.: Cloud Computing: Benefits, risks and recommendations for information security. ENISA (November 2009), http:\/\/www.enisa.europa.eu\/"},{"key":"13_CR6","unstructured":"Lyong, L.: How to Select a Cloud Computing Infrastructure Provider. Gartner, Inc. Research. ID Number: G00166565"},{"key":"13_CR7","volume-title":"Cloud Security and Privacy: An Enterprise Perspective on Risks and Compliance","author":"T. Mather","year":"2009","unstructured":"Mather, T., Kumaraswamy, S., Latif, S.: Cloud Security and Privacy: An Enterprise Perspective on Risks and Compliance. O\u2019Reilly Media, Inc., Sebastopol (2009)"},{"key":"13_CR8","unstructured":"Owens, K.: Securing Virtual Compute Infrastructure in the Cloud. White Paper: Cloud Computing, http:\/\/www.savvis.net"},{"key":"13_CR9","volume-title":"Cloud Application Architectures: Building Applications and Infrastructure in the Cloud","author":"G. Reese","year":"2009","unstructured":"Reese, G.: Cloud Application Architectures: Building Applications and Infrastructure in the Cloud. O\u2019Reilly Media, Inc., Sebastopol (2009)"},{"key":"13_CR10","volume-title":"Cloud Computing: Implementation, Management and Security","author":"J.W. Rittinghouse","year":"2009","unstructured":"Rittinghouse, J.W., Ransome, J.F.: Cloud Computing: Implementation, Management and Security. CRC Press, Boca Raton (2009)"},{"key":"13_CR11","unstructured":"Secure Cloud Architecture, NetApp, WP-7083-0809 (August 2009)"},{"key":"13_CR12","unstructured":"Security Guidance for Critical Areas of Focus in Cloud Computing V2.1, Cloud Security Alliance (2009), http:\/\/www.cloudsecurityalliance.org\/guidance\/csaguide.v2.1.pdf"},{"key":"13_CR13","unstructured":"Securing Microsoft\u2019s Cloud Infrastructure. A Microsoft White Paper, http:\/\/blogs.technet.com\/gfs\/archive\/2009\/05\/27\/securing-microsoft-s-cloud-infrastructure.aspx"},{"key":"13_CR14","unstructured":"The Role of Security in Trustworthy Cloud Computing. RSA, White paper, http:\/\/www.rsa.com"}],"container-title":["Lecture Notes in Computer Science","Open Research Problems in Network Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-19228-9_13","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,3,16]],"date-time":"2020-03-16T08:06:08Z","timestamp":1584345968000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-19228-9_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642192272","9783642192289"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-19228-9_13","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2011]]},"assertion":[{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}