{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,22]],"date-time":"2026-03-22T06:39:48Z","timestamp":1774161588474,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":15,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783642209970","type":"print"},{"value":"9783642209987","type":"electronic"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-20998-7_42","type":"book-chapter","created":{"date-parts":[[2011,4,8]],"date-time":"2011-04-08T11:33:10Z","timestamp":1302262390000},"page":"338-342","source":"Crossref","is-referenced-by-count":16,"title":["User Authentication in Cloud Computing"],"prefix":"10.1007","author":[{"given":"Hyokyung","family":"Chang","sequence":"first","affiliation":[]},{"given":"Euiin","family":"Choi","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"42_CR1","first-page":"18","volume":"22","author":"T. Lee","year":"2000","unstructured":"Lee, T.: Features of Cloud Computing and Offered Service State by Individual Vender. Broadcasting and Communication Policy\u00a022, 18\u201322 (2000)","journal-title":"Broadcasting and Communication Policy"},{"key":"42_CR2","unstructured":"http:\/\/www.gartner.com\/technology\/symposium\/2009\/sym19\/about.jsp"},{"key":"42_CR3","unstructured":"Lee, J., Choi, D.: New trend of IT led by Cloud Computing. In: LG Economic Research Institute (2010)"},{"key":"42_CR4","first-page":"561","volume":"47","author":"H. Lee","year":"2010","unstructured":"Lee, H., Chung, M.: Context-Aware Security for Cloud Computing Environment. IEEK\u00a047, 561\u2013568 (2010)","journal-title":"IEEK"},{"key":"42_CR5","unstructured":"Kim, J., Kim, H.: Cloud Computing Industry Trend and Introduction Effect. In: IT Insight, National IT Industry promotion Agency (2010)"},{"key":"42_CR6","unstructured":"http:\/\/en.wikipedia.org\/wiki\/Cloud_computing#History"},{"key":"42_CR7","doi-asserted-by":"crossref","unstructured":"Dikaiakos, M.D., et al.: Cloud Computing Distributed Internet Computing for IT and Scientific Research. IEEE Internet Computing, 10\u201313 (September\/October 2009)","DOI":"10.1109\/MIC.2009.103"},{"key":"42_CR8","doi-asserted-by":"crossref","unstructured":"Harauz, J., et al.: Data Security in the World of Cloud Computing. IEEE Security & Privacy, 61\u201364 (2009)","DOI":"10.1109\/MSP.2009.87"},{"key":"42_CR9","unstructured":"Lee, J.: Cloud Compting, Changes IT Industry Paradigm. LG Business Insight, 40\u201346 (2009)"},{"key":"42_CR10","first-page":"11","volume":"20","author":"H. Kim","year":"2010","unstructured":"Kim, H., Park, C.: Cloud Computing and Personal Authentication Service. KIISC\u00a020, 11\u201319 (2010)","journal-title":"KIISC"},{"key":"42_CR11","unstructured":"Armbust, M., et al.: Above the Clouds: A Berkeley View of Cloud Computing. In: Technical Report (2009), \n                  \n                    http:\/\/www.eeec.berkeley.edu\/Pubs\/TechRpts\/2009\/EEEC-2009-28.html"},{"issue":"4","key":"42_CR12","first-page":"79","volume":"24","author":"S. Un","year":"2009","unstructured":"Un, S., et al.: Cloud Computing Security Technology. ETRI\u00a024(4), 79\u201388 (2009)","journal-title":"ETRI"},{"key":"42_CR13","unstructured":"Beritino, E., et al.: Privacy-preserving Digital Identity Management for Cloud Computing. Bulletin of the Technical Committee on Data Engineering\u00a031(1) (January 2009)"},{"key":"42_CR14","unstructured":"Gartner Says Cloud Computing Will Be As Influential As E-business (2008), \n                  \n                    http:\/\/www.gartner.com\/it\/page.jsp?id=707508"},{"key":"42_CR15","unstructured":"TCG, \n                  \n                    http:\/\/www.trustedcomputinggroup.org"}],"container-title":["Communications in Computer and Information Science","Ubiquitous Computing and Multimedia Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-20998-7_42","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,22]],"date-time":"2019-05-22T23:42:28Z","timestamp":1558568548000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-20998-7_42"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642209970","9783642209987"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-20998-7_42","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"value":"1865-0929","type":"print"},{"value":"1865-0937","type":"electronic"}],"subject":[],"published":{"date-parts":[[2011]]}}}