{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T03:53:17Z","timestamp":1725594797558},"publisher-location":"Berlin, Heidelberg","reference-count":13,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642225765"},{"type":"electronic","value":"9783642225772"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-22577-2_12","type":"book-chapter","created":{"date-parts":[[2011,7,6]],"date-time":"2011-07-06T12:41:43Z","timestamp":1309956103000},"page":"84-91","source":"Crossref","is-referenced-by-count":6,"title":["\u201cCloud Computing: Towards Risk Assessment\u201d"],"prefix":"10.1007","author":[{"given":"Bharat","family":"Chhabra","sequence":"first","affiliation":[]},{"given":"Bhawna","family":"Taneja","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"4","key":"12_CR1","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1145\/1327512.1327513","volume":"11","author":"A. Weiss","year":"2007","unstructured":"Weiss, A.: Computing in the Clouds. NetWorker\u00a011(4), 16\u201325 (2007)","journal-title":"NetWorker"},{"issue":"6","key":"12_CR2","doi-asserted-by":"publisher","first-page":"599","DOI":"10.1016\/j.future.2008.12.001","volume":"25","author":"R. Buyya","year":"2009","unstructured":"Buyya, R., Yeo, C.S., Venugopal, S., Broberg, J., Brandic, I.: Cloud Computing and Emerging IT Platforms: Vision, Hype, and Reality for Delivering Computing as the 5th Utility. Future Generation Computer Systems\u00a025(6), 599\u2013616 (2009)","journal-title":"Future Generation Computer Systems"},{"key":"12_CR3","unstructured":"Cloud Computing Security, A Trend Micro White Paper (August 2009), \n                    \n                      http:\/\/emea.trendmicro.com\/imperia\/md\/content\/uk\/solutions\/enterprise\/wp02_cloud-computing_090812us.pdf"},{"key":"12_CR4","unstructured":"Cloud Expo::Attacks Cannot Be Prevented By Lori MacVittie, \n                    \n                      http:\/\/cloudcomputing.sys-con.com\/node\/1668772"},{"key":"12_CR5","unstructured":"white paper : On Verifying Stateful Dataflow Processing Services In Large-Scale Cloud Systems, \n                    \n                      http:\/\/www.techrepublic.com\/whitepapers\/on-verifying-stateful-dataflow-processing-services-in-large-scale-cloud-systems\/2417851"},{"key":"12_CR6","unstructured":"Cloud Security Threats and Countermeasures at a GlanceJD Meier (July 8, 2010), \n                    \n                      http:\/\/blogs.msdn.com\/b\/jmeier\/archive\/2010\/07\/08\/cloud-security-threats-and-countermeasures-at-a-glance.aspx"},{"key":"12_CR7","unstructured":"http:\/\/www.cloudsecurityalliance.org\/guidance\/csaguide.v2.1.pdf"},{"key":"12_CR8","unstructured":"http:\/\/www-07.ibm.com\/in\/ibm\/cloud\/?ca=googleaw&gclid=CPrsyYXb86cCFRFOgwod0kaacg"},{"key":"12_CR9","unstructured":"http:\/\/www.intel.com\/itcenter\/topics\/cloud\/security.htm?cid=apac:gglcloudsecurity_in_genti17A68s"},{"key":"12_CR10","unstructured":"The \u201cComparing Google App Engine, Amazon SimpleDB and Microsoft SQL Server Data Services\u201d post of May 6, 2008 to the OakLeaf Systems blog, \n                    \n                      http:\/\/bit.ly\/LtvxN, http:\/\/oakleafblog.blogspot.com\/2008\/04\/comparing-google-app-engine-amazon.html"},{"key":"12_CR11","unstructured":"Hinchcliffe, Dion. Cloud computing: A new era of IT opportunity and challenges (March 03, 2009), \n                    \n                      http:\/\/blogs.zdnet.com\/Hinchcliffe\/?p=261&tag=rbxccnbzd1\n                    \n                    \n                   (retrieved June 03, 2009)"},{"key":"12_CR12","unstructured":"Swaminathan, Kishore S., Daugherty, Paul, Tobolski, Joseph.: What the Enterprise needs to know about Cloud Computing. Accenture Technology Labs, p. 3-15 (2009)"},{"key":"12_CR13","unstructured":"white paper Securing the Cloud, A Review of Cloud Computing, Security Implications and Best Practices, \n                    \n                      http:\/\/www.vmware.com\/files\/pdf\/cloud\/VMware-Savvis-Cloud-WP-en.pdf"}],"container-title":["Communications in Computer and Information Science","High Performance Architecture and Grid Computing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-22577-2_12","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,3,29]],"date-time":"2019-03-29T22:55:52Z","timestamp":1553900152000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-22577-2_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642225765","9783642225772"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-22577-2_12","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2011]]}}}