{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,23]],"date-time":"2025-06-23T11:44:59Z","timestamp":1750679099710,"version":"3.37.3"},"publisher-location":"Berlin, Heidelberg","reference-count":13,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642225765"},{"type":"electronic","value":"9783642225772"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-22577-2_9","type":"book-chapter","created":{"date-parts":[[2011,7,6]],"date-time":"2011-07-06T08:41:43Z","timestamp":1309941703000},"page":"62-66","source":"Crossref","is-referenced-by-count":4,"title":["Virtualization as an Engine to Drive Cloud Computing Security"],"prefix":"10.1007","author":[{"given":"Snehi","family":"Jyoti","sequence":"first","affiliation":[]},{"given":"Snehi","family":"Manish","sequence":"additional","affiliation":[]},{"given":"Gill","family":"Rupali","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"9_CR1","unstructured":"Leach, J.: The Rise of Service Oriented IT and the Birth of Infrastructure as a Service, March 20, 2008; 2 J. Heiser and M. Nicolett, Accessing the Security Risks of Cloud Computing, Gartner, Inc., Stamford, CT (2008)"},{"key":"9_CR2","volume-title":"Above the Clouds: A Berkeley View of Cloud Computing","author":"M. Armbrust","year":"2009","unstructured":"Armbrust, M., Fox, A., Griffith, R., et al.: Above the Clouds: A Berkeley View of Cloud Computing. Unversity of California, Berkeley (2009)"},{"key":"9_CR3","unstructured":"Berger, S., C\u00e1ceres, R., Goldman, K.A., et al.: vTPM: Virtualizing the Trusted Platform Module. In: Proceedings of the 15th USENIX Security Symposium, Vancouver, B.C (2006)"},{"key":"9_CR4","doi-asserted-by":"publisher","first-page":"43","DOI":"10.1007\/978-3-8348-9452-6_4","volume-title":"Trusted Computing","author":"V. Scarlata","year":"2008","unstructured":"Scarlata, V., Rozas, C., Wiseman, M., et al.: TPM Virtualization: Building a General Framework. In: Pohlmann, N., Reimer, H. (eds.) Trusted Computing, pp. 43\u201356. Vieweg+Teubner, Wiesbaden (2008)"},{"key":"9_CR5","unstructured":"Krautheim, F.J., Phatak, D.S.: LoBot: Locator Bot for Securing Cloud Compupting Environments. Submitted 2009 ACM Cloud Computing Security Workshop, Chicago, IL (2009)"},{"key":"9_CR6","doi-asserted-by":"crossref","unstructured":"Zissis, D., Lekkas, D.: Addressing Cloud Computing Security Issues. Future Generation Computer System (2010) Article in Press, \n                    \n                      http:\/\/dx.doi.org\/10.1016\/j.future.2010.12.006","DOI":"10.1016\/j.future.2010.12.006"},{"key":"9_CR7","doi-asserted-by":"crossref","unstructured":"Yamaguchi, T., Hashiyama, T., Okuma, S.: A Study On Reconfigurable Computing System Cryptography. In: IEEE International Conference on Cloud Computing, vol.\u00a04, pp. 2965\u20132968 (2000)","DOI":"10.1109\/ICSMC.2000.884451"},{"key":"9_CR8","unstructured":"Yuefa, D., Bo, W., Yaqiang, G., Quan, Z.: Data Security Model for Cloud Computing. In: International Workshop on Information Security and Applications, pp. 141\u2013144 (2009)"},{"key":"9_CR9","doi-asserted-by":"crossref","unstructured":"Sato, H., Kanai, A., Tanimoto, S.: A Cloud Trust Model in a Security Aware Cloud. In: IEEE International symposium on Applications and the Internet, pp. 121\u2013124 (2010)","DOI":"10.1109\/SAINT.2010.13"},{"key":"9_CR10","doi-asserted-by":"crossref","unstructured":"Kaufman, L.M.: Data Security in the World of Cloud Computing. IEEE Security and Privacy\u00a07(4) (2009)","DOI":"10.1109\/MSP.2009.87"},{"key":"9_CR11","unstructured":"Amazon Web Services (AWS), \n                    \n                      http:\/\/aws.amazon.com"},{"key":"9_CR12","first-page":"301","volume":"12","author":"Y. Shen","year":"2010","unstructured":"Shen, Y., Li, K., Yang, L.T.: Advanced Topics in Cloud Computing. Journal of Network and Computer Applications\u00a012, 301\u2013310 (2010)","journal-title":"Journal of Network and Computer Applications"},{"key":"9_CR13","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.jnca.2010.07.006","volume":"34","author":"S. Subashini","year":"2010","unstructured":"Subashini, S., Kavitha, V.: A Survey on Security Issues in Service Delivery Models of Cloud Computing. Journal of Network and Computer Applications\u00a034, 1\u201311 (2010)","journal-title":"Journal of Network and Computer Applications"}],"container-title":["Communications in Computer and Information Science","High Performance Architecture and Grid Computing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-22577-2_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,3,29]],"date-time":"2019-03-29T19:01:11Z","timestamp":1553886071000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-22577-2_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642225765","9783642225772"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-22577-2_9","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2011]]}}}