{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T16:57:54Z","timestamp":1725641874826},"publisher-location":"Berlin, Heidelberg","reference-count":5,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642272448"},{"type":"electronic","value":"9783642272455"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-27245-5_2","type":"book-chapter","created":{"date-parts":[[2011,12,9]],"date-time":"2011-12-09T09:37:08Z","timestamp":1323423428000},"page":"4-4","source":"Crossref","is-referenced-by-count":0,"title":["Who Is Responsible for Security and Privacy in the Cloud?"],"prefix":"10.1007","author":[{"given":"Dipankar","family":"Dasgupta","sequence":"first","affiliation":[]}],"member":"297","reference":[{"issue":"1","key":"2_CR1","doi-asserted-by":"publisher","first-page":"14","DOI":"10.4018\/jisp.2011010102","volume":"5","author":"A. Bhattarai","year":"2011","unstructured":"Bhattarai, A., Dasgupta, D.: A Self-Supervised Approach to Comment Spam Detection Based on Content Analysis. International Journal of Information Security and Privacy (IJISP)\u00a05(1), 14\u201332 (2011)","journal-title":"International Journal of Information Security and Privacy (IJISP)"},{"key":"2_CR2","doi-asserted-by":"crossref","unstructured":"Dasgupta, D., Rahman, M.: A Framework for Estimating Security Coverage for Cloud Service Insurance. In: ACM ICPS Proceedings of Cyber Security and Information Intelligence Research Workshop (CSIIRW-7), Oak Ridge, USA, October 12-14 (2011)","DOI":"10.1145\/2179298.2179342"},{"key":"2_CR3","doi-asserted-by":"crossref","unstructured":"Ferebee, D., Dasgupta, D., Wu, Q., Schmidt, M.: Security Visualization: Cyber Security Storm Map and Event Correlation. In: The Proceedings of IEEE Symposium on Computational Intelligence in Cyber Security (CICS) Under IEEE Symposium Series in Computational Intelligence, Paris, France (April 2011)","DOI":"10.1109\/CICYBS.2011.5949412"},{"key":"2_CR4","doi-asserted-by":"crossref","unstructured":"Yu, S., Dasgupta, D.: An Effective Network-based Intrusion Detection Using Conserved Self Pattern Recognition Algorithm Augmented with Near-deterministic Detector Generation. In: The Proceedings of IEEE Symposium on Computational Intelligence in Cyber Security (CICS) Organized in IEEE Symposium Series in Computational Intelligence, Paris, France (April 2011)","DOI":"10.1109\/CICYBS.2011.5949393"},{"key":"2_CR5","unstructured":"Carvalho, M., Dasgupta, D., Grimaila, M.: Mission Resilience in Cloud Computing: A Biologically Inspired Approach. In: 6th International Conference on Information Warfare and Security, Washington, DC, USA (March 2011)"}],"container-title":["Communications in Computer and Information Science","Computer Information Systems \u2013 Analysis and Technologies"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-27245-5_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,20]],"date-time":"2019-06-20T13:49:12Z","timestamp":1561038552000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-27245-5_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642272448","9783642272455"],"references-count":5,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-27245-5_2","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2011]]}}}