{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,29]],"date-time":"2025-09-29T08:23:57Z","timestamp":1759134237147},"publisher-location":"Berlin, Heidelberg","reference-count":23,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642275845"},{"type":"electronic","value":"9783642275852"}],"license":[{"start":{"date-parts":[[2012,1,1]],"date-time":"2012-01-01T00:00:00Z","timestamp":1325376000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-27585-2_11","type":"book-chapter","created":{"date-parts":[[2012,2,7]],"date-time":"2012-02-07T22:38:29Z","timestamp":1328654309000},"page":"132-144","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":9,"title":["Towards User Centric Data Governance and Control in the Cloud"],"prefix":"10.1007","author":[{"given":"Stephan","family":"Gro\u00df","sequence":"first","affiliation":[]},{"given":"Alexander","family":"Schill","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"11_CR1","first-page":"229","volume-title":"Proceedings of the 1st ACM Symposium on Cloud Computing, SoCC 2010","author":"H. Abu-Libdeh","year":"2010","unstructured":"Abu-Libdeh, H., Princehouse, L., Weatherspoon, H.: RACS: a case for cloud storage diversity. In: Proceedings of the 1st ACM Symposium on Cloud Computing, SoCC 2010, pp. 229\u2013240. ACM, New York (2010), http:\/\/doi.acm.org\/10.1145\/1807128.1807165"},{"key":"11_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"555","DOI":"10.1007\/978-3-642-21878-1_68","volume-title":"Euro-Par 2010 Parallel Processing Workshops","author":"R. Aversa","year":"2011","unstructured":"Aversa, R., Avvenuti, M., Cuomo, A., Di Martino, B., Di Modica, G., Distefano, S., Puliafito, A., Rak, M., Tomarchio, O., Vecchio, A., Venticinque, S., Villano, U.: The Cloud@Home Project: Towards a New Enhanced Computing Paradigm. In: Guarracino, M.R., Vivien, F., Tr\u00e4ff, J.L., Cannatoro, M., Danelutto, M., Hast, A., Perla, F., Kn\u00fcpfer, A., Di Martino, B., Alexander, M. (eds.) Euro-Par-Workshop 2010. LNCS, vol.\u00a06586, pp. 555\u2013562. Springer, Heidelberg (2011)"},{"key":"11_CR3","doi-asserted-by":"publisher","first-page":"205","DOI":"10.1145\/1807128.1807162","volume-title":"Proceedings of the 1st ACM Symposium on Cloud computing (SoCC 2010)","author":"N. Bonvin","year":"2010","unstructured":"Bonvin, N., Papaioannou, T.G., Aberer, K.: A self-organized, fault-tolerant and scalable replication scheme for cloud storage. In: Proceedings of the 1st ACM Symposium on Cloud computing (SoCC 2010), pp. 205\u2013216. ACM, New York (2010)"},{"key":"11_CR4","doi-asserted-by":"crossref","unstructured":"Catteddu, D.: Cloud Computing \u2013 Benefits, risks and recommendations for information security. ENISA Report, ENISA (November 2009)","DOI":"10.1007\/978-3-642-16120-9_9"},{"key":"11_CR5","unstructured":"Catteddu, D.: Security & Resilience in Governmental Clouds \u2013 Making an informed decision. ENISA Report, ENISA (January 2011)"},{"key":"11_CR6","unstructured":"Cranor, L.F., Garfinkel, S.L.: Designing Secure Systems That People Can Use. O\u2019Reilly (September 2005) ISBN 978-0-596-00827-7"},{"key":"11_CR7","doi-asserted-by":"publisher","first-page":"2453","DOI":"10.1145\/1979742.1979582","volume-title":"Proceedings of the 2011 Annual Conference Extended Abstracts on Human Factors in Computing Systems, CHI EA 2011","author":"D. England","year":"2011","unstructured":"England, D., Randles, M., Taleb-Bendiab, A.: Designing interaction for the cloud. In: Proceedings of the 2011 Annual Conference Extended Abstracts on Human Factors in Computing Systems, CHI EA 2011, pp. 2453\u20132456. ACM, New York (2011), http:\/\/doi.acm.org\/10.1145\/1979742.1979582"},{"key":"11_CR8","doi-asserted-by":"crossref","unstructured":"Fischer-H\u00fcbner, S., Iacono, L.L., M\u00f6ller, S.: Usable Security und Privacy. Datenschutz und Datensicherheit (DuD) (11), 773 (2010)","DOI":"10.1007\/s11623-010-0210-4"},{"key":"11_CR9","unstructured":"Garfinkel, S.L.: Design principles and patterns for computer systems that are simultaneously secure and usable. Ph.D. thesis, Massachusetts Institute of Technology (2005), http:\/\/simson.net\/thesis\/"},{"key":"11_CR10","doi-asserted-by":"crossref","unstructured":"Grolimund, D., Meisser, L., Schmid, S., Wattenhofer, R.: Cryptree: A folder tree structure for cryptographic file systems. Technical report, Purdue University, Department of Computer Science, West Lafayette, IN, USA (2006)","DOI":"10.1109\/SRDS.2006.15"},{"key":"11_CR11","doi-asserted-by":"crossref","unstructured":"He, Q., Li, Z., Zhang, X.: Study on Cloud Storage System Based on Distributed Storage Systems. In: 2010 International Conference on Computational and Information Sciences, ICCIS (December 2010)","DOI":"10.1109\/ICCIS.2010.351"},{"key":"11_CR12","unstructured":"Intel Corporation: Benefits of a Client-aware Cloud. White Paper Client-aware Cloud Computing (2011), http:\/\/partnerzones.i41.nbsp.de\/_misc\/download.cfm?filepath=\/4\/0\/0\/4\/Benefitsofclientawarecloud.pdf&filename=Benefitsofclientawarecloud&filetype=pdf&fid=624"},{"key":"11_CR13","unstructured":"Information technology \u2013 Security techniques \u2013 Information security management systems \u2013 Requirements. No. 27001 in ISO\/IEC Standard, International Organization for Standardization (2005)"},{"key":"11_CR14","doi-asserted-by":"crossref","unstructured":"Kamara, S., Lauter, K.: Cryptographic Cloud Storage. Tech. rep., Microsoft Research Cryptography Group (2011)","DOI":"10.1007\/978-3-642-14992-4_13"},{"key":"11_CR15","doi-asserted-by":"crossref","unstructured":"Mell, P., Grance, T.: The NIST Definition of Cloud Computing. Recommendations of the National Institute of Standards and Technology (NIST), Special Publication 800\u2013145 (January 2011), http:\/\/csrc.nist.gov\/publications\/drafts\/800-145\/Draft-SP-800-145_cloud-definition.pdf","DOI":"10.6028\/NIST.SP.800-145"},{"key":"11_CR16","unstructured":"Mosch, M.: User-controlled data sovereignty in the Cloud. In: Proceedings of the PhD Symposium at the 9th IEEE European Conference on Web Services (ECOWS 2011), Lugano, Switzerland (September 2011)"},{"key":"11_CR17","unstructured":"Resch, J.K., Plank, J.S.: AONT-RS: blending security and performance in dispersed storage systems. In: 9th Usenix Conference on File and Storage Technologies FAST 2011 (February 2011)"},{"key":"11_CR18","unstructured":"Schnjakin, M., Meinel, C.: Plattform zur Bereitstellung sicherer und hochverf\u00fcgbarer Speicherressourcen in der Cloud. In: Sicher in die digitale Welt von morgen \u2013 12. Deutscher IT-Sicherheitskongress des BSI. SecuMedia Verlag, Bonn (2011)"},{"key":"11_CR19","doi-asserted-by":"crossref","unstructured":"Seiger, R., Gro\u00df, S., Schill, A.: SecCSIE: A Secure Cloud Storage Integrator for Enterprises. In: International Workshop on Clouds for Enterprises (C4E). Luxemburg (September 2011)","DOI":"10.1109\/CEC.2011.45"},{"key":"11_CR20","unstructured":"Spillner, J.: Spaceflight \u2013 A versatile live demonstrator and teaching system for advanced service-oriented technologies. In: Crimean Conference on Microwave and Telecommunication Technology (CriMiCo), Sewastopol, Ukraine (September 2011) (accepted for publication)"},{"key":"11_CR21","unstructured":"Wang, C., Wang, Q., Ren, K., Lou, W.: Ensuring data storage security in Cloud Computing. In: Proceedings of the 17th International Workshop on Quality of Service, Charleston, SC, USA (2009)"},{"key":"11_CR22","unstructured":"Whittaker, Z.: Microsoft admits patriot act can access EU-based cloud data. ZDNet iGeneration Blog (June 2011), http:\/\/www.zdnet.com\/blog\/igeneration\/microsoft-admits-patriot-act-canb-access-eu-based-cloud-data\/11225"},{"key":"11_CR23","doi-asserted-by":"crossref","unstructured":"Xu, P., Zheng, W., Wu, Y., Huang, X., Xu, C.: Enabling Cloud Storage to Support Traditional Applications. In: 5th Annual ChinaGrid Conference (2010)","DOI":"10.1109\/ChinaGrid.2010.50"}],"container-title":["Lecture Notes in Computer Science","Open Problems in Network Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-27585-2_11","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,3,17]],"date-time":"2020-03-17T00:07:00Z","timestamp":1584403620000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-27585-2_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642275845","9783642275852"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-27585-2_11","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2012]]},"assertion":[{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}