{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T09:42:54Z","timestamp":1725702174234},"publisher-location":"Berlin, Heidelberg","reference-count":19,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642341342"},{"type":"electronic","value":"9783642341359"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-34135-9_36","type":"book-chapter","created":{"date-parts":[[2012,9,10]],"date-time":"2012-09-10T12:08:15Z","timestamp":1347278895000},"page":"358-371","source":"Crossref","is-referenced-by-count":2,"title":["eCloudIDS \u2013 Design Roadmap for the Architecture of Next-Generation Hybrid Two-Tier Expert Engine-Based IDS for Cloud Computing Environment"],"prefix":"10.1007","author":[{"given":"Madhan Kumar","family":"Srinivasan","sequence":"first","affiliation":[]},{"given":"K.","family":"Sarukesi","sequence":"additional","affiliation":[]},{"given":"Ashima","family":"Keshava","sequence":"additional","affiliation":[]},{"given":"P.","family":"Revathy","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"36_CR1","doi-asserted-by":"publisher","first-page":"470","DOI":"10.1145\/2345396.2345474","volume-title":"ICACCI 2012","author":"K.S. Madhan","year":"2012","unstructured":"Madhan, K.S., Sarukesi, K., Rodrigues, P., Saimanoj, M., Revathy, P.: State-of-the-art Cloud Computing Security Taxonomies \u2013 A classification of security challenges in the present cloud computing environment. In: ICACCI 2012, pp. 470\u2013476. ACM, India (2012), doi:10.1145\/2345396.2345474, ISBN: 978-1-4503-1196-0"},{"key":"36_CR2","doi-asserted-by":"crossref","unstructured":"Mell, P., Grance, T.: The NIST Definition of Cloud Computing. NIST Special Publication 800-145. Technical report, National Institute of Standards and Technology (2011)","DOI":"10.6028\/NIST.SP.800-145"},{"key":"36_CR3","unstructured":"Cloud Computing and Sustainability: The Environmental Benefits of moving to the Cloud. Technical report, Accenture (2010)"},{"key":"36_CR4","unstructured":"Reeve, R.: Building a 21st Century Communications Economy. Technical report, Carbon Disclosure Project in support with AT&T (2011)"},{"key":"36_CR5","unstructured":"Security Guidance for Critical Areas of Focus in Cloud Computing V2.1. Technical report, Cloud Security Alliance (2009)"},{"key":"36_CR6","unstructured":"Top Threats to Cloud Computing V1.0. Technical report, Cloud Security Alliance (2010)"},{"key":"36_CR7","unstructured":"Computer Security Threat Monitoring and Surveillance. Technical report, James P. Anderson Co. (1980)"},{"key":"36_CR8","series-title":"Lecture Notes in Artificial Intelligence","doi-asserted-by":"publisher","first-page":"72","DOI":"10.1007\/978-3-540-28650-9_5","volume-title":"Advanced Lectures on Machine Learning","author":"Z. Ghahramani","year":"2004","unstructured":"Ghahramani, Z.: Unsupervised Learning. In: Bousquet, O., von Luxburg, U., R\u00e4tsch, G. (eds.) Machine Learning 2003. LNCS (LNAI), vol.\u00a03176, pp. 72\u2013112. Springer, Heidelberg (2004)"},{"key":"36_CR9","unstructured":"Securing Multi-Tenancy and Cloud Computing. Technical report, Juniper Networks (2012)"},{"key":"36_CR10","unstructured":"Li, H., Sedayao, J., Hahn-Steichen, J., Jimison, E., Spence, C., Chahal, S.: Developing an Enterprise Cloud Computing Strategy. Technical report, Intel Corporation (2009)"},{"key":"36_CR11","series-title":"CCIS","doi-asserted-by":"publisher","first-page":"349","DOI":"10.1007\/978-3-642-14478-3_36","volume-title":"Recent Trends in Network Security and Applications","author":"S. Madhan Kumar","year":"2010","unstructured":"Madhan Kumar, S., Rodrigues, P.: A Roadmap for the Comparison of Identity Management Solutions Based on State-of-the-Art IdM Taxonomies. In: Meghanathan, N., Boumerdassi, S., Chaki, N., Nagamalai, D. (eds.) CNSA 2010. CCIS, vol.\u00a089, pp. 349\u2013358. Springer, Heidelberg (2010)"},{"issue":"4","key":"36_CR12","doi-asserted-by":"publisher","first-page":"62","DOI":"10.5121\/ijasuc.2010.1406","volume":"1","author":"K.S. Madhan","year":"2010","unstructured":"Madhan, K.S., Rodrigues, P.: Analysis on Identity Management Systems with Extended State-of-the-art IdM Taxonomy Factors. International Journal of Ad hoc, Sensor & Ubiquitous Computing\u00a01(4), 62\u201370 (2010), doi:10.5121\/ijasuc.2010.1406","journal-title":"International Journal of Ad hoc, Sensor & Ubiquitous Computing"},{"key":"36_CR13","unstructured":"Anu, G.: Cloud Computing Identity Management. Technical report, SETLabs Briefings 7(7), 45\u201355, Infosys Limited (2009)"},{"key":"36_CR14","unstructured":"What\u2019s Holding Back the Cloud? Technical report, Intel IT Center (2012)"},{"key":"36_CR15","unstructured":"Baker, W., Hutton, A.: 2010 Data Breach Investigations Report, A study conducted by the Verizon RISK Team with cooperation from the U.S. Secret Service and the Dutch High Tech Crime Unit. Technical report, Verizon, New Jersey (2010)"},{"key":"36_CR16","unstructured":"Shiels, M.: Malicious insider attacks to rise. Technical report, BBC News, Silicon Valley (2009)"},{"key":"36_CR17","series-title":"CCIS","first-page":"432","volume-title":"SNDS 2012","author":"M.K. Srinivasan","year":"2012","unstructured":"Srinivasan, M.K., Sarukesi, K., Keshava, A., Revathy, P.: eCloudIDS Tier-1 uX-Engine Subsystem Design and Implementation using Self-Organizing Map (SOM) for Secure Cloud Computing Environment. In: Thampi, S.M., Zomaya, A.Y., Strufe, T., Calero, J.M.A., Thomas, T. (eds.) SNDS 2012. CCIS, vol.\u00a0335, pp. 432\u2013443. Springer, Heidelberg (2012)"},{"key":"36_CR18","doi-asserted-by":"crossref","unstructured":"Keerthi, B., Madhan, K.S., Sarukesi, K., Rodrigues, P.: Implementation of Next-generation Traffic Sign Recognition System with Two-tier Classifier Architecture. In: ACM International Conference on Advances in Communications, Computing and Informatics, ICACCI 2012, pp. 481\u2013487. ACM, India (2012), doi:10.1145\/2345396.2345476, ISBN: 978-1-4503-1196-0","DOI":"10.1145\/2345396.2345476"},{"key":"36_CR19","series-title":"CCIS","first-page":"408","volume-title":"SNDS 2012","author":"K. Balasundaram","year":"2012","unstructured":"Balasundaram, K., Srinivasan, M.K., Sarukesi, K.: iReSign-Implementation of Next-Generation Two-Tier Identity Classifier-Based Traffic Sign Recognition System Architecture using Hybrid Region-Based Shape Representation Techniques. In: Thampi, S.M., Zomaya, A.Y., Strufe, T., Calero, J.M.A., Thomas, T. (eds.) SNDS 2012. CCIS, vol.\u00a0335, pp. 408\u2013421. Springer, Heidelberg (2012)"}],"container-title":["Communications in Computer and Information Science","Recent Trends in Computer Networks and Distributed Systems Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-34135-9_36.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,4]],"date-time":"2021-05-04T12:45:53Z","timestamp":1620132353000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-34135-9_36"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642341342","9783642341359"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-34135-9_36","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2012]]}}}