{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T11:12:58Z","timestamp":1725707578765},"publisher-location":"Berlin, Heidelberg","reference-count":12,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642355998"},{"type":"electronic","value":"9783642356001"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-35600-1_21","type":"book-chapter","created":{"date-parts":[[2012,11,26]],"date-time":"2012-11-26T07:31:37Z","timestamp":1353915097000},"page":"146-152","source":"Crossref","is-referenced-by-count":0,"title":["Approach of Tracing Prevention System Using OAuth for Printing Services in Mobile Device"],"prefix":"10.1007","author":[{"given":"Jin-Mook","family":"Kim","sequence":"first","affiliation":[]},{"given":"Jeong-Kyung","family":"Moon","sequence":"additional","affiliation":[]},{"given":"Bong-Hwa","family":"Hong","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"21_CR1","doi-asserted-by":"crossref","unstructured":"Armbrust, M., Fox, A., Griffith, R., Joseph, A.D., Katz, R., Konwinski, A., Lee, G., Patterson, D., Rabkin, A., Stoica, I., Zaharia, M.: Above the clouds: A Berkeley View of Cloud Computing. Technical Report (February 2009)","DOI":"10.1145\/1721654.1721672"},{"issue":"3","key":"21_CR2","first-page":"84","volume":"1","author":"H. Shabeeb","year":"2012","unstructured":"Shabeeb, H., Jeyanthi, N., Iyengar, N.C.S.N.: A Study on Security Threats in Cloud. International Journal of Cloud Computing and Services Science (IJ-CLOSER)\u00a01(3), 84\u201388 (2012)","journal-title":"International Journal of Cloud Computing and Services Science (IJ-CLOSER)"},{"key":"21_CR3","unstructured":"Joha, A., Janessen, M.: Design Choices Underlying the Software as a Service (SaaS) Business Model from the User Perspective: Exploring the Fourth Wave of Outsourcing. Journal of Universal Computer Science\u00a018(11) (2012)"},{"key":"21_CR4","doi-asserted-by":"crossref","unstructured":"Lawton, G.: Developing Software Online with Platform-as-a-Service Technology. Computer (June 2008)","DOI":"10.1109\/MC.2008.185"},{"key":"21_CR5","unstructured":"Amazon: Amazon Web Service: Overview of Security Process, white paper (September 2008), \n                  \n                    http:\/\/aws.amazon.com"},{"key":"21_CR6","doi-asserted-by":"crossref","unstructured":"Moon, J.-K., Kim, J.-M., Kim, H.-R.: A Secure Authentication Protocol for Cloud Services. JAITC\u00a01(2) (2011) (manuscript)","DOI":"10.14801\/JAITC.2011.1.2.17"},{"key":"21_CR7","doi-asserted-by":"crossref","unstructured":"Kazai, G., Kamps, J., Koolen, M., Milic-Frayling, N.: Crowdsourcing for Book Search Evaluation: Impact of HIT Design on Comparative System Ranking. In: SIGIR 2011, July 24-28 (2011)","DOI":"10.1145\/2009916.2009947"},{"key":"21_CR8","unstructured":"Jacobs, P.S.: Text-Based Intelligent Systems: Current Research and Practice in Information Extraction and Retrieval (1992), \n                  \n                    acl.ldc.upenn.edu"},{"key":"21_CR9","unstructured":"Mostarda, M., Palmisano, D., Zani, F., Tripodi, S.: Towards an OpenID-based solution to the Social Network Interoperability Problem. In: W3C Workshop on the Future (2009), \n                  \n                    w3.org"},{"key":"21_CR10","unstructured":"http:\/\/openid.net\/"},{"key":"21_CR11","unstructured":"Paul, R.: Compromising Twitter\u2019s OAuth security system (2010), \n                  \n                    immagic.com"},{"key":"21_CR12","doi-asserted-by":"crossref","unstructured":"Al-Sinani, H.S.: Browser Extension-based Interoperation between OAuth and Information Card-based Systems (2011), \n                  \n                    pure.rhul.ac.uk","DOI":"10.1109\/ISIAS.2011.6122819"}],"container-title":["Communications in Computer and Information Science","Computer Applications for Graphics, Grid Computing, and Industrial Environment"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-35600-1_21","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,9]],"date-time":"2019-05-09T02:22:14Z","timestamp":1557368534000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-35600-1_21"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642355998","9783642356001"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-35600-1_21","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2012]]}}}