{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,1,18]],"date-time":"2025-01-18T05:13:53Z","timestamp":1737177233861,"version":"3.33.0"},"publisher-location":"Berlin, Heidelberg","reference-count":16,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642380815"},{"type":"electronic","value":"9783642380822"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-38082-2_13","type":"book-chapter","created":{"date-parts":[[2013,4,22]],"date-time":"2013-04-22T08:43:53Z","timestamp":1366620233000},"page":"153-158","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Seeding the Cloud: An Innovative Approach to Grow Trust in Cloud Based Infrastructures"],"prefix":"10.1007","author":[{"given":"St\u00e9phane","family":"Betg\u00e9-Brezetz","sequence":"first","affiliation":[]},{"given":"Aline","family":"Bousquet","sequence":"additional","affiliation":[]},{"given":"J\u00e9r\u00e9my","family":"Briffaut","sequence":"additional","affiliation":[]},{"given":"Eddy","family":"Caron","sequence":"additional","affiliation":[]},{"given":"Laurent","family":"Clevy","sequence":"additional","affiliation":[]},{"given":"Marie-Pascale","family":"Dupont","sequence":"additional","affiliation":[]},{"given":"Guy-Bertrand","family":"Kamga","sequence":"additional","affiliation":[]},{"given":"Jean-Marc","family":"Lambert","sequence":"additional","affiliation":[]},{"given":"Arnaud","family":"Lefray","sequence":"additional","affiliation":[]},{"given":"Bertrand","family":"Marquet","sequence":"additional","affiliation":[]},{"given":"Jonathan","family":"Rouzaud-Cornabas","sequence":"additional","affiliation":[]},{"given":"Lamiel","family":"Toch","sequence":"additional","affiliation":[]},{"given":"Christian","family":"Toinard","sequence":"additional","affiliation":[]},{"given":"Benjamin","family":"Venelle","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"13_CR1","doi-asserted-by":"crossref","unstructured":"Song, D., Shi, E., Fischer, I., Shankar, U.: Cloud Data Protection for the Masses. IEEE Computer Magazine\u00a045(1) (2012)","DOI":"10.1109\/MC.2012.1"},{"key":"13_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"90","DOI":"10.1007\/978-3-642-10665-1_9","volume-title":"Cloud Computing","author":"S. Pearson","year":"2009","unstructured":"Pearson, S., Shen, Y., Mowbray, M.: A Privacy Manager for Cloud Computing. In: Jaatun, M.G., Zhao, G., Rong, C. (eds.) CloudCom 2009. LNCS, vol.\u00a05931, pp. 90\u2013106. Springer, Heidelberg (2009)"},{"key":"13_CR3","doi-asserted-by":"crossref","unstructured":"Betg\u00e9-Brezetz, S., Kamga, G.B., Dupont, M.P., Ghorbel, M.: Privacy Control in the Cloud based on Multilevel Policy Enforcement. In: IEEE 1st International Conference on Cloud Networking (CloudNet 2012), Paris, November 28-29 (2012)","DOI":"10.1109\/CloudNet.2012.6483677"},{"key":"13_CR4","unstructured":"Srinivasamurthy, S., Liu, D.Q.: Survey on Cloud Computing Security. In: Proc. Conf. on Cloud Computing, CloudCom 2010 (2010)"},{"key":"13_CR5","unstructured":"Rashid, F.Y.: Epsilon Data Breach Highlights Cloud Computing Security Concerns, \n                      eWeek.com\n                     (2011)"},{"key":"13_CR6","doi-asserted-by":"crossref","unstructured":"Jansen, W., Grance, T.: Guidelines on Security and Privacy in Public Cloud Computing. NIST (2011)","DOI":"10.6028\/NIST.SP.800-144"},{"key":"13_CR7","unstructured":"Article 29 Data Protection Working Party, \u201cOpinion 05\/2012 on Cloud Computing\u201d, WP 196, Brussels (July 2012)"},{"key":"13_CR8","doi-asserted-by":"crossref","unstructured":"Caron, E., Desprez, F.: DIET: A scalable toolbox to build network enabled servers on the grid. International Journal of High Performance Computing Applications\u00a020(3) (2006)","DOI":"10.1177\/1094342006067472"},{"key":"13_CR9","doi-asserted-by":"crossref","unstructured":"Afoulki, Z., Bousquet, A., Briffaut, J., Rouzaud-Cornabas, J., Toinard, C.: MAC protection of the OpenNebula Cloud environment. In: International Conference on High Performance Computing and Simulation (HPCS), July 2-6 (2012)","DOI":"10.1109\/HPCSim.2012.6266895"},{"key":"13_CR10","doi-asserted-by":"crossref","unstructured":"Bolze, R., et al.: Grid\u20195000: A large scale and highly reconfigurable experimental grid testbed. International Journal of High Performance Computing Applications\u00a020(4) (2006)","DOI":"10.1177\/1094342006070078"},{"key":"13_CR11","unstructured":"NCSC DoD\/NIST Orange book Part I section 6.3 (December 1987), \n                      http:\/\/www.kernel.org\/pub\/linux\/libs\/security\/Orange-Linux\/refs\/Orange\/OrangeI-II.html#toc6"},{"key":"13_CR12","unstructured":"http:\/\/www.trustedcomputinggroup.org\/resources\/trusted_platform_module_tpm_summary"},{"key":"13_CR13","unstructured":"http:\/\/www.opendnssec.org\/wp-content\/uploads\/2011\/01\/A-Review-of-Hardware-Security-Modules-Fall-2010.pdf"},{"key":"13_CR14","unstructured":"http:\/\/cordis.europa.eu\/fp7\/ict\/security\/projects_en.html#CLO"},{"key":"13_CR15","unstructured":"http:\/\/www.etsi.org\/deliver\/etsi_ts\/102400_102499\/102484\/07.00.00_60\/ts_102484v070000p.pdf"},{"key":"13_CR16","unstructured":"http:\/\/www.celtic-initiative.org\/Projects\/Celtic-Plus-Projects\/2011\/SEED4C\/seed4c-default.asp"}],"container-title":["Lecture Notes in Computer Science","The Future Internet"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-38082-2_13","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,17]],"date-time":"2025-01-17T14:20:21Z","timestamp":1737123621000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-642-38082-2_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642380815","9783642380822"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-38082-2_13","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2013]]},"assertion":[{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}