{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,5]],"date-time":"2025-08-05T12:46:02Z","timestamp":1754397962839,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":18,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642393440"},{"type":"electronic","value":"9783642393457"}],"license":[{"start":{"date-parts":[[2013,1,1]],"date-time":"2013-01-01T00:00:00Z","timestamp":1356998400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-39345-7_39","type":"book-chapter","created":{"date-parts":[[2013,7,1]],"date-time":"2013-07-01T08:08:43Z","timestamp":1372666123000},"page":"366-375","source":"Crossref","is-referenced-by-count":9,"title":["Cloudopsy: An Autopsy of Data Flows in the Cloud"],"prefix":"10.1007","author":[{"given":"Angeliki","family":"Zavou","sequence":"first","affiliation":[]},{"given":"Vasilis","family":"Pappas","sequence":"additional","affiliation":[]},{"given":"Vasileios P.","family":"Kemerlis","sequence":"additional","affiliation":[]},{"given":"Michalis","family":"Polychronakis","sequence":"additional","affiliation":[]},{"given":"Georgios","family":"Portokalidis","sequence":"additional","affiliation":[]},{"given":"Angelos D.","family":"Keromytis","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"1","key":"39_CR1","doi-asserted-by":"publisher","first-page":"86","DOI":"10.1109\/MC.2012.16","volume":"45","author":"H. Berghel","year":"2012","unstructured":"Berghel, H.: Identity theft and financial fraud: Some strangeness in the proportions. Computer\u00a045(1), 86\u201389 (2012)","journal-title":"Computer"},{"key":"39_CR2","doi-asserted-by":"crossref","unstructured":"Chen, Y.Y., Jamkhedkar, P.A., Lee, R.B.: A software-hardware architecture for self-protecting data. In: Proceedings of the 2012 ACM Conference on Computer and Communications Security, CCS 2012, pp. 14\u201327 (2012)","DOI":"10.1145\/2382196.2382201"},{"key":"39_CR3","doi-asserted-by":"crossref","unstructured":"Chow, R., Golle, P., Jakobsson, M., Shi, E., Staddon, J., Masuoka, R., Molina, J.: Controlling data in the cloud: outsourcing computation without outsourcing control. In: Proceedings of the 2009 ACM Workshop on Cloud Computing Security, CCSW 2009, pp. 85\u201390 (2009)","DOI":"10.1145\/1655008.1655020"},{"key":"39_CR4","unstructured":"Cloud Security Alliance: Security guidance for critical areas of focus in cloud computing v2.1 (December 2009), \n                    \n                      https:\/\/cloudsecurityalliance.org\/csaguide.pdf"},{"key":"39_CR5","unstructured":"Computerworld: Microsoft BPOS cloud service hit with data breach (December 2010), \n                    \n                      http:\/\/www.computerworld.com\/s\/article\/9202078\/Microsoft_BPOS_cloud_service_hit_with_data_breach"},{"key":"39_CR6","unstructured":"Cornell University: Open-source Forensics Tools for Network and System Administrators \u2013 Spider (February 2010), \n                    \n                      http:\/\/www2.cit.cornell.edu\/security\/tools\/"},{"key":"39_CR7","unstructured":"Gens, F.: IT Cloud Services User Survey, pt.2: Top Benefits & Challenges. IDC (October 2008), \n                    \n                      http:\/\/blogs.idc.com\/ie\/?p=210"},{"issue":"4","key":"39_CR8","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1109\/MSP.2009.87","volume":"7","author":"L. Kaufman","year":"2009","unstructured":"Kaufman, L.: Data security in the world of cloud computing. IEEE Security Privacy\u00a07(4), 61\u201364 (2009)","journal-title":"IEEE Security Privacy"},{"key":"39_CR9","doi-asserted-by":"crossref","unstructured":"Kemerlis, V.P., Portokalidis, G., Jee, K., Keromytis, A.D.: libdft: Practical Dynamic Data Flow Tracking for Commodity Systems. In: Proc. of VEE (2012)","DOI":"10.1145\/2151024.2151042"},{"key":"39_CR10","doi-asserted-by":"crossref","unstructured":"Ko, R., Jagadpramana, P., Mowbray, M., Pearson, S., Kirchberg, M., Liang, Q., Lee, B.S.: TrustCloud: A framework for accountability and trust in cloud computing. In: 2011 IEEE World Congress on Services (SERVICES), pp. 584\u2013588 (July 2011)","DOI":"10.1109\/SERVICES.2011.91"},{"key":"39_CR11","doi-asserted-by":"crossref","unstructured":"Krzywinski, M.I., Schein, J.E., Birol, I., Connors, J., Gascoyne, R., Horsman, D., Jones, S.J., Marra, M.A.: Circos: An information aesthetic for comparative genomics. Genome Research (2009)","DOI":"10.1101\/gr.092759.109"},{"key":"39_CR12","doi-asserted-by":"crossref","unstructured":"Massonet, P., Naqvi, S., Ponsard, C., Latanicki, J., Rochwerger, B., Villari, M.: A monitoring and audit logging architecture for data location compliance in federated cloud infrastructures. In: 2011 IEEE International Symposium on Parallel and Distributed Processing Workshops and Phd Forum (IPDPSW), pp. 1510\u20131517 (May 2011)","DOI":"10.1109\/IPDPS.2011.304"},{"key":"39_CR13","unstructured":"Molnar, D., Schechter, S.: Self hosting vs. cloud hosting: Accounting for the security impact of hosting in the cloud. In: Proceedings of the 9th Workshop on the Economics of Information Security, WEIS 2010, pp. 1\u201318 (2010)"},{"key":"39_CR14","unstructured":"Pappas, V., Kemerlis, V., Zavou, A., Polychronakis, M., Keromytis, A.D.: CloudFence: Enabling Users to Audit the Use of their Cloud-Resident Data. Tech. Rep. CUCS-002-12, CS Department, Columbia University (2012), \n                    \n                      http:\/\/hdl.handle.net\/10022\/AC:P:12821"},{"key":"39_CR15","unstructured":"Sophos: Groupon subsidiary leaks 300k logins, fixes fail, fails again (June 2011), \n                    \n                      http:\/\/nakedsecurity.sophos.com\/2011\/06\/30\/groupon-subsidiary-leaks-300k-logins-fixes-fail-fails-again\/"},{"key":"39_CR16","unstructured":"The Wall Street Journal: Google Discloses Privacy Glitch (March 2009), \n                    \n                      http:\/\/blogs.wsj.com\/digits\/2009\/03\/08\/1214\/"},{"key":"39_CR17","unstructured":"VirtueMart eCommerce Solution: VirtueMart shopping cart software, \n                    \n                      http:\/\/virtuemart.net"},{"key":"39_CR18","doi-asserted-by":"crossref","unstructured":"Wang, C., Wang, Q., Ren, K., Lou, W.: Privacy-preserving public auditing for data storage security in cloud computing. In: 2010 Proceedings IEEE INFOCOM (March 2010)","DOI":"10.1109\/INFCOM.2010.5462173"}],"container-title":["Lecture Notes in Computer Science","Human Aspects of Information Security, Privacy, and Trust"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-39345-7_39","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,2,22]],"date-time":"2020-02-22T21:43:48Z","timestamp":1582407828000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-39345-7_39"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642393440","9783642393457"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-39345-7_39","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2013]]}}}