{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T11:25:37Z","timestamp":1742988337362,"version":"3.40.3"},"publisher-location":"Wiesbaden","reference-count":14,"publisher":"Springer Fachmedien Wiesbaden","isbn-type":[{"type":"print","value":"9783658067076"},{"type":"electronic","value":"9783658067083"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-658-06708-3_11","type":"book-chapter","created":{"date-parts":[[2014,10,17]],"date-time":"2014-10-17T06:50:27Z","timestamp":1413528627000},"page":"144-154","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Securing Cloud: Elastic Key Management and Homomorphic Encryption"],"prefix":"10.1007","author":[{"given":"Alexander W.","family":"Koehler","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,10,18]]},"reference":[{"key":"11_CR85","unstructured":"[Amaz14] Amazon Web Services CloudHSM: http:\/\/aws.amazon.com\/de\/cloudhsm\/"},{"key":"11_CR86","unstructured":"[BSI12] Security Recommendations for Cloud Computing Providers, 02\/2012, https:\/\/www.bsi.bund.de\/SharedDocs\/Downloads\/EN\/BSI\/Publications\/Minimum_information\/SecurityRecommendationsCloudComputingProviders.pdf;jsessionid=93CC753F47C4AB57FAEDE6B9A954BCDD.2_cid368?__blob=publicationFile"},{"key":"11_CR87","unstructured":"[CSA13] The Cloud Security Alliance: \u201cSecurity Guidance for Critical Areas of Focus in Cloud Computing V 3.0\u201d, 2013, https:\/\/cloudsecurityalliance.org\/guidance\/csaguide.v3.0.pdf"},{"key":"11_CR88","unstructured":"[DaPa14] Ariel Dan, Gilad Parann-Nissany, Porticor Ltd., Homomorphic Key Management http:\/\/www.porticor.com\/porticor-virtual-private-data\/"},{"key":"11_CR89","unstructured":"[Hard13] Securing the cloud: A new algorithm solves a major problem with homomorphic encryption, which would let Web servers process data without decrypting it. Larry Hardesty, MIT News Office June 10, 2013 http:\/\/newsoffice.mit.edu\/2013\/algorithm-solves-homomorphic-encryption-problem-0610"},{"key":"11_CR90","unstructured":"[Jenn13] Roger Jennings et al., Cloud computing experts forecast the market climate in 2014, TechTarget 2013, http:\/\/searchcloudcomputing.techtarget.com\/feature\/Cloud-computing-experts-forecastthe-market-climate-in-2014"},{"key":"11_CR91","unstructured":"[KiWe14] Kim Weins, Right Scale, Cloud Computing Trends: 2014 State of Cloud Survey, http:\/\/www.rightscale.com\/blog\/cloud-industry-insights\/cloud-computing-trends-2014-state-cloud-survey#Enterprise-Cloud-Governance-Lags-Adoption"},{"key":"11_CR92","doi-asserted-by":"crossref","unstructured":"[Koeh04] Alexander W. Koehler, Trusted Computing: From Theory to Practice in the Real World, S. Paulus, N. Pohlmann, H. Reimer: Securing Electronic Business Processes, Vieweg (2004), 209-218","DOI":"10.1007\/978-3-322-84984-7_21"},{"key":"11_CR93","unstructured":"[Krum14] Randy Krum, The Explosive Growth of Cloud Computing, 2014 http:\/\/www.coolinfographics.com\/blog\/2014\/5\/5\/the-explosive-growth-of-cloud-computing.html"},{"key":"11_CR94","unstructured":"[MeGr11] Peter Mell, Timothy Grance, National Institute of Standards and Technology,SP 800-145, 2011, http:\/\/csrc.nist.gov\/publications\/nistpubs\/800-145\/SP800-145.pdf"},{"key":"11_CR95","doi-asserted-by":"crossref","unstructured":"[NePa14] Surya Nepal, Mukaddim Patah, Security, Privacy and Trust in Cloud Systems, Springer Verlag Berlin Heidelberg, 2014","DOI":"10.1007\/978-3-642-38586-5"},{"key":"11_CR96","unstructured":"[PCI11] Tokenization, described by the Tokenization Taskforce at the PCI Security Standards Council, https:\/\/www.pcisecuritystandards.org\/documents\/Tokenization_Guidelines_Info_Supplement.pdf"},{"key":"11_CR97","unstructured":"[Schn09] Bruce Schneier, Schneier on Security, Homomorphic Encryption Breakthrough, 2009, until to date: 2014 https:\/\/www.schneier.com\/blog\/archives\/2009\/07\/homomorphic_enc.html"},{"key":"11_CR98","unstructured":"[TCG14] Trusted Computing Group on Trusted Platform Module http:\/\/www.trustedcomputinggroup.org\/solutions\/authentication"}],"container-title":["ISSE 2014 Securing Electronic Business Processes"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-658-06708-3_11","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,14]],"date-time":"2023-02-14T22:56:53Z","timestamp":1676415413000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-658-06708-3_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783658067076","9783658067083"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-3-658-06708-3_11","relation":{},"subject":[],"published":{"date-parts":[[2014]]},"assertion":[{"value":"18 October 2014","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}