{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T21:59:39Z","timestamp":1742939979755,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":16,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783662465486"},{"type":"electronic","value":"9783662465493"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-662-46549-3_27","type":"book-chapter","created":{"date-parts":[[2015,4,24]],"date-time":"2015-04-24T07:14:40Z","timestamp":1429859680000},"page":"411-423","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Cloud Security Assessment: Practical Method for Organization\u2019s Assets Migration to the Cloud"],"prefix":"10.1007","author":[{"given":"Ronivon","family":"Costa","sequence":"first","affiliation":[]},{"given":"Carlos","family":"Serr\u00e3o","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,4,25]]},"reference":[{"key":"27_CR1","unstructured":"Reuters: Amazon wins key cloud security clearance from government. http:\/\/www.reuters.com\/article\/2013\/05\/21\/us-amazon-cloud-idUSBRE94K06S20130521"},{"key":"27_CR2","unstructured":"Herzog, P.: OSSTMM 3 \u2013 The Open Source Security Testing Methodology Manual \u2013 Contemporary Security Test and Analysis. Institute for Security and Open Methodologies (ISECOM) (2010)"},{"key":"27_CR3","unstructured":"European Network and Information Security Agency (ENISA): Cloud: Benefits, risks and recommendations for information security. http:\/\/www.enisa.europa.eu"},{"key":"27_CR4","doi-asserted-by":"crossref","unstructured":"Yildiz, M., Abawajy, J., Ercan, T., Bernoth, A.: A layered security approach for cloud computing infrastructure. In: 2009 10th International Symposium on Pervasive Systems Algorithms, and Networks, pp. 763\u2013767. IEEE 978-0-7695-3908-9\/09 (2009)","DOI":"10.1109\/I-SPAN.2009.157"},{"key":"27_CR5","unstructured":"Cloud Security Alliance: Security Guidance for Critical Areas of Focus in Cloud Computing V2.1. http:\/\/www.cloudsecurityalliance.org\/guidance\/csaguide.v2.1.pdf"},{"key":"27_CR6","unstructured":"U.S. Chief Information Officer: Proposed Security Assessment and Authorization for U.S. Government Cloud Computing. http:\/\/educationnewyork.com\/files\/Proposed-Security-Assessment-and-Authorization-for-Cloud-Computing.pdf"},{"key":"27_CR7","unstructured":"OWASP: Cloud Top 10 Security Risks. https:\/\/www.owasp.org\/index.php\/Category:OWASP_Cloud_%E2%80%90_10_Project"},{"key":"27_CR8","unstructured":"Herzog, P.: Analyzing the Biggest Bank Robbery in History: Lessons in OSSTMM Analysis. Banking Magazine, 2\/2011. http:\/\/hakin9.org\/analyzing-the-biggest-bank-robbery-in-history-lessons-in-osstmm-analysis"},{"issue":"2","key":"27_CR9","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1109\/MSP.2010.115","volume":"9","author":"B Grobauer","year":"2011","unstructured":"Grobauer, B., Walloschek, T., St\u00f6cker, E.: Understanding cloud computing vulnerabilities. IEEE Secur. Priv. 9(2), 50\u201357 (2011). doi:10.1109\/MSP.2010.115","journal-title":"IEEE Secur. Priv."},{"key":"27_CR10","doi-asserted-by":"crossref","unstructured":"Hiroyuki, S., Shigeaki, T., Atsushi, K.: Building a security aware cloud by extending internal control to cloud. In: 2011 Tenth International Symposium on Autonomous Decentralized Systems, pp. 323\u2013326. IEEE 978-0-7695-4349-9\/11 (2011)","DOI":"10.1109\/ISADS.2011.48"},{"key":"27_CR11","unstructured":"CERT: 2011 CyberSecurityWatch Survey - How Bad Is the Insider Threat? Carnegie Mellon University. http:\/\/www.cert.org\/archive\/pdf\/CyberSecuritySurvey2011Data.pdf"},{"key":"27_CR12","volume-title":"Cloud Security: A Comphrehensive Guide to Secure Cloud Computing","author":"R Krutz","year":"2010","unstructured":"Krutz, R., Vines, R.: Cloud Security: A Comphrehensive Guide to Secure Cloud Computing. Wiley Publishing, Indian\u00e1polis (2010)"},{"key":"27_CR13","volume-title":"Professional Penetration Testing","author":"T Wilhelm","year":"2010","unstructured":"Wilhelm, T.: Professional Penetration Testing. Elsevier Inc, Burlington (2010)"},{"key":"27_CR14","volume-title":"Hacking Exposed: Network Security Secrets and Solutions","author":"S MacClure","year":"1999","unstructured":"MacClure, S., Scambray, J., Kurtz, G.: Hacking Exposed: Network Security Secrets and Solutions. Oxborne, California (1999)"},{"key":"27_CR15","unstructured":"Cloud Security Alliance: Consensus Assessments Initiative. https:\/\/cloudsecurityalliance.org\/research\/cai"},{"key":"27_CR16","doi-asserted-by":"crossref","unstructured":"Mell, P., Grance, T.: The NIST Definition of Cloud Computing. NIST Special Publication 800\u2013145. National Institute of Standards and Technology \u2013 U.S Department of Commerce. http:\/\/csrc.nist.gov\/publications\/nistpubs\/800-145\/SP800-145.pdf (2011)","DOI":"10.6028\/NIST.SP.800-145"}],"container-title":["Communications in Computer and Information Science","Knowledge Discovery, Knowledge Engineering and Knowledge Management"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-662-46549-3_27","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,17]],"date-time":"2023-02-17T23:16:13Z","timestamp":1676675773000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-662-46549-3_27"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783662465486","9783662465493"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-662-46549-3_27","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2015]]},"assertion":[{"value":"25 April 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}