{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T06:42:37Z","timestamp":1725864157354},"publisher-location":"Berlin, Heidelberg","reference-count":10,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783662533567"},{"type":"electronic","value":"9783662533574"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-662-53357-4_21","type":"book-chapter","created":{"date-parts":[[2016,8,30]],"date-time":"2016-08-30T09:22:01Z","timestamp":1472548921000},"page":"319-327","source":"Crossref","is-referenced-by-count":2,"title":["CallForFire: A Mission-Critical Cloud-Based Application Built Using the Nomad Framework"],"prefix":"10.1007","author":[{"given":"Mamadou H.","family":"Diallo","sequence":"first","affiliation":[]},{"given":"Michael","family":"August","sequence":"additional","affiliation":[]},{"given":"Roger","family":"Hallman","sequence":"additional","affiliation":[]},{"given":"Megan","family":"Kline","sequence":"additional","affiliation":[]},{"given":"Henry","family":"Au","sequence":"additional","affiliation":[]},{"given":"Vic","family":"Beach","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,8,31]]},"reference":[{"unstructured":"GCN: Like it or not, cloud computing is here to stay (2011). http:\/\/gcn.com\/microsites\/2011\/cloud-computing-download\/cloud-computing-application-development.aspx","key":"21_CR1"},{"unstructured":"Alliance, C.S.: The notorious nine: cloud computing top threats in 2013. In: Top Threats Working Group (2013)","key":"21_CR2"},{"doi-asserted-by":"crossref","unstructured":"Brakerski, Z., Gentry, C., Vaikuntanathan, V.: Fully homomorphic encryption without bootstrapping. Cryptology ePrint Archive, Report 2011\/277 (2011)","key":"21_CR3","DOI":"10.1145\/2090236.2090262"},{"doi-asserted-by":"crossref","unstructured":"Diallo, M.H., August, M., Hallman, R., Kline, M., Au, H., Beach, V.: Nomad: a framework for developing mission-critical cloud-based applications. In: 10th International Conference on Availability, Reliability and Security, ARES, Toulouse, France, 24\u201327 August 2015","key":"21_CR4","DOI":"10.1109\/ARES.2015.94"},{"doi-asserted-by":"crossref","unstructured":"Gentry, C.: Fully homomorphic encryption using ideal lattices. In: Proceedings of the Forty-first Annual ACM Symposium on Theory of Computing, STOC 2009. ACM (2009)","key":"21_CR5","DOI":"10.1145\/1536414.1536440"},{"unstructured":"Halevi, S., Shoup, V.: Design and implementation of a homomorphic-encryption library (2013)","key":"21_CR6"},{"unstructured":"Headquarters, Department of the Army: Tactics, Techniques, and Procedures for Observed Fire, Field Manual 6-30 (1991)","key":"21_CR7"},{"unstructured":"Headquarters Department of the Army Washington, D.C: FM 3\u201325.26 Map Reading and Land Navigation (2001)","key":"21_CR8"},{"issue":"8","key":"21_CR9","first-page":"26","volume":"91","author":"PV Parmar","year":"2014","unstructured":"Parmar, P.V., Padhar, S.B., Patel, S.N., Bhatt, N.I., Jhaveri, R.H.: Survey of various homomorphic encryption algorithms and schemes. Int. J. Comput. Appl. 91(8), 26\u201332 (2014). Published by Foundation of Computer Science, New York, USA, April 2014","journal-title":"Int. J. Comput. Appl."},{"unstructured":"Porticor: Securing data in the cloud (2013). https:\/\/www.porticor.com\/homomorphic-encryption\/","key":"21_CR10"}],"container-title":["Lecture Notes in Computer Science","Financial Cryptography and Data Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-662-53357-4_21","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,12]],"date-time":"2019-09-12T22:23:14Z","timestamp":1568326994000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-662-53357-4_21"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783662533567","9783662533574"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/978-3-662-53357-4_21","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016]]}}}