{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T06:44:13Z","timestamp":1743144253557,"version":"3.40.3"},"publisher-location":"Dordrecht","reference-count":5,"publisher":"Springer Netherlands","isbn-type":[{"type":"print","value":"9789401787970"},{"type":"electronic","value":"9789401787987"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-94-017-8798-7_45","type":"book-chapter","created":{"date-parts":[[2014,4,18]],"date-time":"2014-04-18T05:40:19Z","timestamp":1397799619000},"page":"373-382","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["User-Centric Security Service Model for Cloud Storage"],"prefix":"10.1007","author":[{"given":"SeongMin","family":"Yoo","sequence":"first","affiliation":[]},{"given":"PyungKoo","family":"Park","sequence":"additional","affiliation":[]},{"given":"JinSeop","family":"Shin","sequence":"additional","affiliation":[]},{"given":"HoYong","family":"Ryu","sequence":"additional","affiliation":[]},{"given":"JaeCheol","family":"Ryou","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,4,19]]},"reference":[{"key":"45_CR1","doi-asserted-by":"crossref","unstructured":"Drago I, Mellia M, Munafo MM, Sperotto A, Sadre R, Pras A (2012) Inside dropbox: understanding personal cloud storage services. In: Proceedings of the 2012 ACM conference on internet measurement conference, pp 481\u2013494 (Nov 2012)","DOI":"10.1145\/2398776.2398827"},{"key":"45_CR2","unstructured":"Archer J, Boehm A (2009) Security guidance for critical areas of focus in cloud computing. Cloud Secur Alliance"},{"issue":"11","key":"45_CR3","doi-asserted-by":"publisher","first-page":"612","DOI":"10.1145\/359168.359176","volume":"22","author":"A Shamir","year":"1979","unstructured":"Shamir A (1979) How to share a secret. Commun ACM 22(11):612\u2013613","journal-title":"Commun ACM"},{"key":"45_CR4","doi-asserted-by":"crossref","unstructured":"Blakley GR (1979) Safeguarding cryptographic keys. In: Proceedings of the national computer conference, pp 313\u2013317","DOI":"10.1109\/MARK.1979.8817296"},{"issue":"3","key":"45_CR5","doi-asserted-by":"publisher","first-page":"501","DOI":"10.1137\/S0036144502417715","volume":"46","author":"JP Berrut","year":"2004","unstructured":"Berrut JP, Lloyd NT (2004) Barycentric lagrange interpolation. Siam Rev 46(3):501\u2013517","journal-title":"Siam Rev"}],"container-title":["Lecture Notes in Electrical Engineering","Frontier and Innovation in Future Computing and Communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-94-017-8798-7_45","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,5,11]],"date-time":"2023-05-11T16:06:26Z","timestamp":1683821186000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-94-017-8798-7_45"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9789401787970","9789401787987"],"references-count":5,"URL":"https:\/\/doi.org\/10.1007\/978-94-017-8798-7_45","relation":{},"ISSN":["1876-1100","1876-1119"],"issn-type":[{"type":"print","value":"1876-1100"},{"type":"electronic","value":"1876-1119"}],"subject":[],"published":{"date-parts":[[2014]]},"assertion":[{"value":"19 April 2014","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}