{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T11:51:58Z","timestamp":1725882718352},"publisher-location":"Singapore","reference-count":16,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811031526"},{"type":"electronic","value":"9789811031533"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-981-10-3153-3_42","type":"book-chapter","created":{"date-parts":[[2017,3,16]],"date-time":"2017-03-16T07:13:59Z","timestamp":1489648439000},"page":"425-433","source":"Crossref","is-referenced-by-count":3,"title":["Cloud Security and Jurisdiction: Need of the Hour"],"prefix":"10.1007","author":[{"given":"Tamanna","family":"Jena","sequence":"first","affiliation":[]},{"given":"J. R.","family":"Mohanty","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,3,17]]},"reference":[{"key":"42_CR1","unstructured":"Kuan W. H., H\u00f6rnle, J., and Millard, C.: Data protection jurisdiction and cloud computing\u2013when are cloud users and providers subject to EU data protection law? The cloud of unknowing. International Review of Law, Computers & Technology,26(3), 129\u2013164 (2012)."},{"key":"42_CR2","unstructured":"Kandukuri, B.R., Rakshit, A.: Cloud security issues, Services Computing. In: IEEE International Conference on Services Computing, pp. 517\u2013520 (2009)."},{"key":"42_CR3","doi-asserted-by":"crossref","unstructured":"Kaufman L.M.: Data security in the world of cloud computing. IEEE Security & Privacy. 7(4), 61\u201364 (2009).","DOI":"10.1109\/MSP.2009.87"},{"key":"42_CR4","doi-asserted-by":"crossref","unstructured":"Hassan Takabi, H., James Joshi, B.D., and Ahn, G. J.: Security and privacy challenges in cloud computing environments, IEEE Security & Privacy, 8(6), 24\u201331(2010).","DOI":"10.1109\/MSP.2010.186"},{"key":"42_CR5","doi-asserted-by":"crossref","unstructured":"Jaatun, M.G., Pearson, S., Gittler, F. and Leenes, R.: Towards Strong Accountability for Cloud Service Providers. In: CloudCom, pp. 1001\u20131006 (2014).","DOI":"10.1109\/CloudCom.2014.123"},{"key":"42_CR6","unstructured":"Benghabrit, W., Grall, H., Jean-Claude Royer, J.C., Sellami, M., Azraoui, M., Elkhiyaoui, K., Melek \u00d6nen, Anderson Santana De Oliveira, and Bernsmed, B.: A Cloud Accountability Policy Representation Framework. In: CLOSER, 4th International Conference on Cloud Computing and Services Science, pp. 489\u2013498 (2014)."},{"key":"42_CR7","doi-asserted-by":"crossref","unstructured":"Xiao, Z., and Yang, X.: Security and privacy in cloud computing. IEEE Communications Surveys & Tutorials. 15(2), 843\u2013859 (2013).","DOI":"10.1109\/SURV.2012.060912.00182"},{"key":"42_CR8","doi-asserted-by":"crossref","unstructured":"Sundareswaran, S., Squicciarini, A. C., and Lin, D.: Ensuring distributed accountability for data sharing in the cloud. IEEE Transactions on Dependable and Secure Computing. 9(4), 556\u2013568 (2012).","DOI":"10.1109\/TDSC.2012.26"},{"key":"42_CR9","unstructured":"Padhy R. P., Patra, M. R. and Satapathy, S. C.: Cloud computing: security issues and research challenges. International Journal of Computer Science and Information Technology & Security (IJCSITS), 136\u2013146(2011)."},{"key":"42_CR10","doi-asserted-by":"crossref","unstructured":"Ullah, K. and Khan, M. N. A.: Security and Privacy Issues in Cloud Computing Environment: A Survey Paper. International Journal of Grid and Distributed Computing, 7(2), 89\u201398(2014).","DOI":"10.14257\/ijgdc.2014.7.2.09"},{"key":"42_CR11","doi-asserted-by":"crossref","unstructured":"Subashini, S., and Kavitha, V.: A survey on security issues in service delivery models of cloud computing. Journal of network and computer applications, 34(1), 1\u201311(2011).","DOI":"10.1016\/j.jnca.2010.07.006"},{"key":"42_CR12","doi-asserted-by":"crossref","unstructured":"Zissis, D., and Lekkas, D.: Addressing cloud computing security issues. Future Generation computer systems, 28(3), 583\u2013592(2012).","DOI":"10.1016\/j.future.2010.12.006"},{"key":"42_CR13","unstructured":"Jena, T., Mohanty, J. R., Sahoo, R.: Paradigm Shift to Green Cloud Computing. Journal of Theoretical & Applied Information Technology, 77(3), 394\u2013402 (2015)."},{"key":"42_CR14","unstructured":"Flaherty, P. D., & Ruscio, G.: Stormy Weather: Jurisdiction over Privacy and Data Protection in the Cloud, Internet and E Commerce Law in Canada, (2013)."},{"key":"42_CR15","unstructured":"H\u00f6rnle, J.: Online dispute resolution in business to consumer e-commerce transactions. Journal of Information, Law and Technology, 2, (2002)."},{"key":"42_CR16","unstructured":"National Institute of Standards and Technology, https:\/\/scap.nist.gov\/publications\/index.html"}],"container-title":["Advances in Intelligent Systems and Computing","Proceedings of the 5th International Conference on Frontiers in Intelligent Computing: Theory and Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-10-3153-3_42","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,25]],"date-time":"2017-06-25T12:44:05Z","timestamp":1498394645000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-981-10-3153-3_42"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9789811031526","9789811031533"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-981-10-3153-3_42","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2017]]}}}