{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,11]],"date-time":"2024-09-11T15:41:17Z","timestamp":1726069277253},"publisher-location":"Singapore","reference-count":16,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811533792"},{"type":"electronic","value":"9789811533808"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-981-15-3380-8_26","type":"book-chapter","created":{"date-parts":[[2020,3,3]],"date-time":"2020-03-03T00:04:40Z","timestamp":1583193880000},"page":"296-307","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["A Cloud Services Security Analysis"],"prefix":"10.1007","author":[{"given":"Tomas","family":"Svoboda","sequence":"first","affiliation":[]},{"given":"Josef","family":"Horalek","sequence":"additional","affiliation":[]},{"given":"Vladimir","family":"Sobeslav","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,3,3]]},"reference":[{"key":"26_CR1","unstructured":"Mell, P., Grance, T.: The NIST Definition of Cloud Computing (Draft): Recommendations of the National Institute of Standards and Technology (2011). \nhttp:\/\/csrc.nist.gov\/publications\/nistpubs\/800-145\/SP800-145.pdf"},{"key":"26_CR2","unstructured":"HADA: Introduction of Cloud Computing (2014). \nhttps:\/\/www.slideshare.net\/rahulhada\/introduction-of-cloud-computing"},{"key":"26_CR3","doi-asserted-by":"publisher","first-page":"1585","DOI":"10.4018\/978-1-4666-6539-2.ch074","volume-title":"Cloud Technology","author":"Jaydip Sen","year":"2015","unstructured":"Sen, J.: Security and privacy issues in cloud computing. In: Cloud Technology, Management Association, Information Resources, ed., pp. 1585\u20131630. IGI Global (2015). \nhttps:\/\/doi.org\/10.4018\/978-1-4666-6539-2.ch074\n\n. ISBN 9781466665392. \nhttp:\/\/services.igi-global.com\/resolvedoi\/resolve.aspx?doi=10.4018\/978-1-4666-6539-2.ch074"},{"issue":"6","key":"26_CR4","doi-asserted-by":"publisher","first-page":"76","DOI":"10.1109\/mcc.2016.124","volume":"3","author":"M Villari","year":"2016","unstructured":"Villari, M., Fazio, M., Dustdar, S., Rana, O., Ranjan, R.: Osmotic computing: a new paradigm for edge\/cloud integration. IEEE Cloud Comput. 3(6), 76\u201383 (2016). \nhttps:\/\/doi.org\/10.1109\/mcc.2016.124\n\n. ISSN 2325-6095. \nhttp:\/\/ieeexplore.ieee.org\/document\/7802525\n\n. Accessed 29 Sept 2019","journal-title":"IEEE Cloud Comput."},{"issue":"8","key":"26_CR5","doi-asserted-by":"publisher","first-page":"1297","DOI":"10.1109\/tmm.2015.2441004","volume":"17","author":"P Lu","year":"2015","unstructured":"Lu, P., Sun, Q., Wu, K., Zhu, Z.: Distributed online hybrid cloud management for profit-driven multimedia cloud computing. IEEE Trans. Multimedia 17(8), 1297\u20131308 (2015). \nhttps:\/\/doi.org\/10.1109\/tmm.2015.2441004\n\n. ISSN 1520-9210. \nhttp:\/\/ieeexplore.ieee.org\/document\/7116597\/\n\n. Accessed 29 Sept 2019","journal-title":"IEEE Trans. Multimedia"},{"key":"26_CR6","doi-asserted-by":"publisher","first-page":"72","DOI":"10.1016\/j.csi.2014.10.001","volume":"38","author":"DC Chou","year":"2015","unstructured":"Chou, D.C.: Cloud computing: a value creation model. Comput. Stan. Interfaces 38, 72\u201377 (2015). \nhttps:\/\/doi.org\/10.1016\/j.csi.2014.10.001\n\n. ISSN 09205489. \nhttps:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0920548914000981","journal-title":"Comput. Stan. Interfaces"},{"key":"26_CR7","unstructured":"Cloudbuzz:. Is cloud computing experiencing the same security threats as enterprise computing? (2011). \nhttps:\/\/cloudtweaks.com\/2013\/04\/is-cloud-computingexperiencing-the-same-security-threats-enterprise-computing\n\n. Accessed 22 Mar 2017."},{"key":"26_CR8","volume-title":"Implementing Effective IT Governance and IT Management","author":"GJ Selig","year":"2015","unstructured":"Selig, G.J.: Implementing Effective IT Governance and IT Management. van Haren Publishing, \u2018s-Hertogenbosch (2015). ISBN 9789401805728"},{"key":"26_CR9","volume-title":"Cloud Storage Security: A Practical Guide","author":"A Wheeler","year":"2015","unstructured":"Wheeler, A., Winburn, M.: Cloud Storage Security: A Practical Guide. Elsevier Science, Amsterdam (2015). ISBN 9780128029312"},{"key":"26_CR10","volume-title":"Cloud Computing: Security Compliance and Governance","author":"R Ballantine","year":"2012","unstructured":"Ballantine, R.: Cloud Computing: Security Compliance and Governance. BookBaby, Philadelphia (2012). ISBN 9781618429971"},{"key":"26_CR11","unstructured":"Rhoton, J., De Clercq, J., Novak, F.: OpenStack Cloud Computing: Architecture Guide. Recursive Press (2014). ISBN 9780956355683"},{"key":"26_CR12","series-title":"Springer Briefs in Electrical and Computer Engineering","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-33135-5","volume-title":"Software Defined Networking Applications in Distributed Datacenters","author":"H Qi","year":"2016","unstructured":"Qi, H., Li, K.: Software Defined Networking Applications in Distributed Datacenters. SECE. Springer, Cham (2016). \nhttps:\/\/doi.org\/10.1007\/978-3-319-33135-5"},{"key":"26_CR13","unstructured":"Dupr\u00e9, L., Haeberlen, T.: ENISA, Cloud computing benefits, risks and recommendations for information security (2012). \nhttps:\/\/resilience.enisa.europa.eu\/cloud-security-andresilience\/publications\/cloud-computing-benefits-risks-and-recommendations-forinformation-security"},{"key":"26_CR14","doi-asserted-by":"publisher","DOI":"10.4018\/978-1-5225-0759-8","volume-title":"Handbook of Research on End-to-End Cloud Computing Architecture Design","author":"J Chen","year":"2017","unstructured":"Chen, J., Zhang, Y., Gottschalk, R.: Handbook of Research on End-to-End Cloud Computing Architecture Design. IGI Global, Hershey (2017). ISSN 2327-3453"},{"key":"26_CR15","doi-asserted-by":"publisher","unstructured":"Gai, K., Qiu, M., Zhao, M., Xiong, J.: Privacy-aware adaptive data encryption strategy of big data in cloud computing. In: IEEE 3rd International Conference on Cyber Security and Cloud Computing (CSCloud), pp. 273\u2013278. IEEE (2016) . \nhttps:\/\/doi.org\/10.1109\/cscloud.2016.52\n\n. ISBN 978-1-5090-0946-6. \nhttp:\/\/ieeexplore.ieee.org\/document\/7545931\/","DOI":"10.1109\/cscloud.2016.52"},{"key":"26_CR16","doi-asserted-by":"publisher","first-page":"204","DOI":"10.1016\/j.procs.2015.04.171","volume":"48","author":"R Velumadhava","year":"2015","unstructured":"Velumadhava, R., Selvamani, K.: Data security challenges and its solutions in cloud computing. Procedia Comput. Sci. 48, 204\u2013209 (2015). \nhttps:\/\/doi.org\/10.1016\/j.procs.2015.04.171\n\n. ISSN 18770509. \nhttps:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S1877050915006808","journal-title":"Procedia Comput. Sci."}],"container-title":["Communications in Computer and Information Science","Intelligent Information and Database Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-15-3380-8_26","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,3,3]],"date-time":"2020-03-03T00:07:18Z","timestamp":1583194038000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-981-15-3380-8_26"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9789811533792","9789811533808"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-981-15-3380-8_26","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"3 March 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ACIIDS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Asian Conference on Intelligent Information and Database Systems","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Phuket","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Thailand","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23 March 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26 March 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"aciids2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/aciids.pwr.edu.pl\/2020\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}