{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T19:14:06Z","timestamp":1743102846119,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":14,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811623790"},{"type":"electronic","value":"9789811623806"}],"license":[{"start":{"date-parts":[[2021,9,17]],"date-time":"2021-09-17T00:00:00Z","timestamp":1631836800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,9,17]],"date-time":"2021-09-17T00:00:00Z","timestamp":1631836800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-981-16-2380-6_90","type":"book-chapter","created":{"date-parts":[[2021,9,16]],"date-time":"2021-09-16T09:32:29Z","timestamp":1631784749000},"page":"1015-1025","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Comparative Analysis of Cloud Computing Security Frameworks for Financial Sector"],"prefix":"10.1007","author":[{"given":"Sudhish","family":"Mohanan","sequence":"first","affiliation":[]},{"given":"Nandagopal","family":"Sridhar","sequence":"additional","affiliation":[]},{"given":"Sajal","family":"Bhatia","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,9,17]]},"reference":[{"issue":"12","key":"90_CR1","first-page":"921","volume":"5","author":"M Alemu","year":"2014","unstructured":"Alemu M, Omer A (2014) Cloud computing conceptual security framework for banking industry. J Emerg Trends Comput Inf Sci 5(12):921\u2013930","journal-title":"J Emerg Trends Comput Inf Sci"},{"key":"90_CR2","doi-asserted-by":"crossref","unstructured":"Carroll M, Van Der\u00a0Merwe A, Kotze P (2011) Secure cloud computing: benefits, risks and controls. In: 2011 Information security for South Africa. IEEE, pp 1\u20139","DOI":"10.1109\/ISSA.2011.6027519"},{"issue":"6","key":"90_CR3","first-page":"1","volume":"4","author":"S Ghule","year":"2014","unstructured":"Ghule S, Chikhale R, Parmar K (2014) Cloud computing in banking services. Int J Sci Res Publ 4(6):1\u20138","journal-title":"Int J Sci Res Publ"},{"key":"90_CR4","unstructured":"John\u00a0Sherwood ACDL (2016) Enterprise security architecture-sabsa white paper 2009"},{"key":"90_CR5","doi-asserted-by":"crossref","unstructured":"Laszewski T, Nauduri P (2011) Migrating to cloud: oracle client\/server modernization. Elsevier","DOI":"10.1016\/B978-1-59749-647-6.00001-6"},{"key":"90_CR6","doi-asserted-by":"crossref","unstructured":"Mell P, Grance T et\u00a0al (2011) The nist definition of cloud computing","DOI":"10.6028\/NIST.SP.800-145"},{"key":"90_CR7","doi-asserted-by":"crossref","unstructured":"Pal DG, Krishna R, Srivastava P, Kumar S, Bag M, Singh V (2012) A novel open security framework for cloud computing. Int J Cloud Comput Serv Sci (IJ-CLOSER) 1(2):45\u201352","DOI":"10.11591\/closer.v1i2.371"},{"key":"90_CR8","unstructured":"Peterson RMJAFGALDMG, Rothman M (2017) The security guidance for critical areas of focus in cloud computing v4.0 (\u201cGuidance v4.0\u201d). Cloud Security Alliance"},{"key":"90_CR9","doi-asserted-by":"crossref","unstructured":"Ramkhelawan S, Gobin-Rahimbux B, Cadersaib Z (2016) Pci-dss requirements in the mauritian hospitality industry. In: 2016 IEEE international conference on emerging technologies and innovative business practices for the transformation of societies (EmergiTech). IEEE, pp 199\u2013205","DOI":"10.1109\/EmergiTech.2016.7737338"},{"key":"90_CR10","unstructured":"Rountree D, Castrillo I (2013) The basics of cloud computing \u201cunderstanding the fundamentals of cloud computing in theory and practice.\u201d Elsevier Science"},{"issue":"1","key":"90_CR11","first-page":"32","volume":"1","author":"M Sudha","year":"2012","unstructured":"Sudha M, Monica M (2012) Enhanced security framework to ensure data security in cloud computing using cryptography. Adv Comput Sci Appl 1(1):32\u201337","journal-title":"Adv Comput Sci Appl"},{"key":"90_CR12","doi-asserted-by":"crossref","unstructured":"Takabi H, Joshi JB, Ahn GJ (2010) Securecloud: towards a comprehensive security framework for cloud computing environments. In: 2010 IEEE 34th annual computer software and applications conference workshops. IEEE, pp 393\u2013398","DOI":"10.1109\/COMPSACW.2010.74"},{"key":"90_CR13","unstructured":"Temenos: Temenos Enterprise Frameworks Architecture Unveiled (2012). Accessed 18 Dec 2020. https:\/\/www.temenos.com\/us\/news\/2012\/05\/23\/temenos-enterprise-frameworks-architecture-unveiled\/"},{"issue":"5","key":"90_CR14","first-page":"11","volume":"5","author":"A Ukil","year":"2013","unstructured":"Ukil A, Jana D, De Sarkar A (2013) A security framework in cloud computing infrastructure. Int J Netw Secur Appl 5(5):11","journal-title":"Int J Netw Secur Appl"}],"container-title":["Lecture Notes in Networks and Systems","Proceedings of Sixth International Congress on Information and Communication Technology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-16-2380-6_90","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,9,16]],"date-time":"2021-09-16T09:33:55Z","timestamp":1631784835000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-16-2380-6_90"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,9,17]]},"ISBN":["9789811623790","9789811623806"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-981-16-2380-6_90","relation":{},"ISSN":["2367-3370","2367-3389"],"issn-type":[{"type":"print","value":"2367-3370"},{"type":"electronic","value":"2367-3389"}],"subject":[],"published":{"date-parts":[[2021,9,17]]},"assertion":[{"value":"17 September 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}