{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,1,24]],"date-time":"2023-01-24T01:09:09Z","timestamp":1674522549078},"reference-count":18,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2011,5,1]],"date-time":"2011-05-01T00:00:00Z","timestamp":1304208000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["DuD"],"published-print":{"date-parts":[[2011,5]]},"DOI":"10.1007\/s11623-011-0081-3","type":"journal-article","created":{"date-parts":[[2011,5,20]],"date-time":"2011-05-20T19:58:31Z","timestamp":1305921511000},"source":"Crossref","is-referenced-by-count":1,"title":["TClouds"],"prefix":"10.1007","volume":"35","author":[{"given":"Ninja","family":"Marnau","sequence":"first","affiliation":[]},{"given":"Norbert","family":"Schirmer","sequence":"additional","affiliation":[]},{"given":"Eva","family":"Schlehahn","sequence":"additional","affiliation":[]},{"given":"Matthias","family":"Schunter","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2011,5,21]]},"reference":[{"key":"81_CR1","unstructured":"Bessani, A., Correia, M., Quaresma, B., Andr\u00e9, F., & Sousa, P. (2011). DepSky: Dependable and Secure Storage in a Cloud-of-Clouds. EuroSys\u201911: The 6th ACM SIGOPS\/EuroSys European Systems Conference. Salzburg."},{"key":"81_CR2","doi-asserted-by":"publisher","first-page":"89","DOI":"10.3233\/JCS-2010-0376","volume":"18","author":"S. Cabuk","year":"2010","unstructured":"Cabuk, S., Dalton, C.I., Eriksson, K., Kuhlmann, D., Ramasamy, H.V., Ramunno, G., Sadeghi, A.R., Schunter, M., St\u00fcble, C. (2010): Towards automated security policy enforcement in multi-tenant virtual data centers. J. Comput. Secur. 18, 89\u2013121.","journal-title":"J. Comput. Secur."},{"issue":"5","key":"81_CR3","doi-asserted-by":"publisher","first-page":"289","DOI":"10.1007\/s11623-010-0089-0","volume":"34","author":"Luigi Catuogno","year":"2010","unstructured":"Catuogno, L., L\u00f6hr, H., Manulis, M., Sadeghi, A.-R., & St\u00fcble, C. (5 2010). Trusted Virtual Domains: Color Your Network. Datenschutz und Datensicherheit (DuD), S. 289\u2013298.","journal-title":"Datenschutz und Datensicherheit - DuD"},{"key":"81_CR4","unstructured":"Chien, E (2010): W32.Stuxnet dossier. From http:\/\/www.symantec.com\/connect\/blogs\/w32stuxnet-dossier , retrieved 2010-13-03"},{"key":"81_CR5","doi-asserted-by":"crossref","unstructured":"Chow, R., Golle, P., Jakobsson, M., Shi, E., Staddon, J., Masuoka, R., Molina, J. (2009): Controlling data in the cloud: outsourcing computation without outsourcing control. In: ACM Workshop on Cloud Computing Security (CCSW\u201909). pp. 85\u201390. ACM Press","DOI":"10.1145\/1655008.1655020"},{"key":"81_CR6","unstructured":"Cloud Security Alliance (2010): Top threats to cloud computing, version 1.0. http:\/\/www.cloudsecurityalliance.org\/topthreats\/csathreats.v1.0.pdf"},{"key":"81_CR7","doi-asserted-by":"crossref","unstructured":"Glott, R\u00fcdiger, E. Husmann, A. Sadeghi, and Matthias Schunter (2011): Trustworthy Clouds underpinning the Future Internet, to appear in Future Internet Assembly \u2014 Book 3, Springer LNCS 6656","DOI":"10.1007\/978-3-642-20898-0_15"},{"key":"81_CR8","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1145\/1866835.1866850","volume-title":"Proceedings of the 2010 ACM workshop on Cloud computing security workshop","author":"B. Grobauer","year":"2010","unstructured":"Grobauer, B., Schreck, T. (2010): Towards incident handling in the cloud: challenges and approaches. In: Proceedings of the 2010 ACM workshop on Cloud computing security workshop. pp. 77\u201386. CCSW\u2019 10, ACM, New York, NY, USA"},{"key":"81_CR9","first-page":"13","volume-title":"Proceed-ings of the 2nd USENIX conference on Hot topics in cloud computing","author":"B.S. Kaliski Jr.","year":"2010","unstructured":"Kaliski, Jr., B.S., Pauley, W. (2010): Toward risk assessment as a service in cloud environments. In: Proceed-ings of the 2nd USENIX conference on Hot topics in cloud computing. pp. 13\u201313. HotCloud\u201910, USENIX Association, Berkeley, CA, USA"},{"key":"81_CR10","unstructured":"Organization for Economic Co-Operation and Development (2009): Guidelines on the protection of privacy and transborder flows of personal data. From http:\/\/www.oecd.org\/document\/18\/0,2340,en_2649_34255_1815186_1_1_1_1,00.html (last modified January 5 1999), the OECD Privacy Principles"},{"key":"81_CR11","unstructured":"Penn, J.: (2010): Security and the cloud: Looking at the opportunity beyond the obstacle. Forrester Research"},{"key":"81_CR12","unstructured":"Rajan, S.S. (2010): Cloudsourcing vs outsourcing. Available online at http:\/\/cloudcomputing.syscon.com\/node\/1611752"},{"key":"81_CR13","doi-asserted-by":"crossref","first-page":"199","DOI":"10.1145\/1653662.1653687","volume-title":"Proceedings of the 16th ACM conference on Computer and communications security","author":"T. Ristenpart","year":"2009","unstructured":"Ristenpart, T., Tromer, E., Shacham, H., Savage, S. (2009): Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds. In: Proceedings of the 16th ACM conference on Computer and communications security. pp. 199\u2013212. CCS\u2019 09, ACM, New York, NY, USA"},{"key":"81_CR14","doi-asserted-by":"publisher","first-page":"417","DOI":"10.1007\/978-3-642-13869-0_30","volume-title":"Proceedings of the 3rd international conference on Trust and trustworthy computing","author":"A.R. Sadeghi","year":"2010","unstructured":"Sadeghi, A.R., Schneider, T., Winandy, M. (2010): Token-based cloud computing: secure outsourcing of data and arbitrary computations with lower latency. In: Proceedings of the 3rd international conference on Trust and trustworthy computing. pp. 417\u2013429. TRUST\u201910, Springer-Verlag, Berlin, Heidelberg"},{"key":"81_CR15","volume-title":"Proceedings of the 2009 conference on Hot topics in cloud computing","author":"N. Santos","year":"2009","unstructured":"Santos, N., Gummadi, K., & Rodrigues, R. (2009). Towards trusted cloud computing. Proceedings of the 2009 conference on Hot topics in cloud computing. Berkeley: USENIX Association."},{"key":"81_CR16","first-page":"3","volume-title":"Proceedings of the 2009 conference on Hot topics in cloud computing","author":"N. Santos","year":"2009","unstructured":"Santos, N., Gummadi, K.P., Rodrigues, R. (2009): Towards trusted cloud computing. In: Proceedings of the 2009 conference on Hot topics in cloud computing. pp. 3\u20133. HotCloud\u201909, USENIX Association, Berkeley, CA, USA"},{"key":"81_CR17","doi-asserted-by":"publisher","first-page":"105","DOI":"10.1145\/1855118.1855137","volume":"41","author":"M. Vukoli\u0107","year":"2010","unstructured":"Vukoli\u0107, M. (2010): The byzantine empire in the intercloud. SIGACT News 41, 105\u2013111","journal-title":"SIGACT News"},{"key":"81_CR18","unstructured":"Weichert, T. (2009): Cloud Computing und Datenschutz. Available online at http:\/\/www.datenschutzzentrum.de\/cloud-computing\/"}],"container-title":["Datenschutz und Datensicherheit - DuD"],"original-title":[],"language":"de","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-011-0081-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11623-011-0081-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-011-0081-3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-011-0081-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,11,23]],"date-time":"2021-11-23T21:16:44Z","timestamp":1637702204000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11623-011-0081-3"}},"subtitle":["Herausforderungen und erste Schritte zur sicheren und datenschutzkonformen Cloud"],"short-title":[],"issued":{"date-parts":[[2011,5]]},"references-count":18,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2011,5]]}},"alternative-id":["81"],"URL":"https:\/\/doi.org\/10.1007\/s11623-011-0081-3","relation":{},"ISSN":["1614-0702","1862-2607"],"issn-type":[{"value":"1614-0702","type":"print"},{"value":"1862-2607","type":"electronic"}],"subject":[],"published":{"date-parts":[[2011,5]]},"article-number":"333"}}