{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,7,8]],"date-time":"2024-07-08T11:20:30Z","timestamp":1720437630737},"reference-count":23,"publisher":"Informa UK Limited","issue":"4-6","content-domain":{"domain":["www.tandfonline.com"],"crossmark-restriction":true},"short-container-title":["Information Security Journal: A Global Perspective"],"published-print":{"date-parts":[[2015,12,31]]},"DOI":"10.1080\/19393555.2015.1078424","type":"journal-article","created":{"date-parts":[[2015,8,25]],"date-time":"2015-08-25T19:01:28Z","timestamp":1440529288000},"page":"146-156","update-policy":"http:\/\/dx.doi.org\/10.1080\/tandf_crossmark_01","source":"Crossref","is-referenced-by-count":2,"title":["An Authentication and Authorization Solution for a Multiplatform Cloud Environment"],"prefix":"10.1080","volume":"24","author":[{"given":"Primo\u017e","family":"Cigoj","sequence":"first","affiliation":[]},{"given":"Borka Jerman","family":"Bla\u017ei\u010d","sequence":"additional","affiliation":[]}],"member":"301","published-online":{"date-parts":[[2015,8,25]]},"reference":[{"key":"CIT0001","doi-asserted-by":"publisher","DOI":"10.1016\/j.istr.2011.08.006"},{"key":"CIT0002","first-page":"244","volume-title":"Paper presented at 2013 8th International Conference for Internet Technology and Secured Transactions (ICITST)","author":"Abdo J. B.","year":"2013"},{"issue":"1","key":"CIT0005","first-page":"21","volume":"3","author":"Andronache I.","year":"2011","journal-title":"Journal of Mobile, Embedded and Distributed Systems"},{"key":"CIT0006","doi-asserted-by":"crossref","unstructured":"Behl, A. (2011, December).Emerging security challenges in cloud computing: An insight to cloud security challenges and their mitigation. 2011 World Congress on Information and Communication Technologies (WICT), Mumbai, India, pp. 217\u2013222.","DOI":"10.1109\/WICT.2011.6141247"},{"key":"CIT0007","volume-title":"Cloud Security Alliance","author":"Brunette G.","year":"2009"},{"key":"CIT0008","volume-title":"Assertions and protocols for the oasis security assertion markup language (SAML) V2.0 (OASIS Standard, March 2005)","author":"Cantor S.","year":"2005"},{"key":"CIT0010","doi-asserted-by":"publisher","DOI":"10.1145\/1655008.1655020"},{"key":"CIT0011","volume-title":"Cloud computing security and identity management in the OpenStack platform. (Doctoral dissertation)","author":"Cigoj P.","year":"2014"},{"key":"CIT0014","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCA.2012.6179130"},{"key":"CIT0016","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-013-0208-7"},{"key":"CIT0017","doi-asserted-by":"publisher","DOI":"10.1145\/501978.501980"},{"key":"CIT0019","doi-asserted-by":"publisher","DOI":"10.1186\/2192-113X-1-1"},{"key":"CIT0020","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2012.162"},{"key":"CIT0022","doi-asserted-by":"publisher","DOI":"10.1002\/spe.2168"},{"key":"CIT0023","doi-asserted-by":"publisher","DOI":"10.1016\/S1361-3723(09)70141-1"},{"key":"CIT0024","doi-asserted-by":"publisher","DOI":"10.6028\/NIST.SP.800-144"},{"key":"CIT0025","unstructured":"J\u00f8sang, A., Zomai, M. A. & Suriadi, S. (2007, January). Usability and privacy in identity management architectures. Proceedings of the Fifth Australasian Symposium on ACSW Frontiers, Volume 68, Ballarat, Victoria, Australia, pp. 143\u2013152. Australian Computer Society, Inc."},{"key":"CIT0026","volume-title":"Surveillance costs: The NSA\u2019s impact on the economy, internet freedom & cybersecurity","author":"Kehl D.","year":"2014"},{"key":"CIT0027","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-28959-0_11"},{"key":"CIT0031","volume-title":"A requirements analysis for IaaS cloud federation","author":"Panarello A.","year":"2014"},{"key":"CIT0032","doi-asserted-by":"publisher","DOI":"10.1145\/2620784"},{"key":"CIT0033","doi-asserted-by":"publisher","DOI":"10.1109\/ICSPCC.2011.6061557"},{"key":"CIT0034","doi-asserted-by":"crossref","unstructured":"Zhou, M., Zhang, R., Xie, W., Qian, W. & Zhou, A. (2010, November). Security and privacy in cloud computing: A survey. 2010 Sixth International Conference on Semantics Knowledge and Grid (SKG), Beijing, China, pp. 105\u2013112.","DOI":"10.1109\/SKG.2010.19"}],"container-title":["Information Security Journal: A Global Perspective"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.tandfonline.com\/doi\/pdf\/10.1080\/19393555.2015.1078424","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,23]],"date-time":"2017-06-23T18:17:14Z","timestamp":1498241834000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.tandfonline.com\/doi\/full\/10.1080\/19393555.2015.1078424"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,8,25]]},"references-count":23,"journal-issue":{"issue":"4-6","published-online":{"date-parts":[[2015,9]]},"published-print":{"date-parts":[[2015,12,31]]}},"alternative-id":["10.1080\/19393555.2015.1078424"],"URL":"https:\/\/doi.org\/10.1080\/19393555.2015.1078424","relation":{},"ISSN":["1939-3555","1939-3547"],"issn-type":[{"value":"1939-3555","type":"print"},{"value":"1939-3547","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015,8,25]]},"assertion":[{"value":"The publishing and review policy for this title is described in its Aims & Scope.","order":1,"name":"peerreview_statement","label":"Peer Review Statement"},{"value":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=uiss20","URL":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=uiss20","order":2,"name":"aims_and_scope_url","label":"Aim & Scope"}]}}