{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T09:23:21Z","timestamp":1730193801655,"version":"3.28.0"},"reference-count":15,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,9,15]],"date-time":"2021-09-15T00:00:00Z","timestamp":1631664000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,9,15]],"date-time":"2021-09-15T00:00:00Z","timestamp":1631664000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,9,15]],"date-time":"2021-09-15T00:00:00Z","timestamp":1631664000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,9,15]]},"DOI":"10.1109\/acit52158.2021.9548384","type":"proceedings-article","created":{"date-parts":[[2021,10,1]],"date-time":"2021-10-01T23:29:27Z","timestamp":1633130967000},"page":"504-509","source":"Crossref","is-referenced-by-count":0,"title":["Mechanisms for Encrypting Big Unstructured Data: Technical and Legal Aspects"],"prefix":"10.1109","author":[{"given":"Mariia","family":"Pleskach","sequence":"first","affiliation":[]},{"given":"Viktor","family":"Krasnoshchok","sequence":"additional","affiliation":[]},{"given":"Olena","family":"Orliuk","sequence":"additional","affiliation":[]},{"given":"Valentyna","family":"Pleskach","sequence":"additional","affiliation":[]},{"given":"Yaroslav","family":"Melnyk","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","article-title":"Cloud computing security problems","author":"berdnyk","year":"0","journal-title":"Analysis of cloud security alliance cloud protection methods"},{"year":"0","key":"ref11"},{"journal-title":"Explanation on personal databases","year":"0","key":"ref12"},{"year":"0","key":"ref13"},{"year":"0","key":"ref14"},{"key":"ref15","first-page":"312","author":"banker","year":"2011","journal-title":"MongoDB in Action"},{"journal-title":"Storage Solutions for Big Data Systems A QualitativeStudyand Comparison","year":"0","author":"khan","key":"ref4"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-37437-1_3"},{"journal-title":"Myrovoi obem dannyh prevysyt 17 zettabait","year":"2019","key":"ref6"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1186\/s13635-016-0040-5"},{"year":"0","key":"ref8"},{"year":"0","key":"ref7"},{"key":"ref2","first-page":"117","article-title":"Conflict and Coordination Between Data Disclosure and Intellectual Property Protection in the Era of Big Data","volume":"7","author":"zhenzhen","year":"2019","journal-title":"Forum on Science and Technology in China"},{"key":"ref1","first-page":"12124","volume":"1437","year":"2020","journal-title":"Big Data and Applied Statistics"},{"journal-title":"Cloud computing security problems","year":"0","author":"kodolov","key":"ref9"}],"event":{"name":"2021 11th International Conference on Advanced Computer Information Technologies (ACIT)","start":{"date-parts":[[2021,9,15]]},"location":"Deggendorf, Germany","end":{"date-parts":[[2021,9,17]]}},"container-title":["2021 11th International Conference on Advanced Computer Information Technologies (ACIT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9548321\/9548113\/09548384.pdf?arnumber=9548384","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T11:46:34Z","timestamp":1652183194000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9548384\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,9,15]]},"references-count":15,"URL":"https:\/\/doi.org\/10.1109\/acit52158.2021.9548384","relation":{},"subject":[],"published":{"date-parts":[[2021,9,15]]}}}