{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,29]],"date-time":"2025-10-29T03:40:41Z","timestamp":1761709241969},"reference-count":20,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,8]]},"DOI":"10.1109\/apcc.2016.7581477","type":"proceedings-article","created":{"date-parts":[[2016,10,6]],"date-time":"2016-10-06T22:01:22Z","timestamp":1475791282000},"page":"204-209","source":"Crossref","is-referenced-by-count":5,"title":["Deployment models: Enhancing security in cloud computing environment"],"prefix":"10.1109","author":[{"given":"Hajar","family":"Ziglari","sequence":"first","affiliation":[]},{"given":"Saadiah","family":"Yahya","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-22606-9_21"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/CLOUD.2010.23"},{"key":"ref12","article-title":"Survey on security concerns in cloud computing","author":"madhubala","year":"0","journal-title":"2015 International Conference on Green Computing and Internet of Things (ICGCIoT) ICGCIoT"},{"key":"ref13","article-title":"Cloud Computing Security Issues and its Solutions: A Review","author":"kaur","year":"2015","journal-title":"IEEE 2nd International Conference on Computing for Sustainable Global Development"},{"key":"ref14","article-title":"Above the clouds: A Berkeley view of cloud computing","author":"armbrust","year":"2009","journal-title":"Technical Report UCB\/EECS-2009&#x2013;28 EECS Department"},{"key":"ref15","article-title":"Security and privacy issues in cloud computing","author":"sen","year":"2013","journal-title":"Architectures and Protocols for Secure Information Technology Infrastructures"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/KBEI.2015.7436196"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-10665-1_10"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-10665-1_11"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-10665-1_15"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/1655008.1655020"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/1556154.1556175"},{"key":"ref6","article-title":"Assessing the Security Risks of Cloud Computing","author":"heiser","year":"2008","journal-title":"Gartner"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/HPCS.2010.5547137"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1147\/sj.403.0666"},{"article-title":"Cloud Security: A Comprehensive Guide to Secure Cloud Computing","year":"2010","author":"krutz","key":"ref7"},{"key":"ref2","article-title":"The Future of Cloud Computing Opportunities for European Cloud Computing Beyond 2010","author":"jeffery","year":"0","journal-title":"European Commission Information Society and Media"},{"article-title":"Enhancing Information Security in Cloud Computing Services using SLA Based Metrics","year":"2011","author":"putri","key":"ref1"},{"key":"ref9","article-title":"Cloud Computing Implementation, Management and Security","author":"rittinghouse","year":"2010","journal-title":"Taylor & Francis Group LLC"},{"article-title":"Domain Based Security: enabling security at the level of applications and business processes","year":"2002","author":"hughes","key":"ref20"}],"event":{"name":"2016 22nd Asia-Pacific Conference on Communications (APCC)","start":{"date-parts":[[2016,8,25]]},"location":"Yogyakarta, Indonesia","end":{"date-parts":[[2016,8,27]]}},"container-title":["2016 22nd Asia-Pacific Conference on Communications (APCC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7579293\/7581416\/07581477.pdf?arnumber=7581477","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2016,11,2]],"date-time":"2016-11-02T07:13:25Z","timestamp":1478070805000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7581477\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,8]]},"references-count":20,"URL":"https:\/\/doi.org\/10.1109\/apcc.2016.7581477","relation":{},"subject":[],"published":{"date-parts":[[2016,8]]}}}