{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,29]],"date-time":"2025-09-29T07:47:09Z","timestamp":1759132029201,"version":"3.28.0"},"reference-count":56,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012,12]]},"DOI":"10.1109\/cloudcom.2012.6427547","type":"proceedings-article","created":{"date-parts":[[2013,2,8]],"date-time":"2013-02-08T17:05:06Z","timestamp":1360343106000},"page":"113-120","source":"Crossref","is-referenced-by-count":22,"title":["Thunder in the Clouds: Security challenges and solutions for federated Clouds"],"prefix":"10.1109","author":[{"given":"Karin","family":"Bernsmed","sequence":"first","affiliation":[]},{"given":"Martin Gilje","family":"Jaatun","sequence":"additional","affiliation":[]},{"given":"Per Hakon","family":"Meland","sequence":"additional","affiliation":[]},{"given":"Astrid","family":"Undheim","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"35","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-36584-8_10"},{"key":"36","article-title":"Service and protection level agreements for business processes","author":"frankova","year":"2007","journal-title":"Young Researchers Workshop on Service"},{"key":"33","doi-asserted-by":"publisher","DOI":"10.1145\/1807128.1807165"},{"key":"34","doi-asserted-by":"crossref","first-page":"54","DOI":"10.1145\/335169.335194","article-title":"Security service level agreements: Quantifiable security for the enterprise?","volume":"99","author":"henning","year":"2000","journal-title":"Proceedings of the 1999 workshop on New security paradigms - NSPW '99"},{"key":"39","article-title":"Security in service level agreements for cloud computing","author":"bernsmed","year":"2011","journal-title":"Proceedings of the 1st International Conference on Cloud Computing and Services Science (CLOSER)"},{"key":"37","doi-asserted-by":"publisher","DOI":"10.1109\/ICNS.2010.36"},{"key":"38","article-title":"Sec-mon: An architecture for monitoring and controlling security service level agreements","author":"righi","year":"2006","journal-title":"XI Workshop on Managing and Operating Networks and Services"},{"key":"43","article-title":"Service level agreement in cloud computing","author":"patel","year":"2009","journal-title":"Proceedings of OOPSLA (2009)"},{"journal-title":"Web Service Level Agreement (WSLA) Language Specification","year":"2003","author":"ludwig","key":"42"},{"journal-title":"Web Services Agreement Specification (WS-Agreement)","year":"2007","key":"41"},{"key":"40","doi-asserted-by":"publisher","DOI":"10.1016\/S1389-1286(00)00149-3"},{"key":"22","doi-asserted-by":"crossref","first-page":"11","DOI":"10.1145\/62212.62214","article-title":"Multiparty unconditionally secure protocols","author":"chaum","year":"1988","journal-title":"Proceedings of the twentieth annual ACM symposium on Theory of computing"},{"key":"23","first-page":"2008","article-title":"Sharemind: A framework for fast privacy-preserving computations","volume":"289","author":"bogdanov","year":"0","journal-title":"Cryptology EPrint Archive Report 2008"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1145\/1536414.1536440"},{"key":"25","doi-asserted-by":"crossref","first-page":"420","DOI":"10.1007\/978-3-642-13013-7_25","article-title":"Fully homomorphic encryption with relatively small key and ciphertext sizes","author":"smart","year":"2010","journal-title":"Public Key Cryptography - PKC 2010"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-010-0425-z"},{"key":"27","doi-asserted-by":"publisher","DOI":"10.1109\/WIRELESSVITAE.2011.5940844"},{"key":"28","doi-asserted-by":"publisher","DOI":"10.1186\/2192-113X-1-13"},{"key":"29","first-page":"21","article-title":"Tor: The secondgeneration onion router","volume":"13","author":"dingledine","year":"2004","journal-title":"Proceedings of the 13th conference on USENIX Security Symposium"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1147\/JRD.2009.5429058"},{"journal-title":"Research Report Cloud Trends","year":"2011","author":"subramanian","key":"2"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.1659"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/DASC.2011.25"},{"key":"30","doi-asserted-by":"publisher","DOI":"10.1007\/BF00206326"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/ITI.2008.4588381"},{"journal-title":"The Future of Cloud Computing Opportunities for European Cloud Computing beyond","year":"2010","author":"network","key":"5"},{"key":"32","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653686"},{"journal-title":"Demystifying the Cloud","year":"0","author":"salmon","key":"4"},{"key":"31","doi-asserted-by":"publisher","DOI":"10.1145\/358549.358563"},{"journal-title":"Cloud Security Survey Global Executive Summary","year":"2011","key":"9"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/ARES.2011.34"},{"key":"56","article-title":"Expressing cloud security requirements in deontic contract languages","author":"meland","year":"2012","journal-title":"Proceedings of the 1st International Conference on Cloud Computing and Services Science (CLOSER)"},{"key":"19","article-title":"Towards trusted cloud computing","author":"santos","year":"2009","journal-title":"HotCloud"},{"key":"55","article-title":"The truth about microsoft azure-and where your data will be kept","author":"honeyball","year":"2009","journal-title":"PC PRO"},{"journal-title":"Trusted Computing Group-home","year":"2011","key":"17"},{"key":"18","article-title":"Vtpm: Virtualizing the trusted platform module","volume":"15","author":"berger","year":"2006","journal-title":"Proceedings of the 15th conference on USENIX Security Symposium"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1145\/1496091.1496100"},{"journal-title":"Who Is Carrying the Can for Cloud Data Security?","year":"2011","author":"doyle","key":"16"},{"journal-title":"Security Guidance for Critical Areas of Focus in Cloud Computing","year":"2010","key":"13"},{"key":"14","article-title":"Cloud computing: Emerging legal issues for access to data, anywhere, anytime","author":"m","year":"2010","journal-title":"Journal of Internet Law"},{"journal-title":"Guidelines on Security and Privacy in Public Cloud Computing","year":"2011","author":"jansen","key":"11"},{"journal-title":"Cloud Computing Benefits Risks and Recommendations for Information Security","year":"2009","key":"12"},{"journal-title":"Applied Cryptography","year":"1996","author":"schneier","key":"21"},{"key":"20","first-page":"5","article-title":"Private virtual infrastructure for cloud computing","volume":"9","author":"krautheim","year":"2009","journal-title":"Proceedings of the 2009 Conference on Hot Topics in Cloud Computing Ser HotCloud"},{"journal-title":"Reservoir Resources and Services Virtualization without Barriers","year":"0","key":"49"},{"journal-title":"Optimis Project","year":"0","key":"48"},{"key":"45","first-page":"289","article-title":"A reference architecture for multi-Level SLA management","volume":"4","author":"theilmann","year":"2010","journal-title":"Journal of Internet Engineering"},{"key":"44","first-page":"187","article-title":"A framework for multi-level sla management","author":"comuzzi","year":"2009","journal-title":"Proceedings of the 2009 International Conference on Service-oriented Computing Ser ICSOC\/ServiceWave'09"},{"journal-title":"The TClouds Project","year":"0","key":"47"},{"journal-title":"Aniketos Ensuring Trustworthiness and Security in Service Composition","year":"2011","key":"46"},{"journal-title":"What's New about Cloud Computing Security?","year":"2010","author":"chen","key":"10"},{"key":"51","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSAC.2008.18"},{"key":"52","doi-asserted-by":"publisher","DOI":"10.1109\/POLICY.2007.50"},{"key":"53","doi-asserted-by":"publisher","DOI":"10.1007\/s13174-010-0007-6"},{"key":"54","doi-asserted-by":"publisher","DOI":"10.1109\/HPCC.2008.172"},{"journal-title":"VISION Cloud","year":"0","key":"50"}],"event":{"name":"2012 IEEE 4th International Conference on Cloud Computing Technology and Science (CloudCom)","start":{"date-parts":[[2012,12,3]]},"location":"Taipei, Taiwan","end":{"date-parts":[[2012,12,6]]}},"container-title":["4th IEEE International Conference on Cloud Computing Technology and Science Proceedings"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6415464\/6427477\/06427547.pdf?arnumber=6427547","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,21]],"date-time":"2017-06-21T03:13:46Z","timestamp":1498014826000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6427547\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,12]]},"references-count":56,"URL":"https:\/\/doi.org\/10.1109\/cloudcom.2012.6427547","relation":{},"subject":[],"published":{"date-parts":[[2012,12]]}}}