{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,4]],"date-time":"2025-06-04T00:09:18Z","timestamp":1748995758752,"version":"3.28.0"},"reference-count":20,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012,12]]},"DOI":"10.1109\/cloudcom.2012.6427548","type":"proceedings-article","created":{"date-parts":[[2013,2,8]],"date-time":"2013-02-08T17:05:06Z","timestamp":1360343106000},"page":"532-538","source":"Crossref","is-referenced-by-count":21,"title":["Toward a Dynamic Trust Establishment approach for multi-provider Intercloud environment"],"prefix":"10.1109","author":[{"given":"Canh","family":"Ngo","sequence":"first","affiliation":[]},{"given":"Yuri","family":"Demchenko","sequence":"additional","affiliation":[]},{"given":"Cees","family":"de Laat","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"crossref","first-page":"46","DOI":"10.1145\/1102120.1102129","article-title":"Automated trust negotiation using cryptographic credentials","volume":"5","author":"li","year":"2005","journal-title":"Proceedings of the 12th ACM Conference on Computer and Communications Security Ser CCS"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1145\/1266840.1266848"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.1996.502679"},{"key":"15","article-title":"Design of a role-based trust-management framework","volume":"2","author":"li","year":"2002","journal-title":"Proceedings of the 2002 IEEE Symposium on Security and Privacy Ser SP"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-36388-2_6"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/DAC.1990.114826"},{"journal-title":"XACML v3 0 Core Specification","year":"2010","key":"14"},{"journal-title":"Assertions and Protocols for the OASIS Security Assertion Markup Language (SAML) V2 0 OASIS Standard","year":"2005","key":"11"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/43.856979"},{"journal-title":"Geysers-generalised Architecture for Dynamic Infrastructure Services","year":"2010","key":"3"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1145\/1456492.1456499"},{"key":"2","first-page":"174","article-title":"Defining inter-cloud architecture for interoperability and integration","author":"demchenko","year":"2012","journal-title":"Proceedings of the 3rd International Conference on Cloud Computing GRIDs and Virtualization Ser CLOUD COMPUTING 2012"},{"key":"1","first-page":"500","article-title":"NIST-SP 500-291, NIST cloud computing standards roadmap","author":"hogan","year":"2011","journal-title":"NIST Tech Rep NISTIR"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/CloudCom.2011.108"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1145\/283699.283739"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1145\/1380584.1380587"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/CloudCom.2012.6427535"},{"key":"4","doi-asserted-by":"crossref","first-page":"644","DOI":"10.1109\/CloudCom.2010.91","article-title":"Security services lifecycle management in on-demand infrastructure services provisioning","author":"demchenko","year":"2010","journal-title":"Cloud Computing Technology and Science (CloudCom) 2010 IEEE Second International Conference on"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/ISPA.2012.35"},{"key":"8","article-title":"RFC 2904-AAA authorization framework","volume":"2094","author":"vollbrecht","year":"2000","journal-title":"Technical Report RFC"}],"event":{"name":"2012 IEEE 4th International Conference on Cloud Computing Technology and Science (CloudCom)","start":{"date-parts":[[2012,12,3]]},"location":"Taipei, Taiwan","end":{"date-parts":[[2012,12,6]]}},"container-title":["4th IEEE International Conference on Cloud Computing Technology and Science Proceedings"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6415464\/6427477\/06427548.pdf?arnumber=6427548","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,21]],"date-time":"2017-06-21T03:13:56Z","timestamp":1498014836000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6427548\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,12]]},"references-count":20,"URL":"https:\/\/doi.org\/10.1109\/cloudcom.2012.6427548","relation":{},"subject":[],"published":{"date-parts":[[2012,12]]}}}