{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T14:03:33Z","timestamp":1730210613444,"version":"3.28.0"},"reference-count":22,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,9]]},"DOI":"10.1109\/cscesm.2015.7331883","type":"proceedings-article","created":{"date-parts":[[2015,11,23]],"date-time":"2015-11-23T17:44:45Z","timestamp":1448300685000},"page":"143-148","source":"Crossref","is-referenced-by-count":1,"title":["A verification mechanism for cloud brokerage system"],"prefix":"10.1109","author":[{"given":"Johannes Harungguan","family":"Sianipar","sequence":"first","affiliation":[]},{"given":"Christoph","family":"Meinel","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/SCC.2013.92"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/CLOUD.2009.74"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2010.03.009"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/CLOUD.2012.24"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2008.12.001"},{"key":"ref15","first-page":"1035","article-title":"A Survey on Needs and Issues of Cloud Broker for Cloud Environment","volume":"4","author":"geetha","year":"2014","journal-title":"International Journal of Development Research"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1186\/2192-113X-2-9"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/CCGrid.2011.35"},{"journal-title":"CSA STAR (security trust and assurance registry) program","year":"2015","key":"ref18"},{"key":"ref19","first-page":"1","article-title":"Agent-based cloud computing","author":"sim","year":"0","journal-title":"IEEE Transaction on Service Computing"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2015.2445752"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/UCC.2014.153"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/1655925.1656078"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/1879141.1879143"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/1594156.1594168"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/CLOUD.2011.80"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/CLOUD.2012.119"},{"year":"0","key":"ref1"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/CISIS.2012.157"},{"key":"ref20","first-page":"12","article-title":"Security agents: A mobile agent based trust model for cloud computing","volume":"36","author":"hada","year":"2011","journal-title":"International Journal of Computer Applications"},{"year":"0","key":"ref22"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/UCC.2014.35"}],"event":{"name":"2015 Second International Conference on Computer Science, Computer Engineering, and Social Media (CSCESM)","start":{"date-parts":[[2015,9,21]]},"location":"Lodz, Poland","end":{"date-parts":[[2015,9,23]]}},"container-title":["2015 Second International Conference on Computer Science, Computer Engineering, and Social Media (CSCESM)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7322102\/7331817\/07331883.pdf?arnumber=7331883","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,10,14]],"date-time":"2020-10-14T10:52:30Z","timestamp":1602672750000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/7331883"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,9]]},"references-count":22,"URL":"https:\/\/doi.org\/10.1109\/cscesm.2015.7331883","relation":{},"subject":[],"published":{"date-parts":[[2015,9]]}}}