{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,6]],"date-time":"2025-12-06T04:55:24Z","timestamp":1764996924392},"reference-count":26,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011,6]]},"DOI":"10.1109\/dsnw.2011.5958795","type":"proceedings-article","created":{"date-parts":[[2011,7,27]],"date-time":"2011-07-27T13:42:08Z","timestamp":1311774128000},"page":"111-116","source":"Crossref","is-referenced-by-count":20,"title":["The case for dynamic security solutions in public cloud workflow deployments"],"prefix":"10.1109","author":[{"given":"John C.","family":"Mace","sequence":"first","affiliation":[]},{"given":"Aad","family":"van Moorsel","sequence":"additional","affiliation":[]},{"given":"Paul","family":"Watson","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","first-page":"1","author":"linthicum","year":"2009","journal-title":"Cloud Computing and SOA Convergence in Your Enterprise A Step-by-step Guide"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2010.03.009"},{"journal-title":"A business guide to information security How to protect your company's IT assets reduce risks and understand the law","year":"2005","author":"calder","key":"ref12"},{"key":"ref13","article-title":"Information Security in the Cloud","author":"small","year":"0","journal-title":"BCS IRMA Presentation Topic"},{"key":"ref14","first-page":"9","article-title":"Multilevel Security and Information Flow in Petri Net Workflows","author":"knorr","year":"2001","journal-title":"Proceedings of ICT"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/CRISIS.2008.4757466"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.mcm.2010.03.037"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-74800-7_11"},{"key":"ref18","article-title":"Optimizing a Policy, Authoring Framework for Secunty and Privacy Policies","author":"johnson","year":"2010","journal-title":"Proc SOUPS"},{"journal-title":"Arjuna Technologies Ltd","article-title":"Arjuna Agility: Removing the Barriers to Business Azilitv","year":"2010","key":"ref19"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/1721654.1721672"},{"journal-title":"Ponemon Institute and Symantec","article-title":"Flying Blind in the Cloud: The State of Information Governance","year":"0","key":"ref3"},{"journal-title":"Cloud Security and Privacy An Enterprise Perspective on Risks and Compliance","year":"2009","author":"mather","key":"ref6"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ISSA.2010.5588290"},{"journal-title":"IEEE","article-title":"Survey by IEEE and Cloud Security Alliance details importance and urgency of cloud computing security standards","year":"0","key":"ref8"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2007.51"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2010.136"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2010.186"},{"journal-title":"Ponemon Institute and CA","article-title":"Security of Cloud Computing Users: A Study of Practitioners in the US & Europe","year":"2010","key":"ref1"},{"key":"ref20","article-title":"Automatic Software Deployment in the Azure Cloud","author":"cala","year":"2010","journal-title":"Technical report School of Computing Science Newcastle University"},{"key":"ref22","first-page":"2175","article-title":"Composable Cost Estimation and Monitoring for Computational Applications in Cloud Computing Environments","author":"truong","year":"2010","journal-title":"Proc ICCS"},{"key":"ref21","first-page":"58","article-title":"Deploying Security Policy In Intra and Inter Workflow Management Svstems","author":"ayed","year":"2009","journal-title":"Proc AReS_"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-12814-1_18"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/BDIM.2007.375015"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-45227-0_79"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2010.12.006"}],"event":{"name":"2011 IEEE\/IFIP 41st International Conference on Dependable Systems and Networks Workshops (DSN-W)","start":{"date-parts":[[2011,6,27]]},"location":"Hong Kong","end":{"date-parts":[[2011,6,30]]}},"container-title":["2011 IEEE\/IFIP 41st International Conference on Dependable Systems and Networks Workshops (DSN-W)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5949578\/5958780\/05958795.pdf?arnumber=5958795","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,2,5]],"date-time":"2020-02-05T20:54:27Z","timestamp":1580936067000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/5958795\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,6]]},"references-count":26,"URL":"https:\/\/doi.org\/10.1109\/dsnw.2011.5958795","relation":{},"subject":[],"published":{"date-parts":[[2011,6]]}}}