{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T10:03:50Z","timestamp":1729677830627,"version":"3.28.0"},"reference-count":31,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,5]]},"DOI":"10.1109\/fmec.2017.7946401","type":"proceedings-article","created":{"date-parts":[[2017,6,15]],"date-time":"2017-06-15T18:36:04Z","timestamp":1497551764000},"page":"14-19","source":"Crossref","is-referenced-by-count":1,"title":["Towards data privacy in heterogeneous cloud environments: An extension to the SANTA policy language"],"prefix":"10.1109","author":[{"given":"Nasser","family":"Abwnawar","sequence":"first","affiliation":[]},{"given":"Helge","family":"Janicke","sequence":"additional","affiliation":[]},{"given":"Richard","family":"Smith","sequence":"additional","affiliation":[]},{"given":"Aboubaker","family":"Lasebae","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/MPRV.2003.1186726"},{"key":"ref30","first-page":"307","article-title":"Some Very Compositional Temporal Properties","author":"moszkowski","year":"1994","journal-title":"Proceedings of the IFIP Working Conference on Programming Concepts Methods and Calculi"},{"key":"ref10","doi-asserted-by":"crossref","first-page":"345","DOI":"10.1016\/j.jnca.2013.09.009","article-title":"Rich Mobile Applications: Genesis, taxonomy, and open issues","volume":"40","author":"abolfazli","year":"2014","journal-title":"J Netw Comput Appl"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1093\/comjnl\/bxs102"},{"key":"ref12","first-page":"161","author":"janicke","year":"0","journal-title":"Deriving enforcement mechanisms from policies"},{"key":"ref13","first-page":"173","author":"janicke","year":"0","journal-title":"A Compositional Event & Time-Based Policy Model"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/1035429.1035433"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/MPRV.2009.82"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2015.7120041"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/978-94-007-1137-2"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1049\/ip-vis:20041147"},{"key":"ref19","article-title":"A complete guide to the common vulnerability scoring system version 2.0","author":"mell","year":"2007","journal-title":"FIRST (Forum of Incident Response and Security Teams)"},{"key":"ref28","first-page":"371","article-title":"Reasoning in interval temporal logic","author":"moszkowski","year":"1983","journal-title":"Logics of Programs"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.3724\/SP.J.1001.2011.03958"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1093\/logcom\/4.5.531"},{"key":"ref3","first-page":"647","volume":"1","author":"chen","year":"0","journal-title":"Cloud Computing Data Security and Privacy Protection"},{"key":"ref6","article-title":"Cloud computing security issues and challenges","volume":"3","author":"so","year":"2011","journal-title":"Int J Comput Netw"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.21236\/ADA324174"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2016.05.010"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2013.062613.00160"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1002\/wcm.1203"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/2.485845"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2013.050113.00090"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/MSECP.2003.1176998"},{"key":"ref20","article-title":"Information systems security: A comprehensive model","author":"mccumber","year":"1991","journal-title":"Proceedings of the 14th National Computer Security Conference"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/341852.341877"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2013.04.004"},{"key":"ref24","doi-asserted-by":"crossref","first-page":"195","DOI":"10.1109\/JPROC.2011.2161428","article-title":"Cyber-physical security of a smart grid infrastructure","volume":"100","author":"mo","year":"2012","journal-title":"Proc IEEE"},{"journal-title":"Cloud Security A Comprehensive Guide to Secure Cloud Computing","year":"2010","author":"krutz","key":"ref23"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/35.312842"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2010.12.006"}],"event":{"name":"2017 Second International Conference on Fog and Mobile Edge Computing (FMEC)","start":{"date-parts":[[2017,5,8]]},"location":"Valencia, Spain","end":{"date-parts":[[2017,5,11]]}},"container-title":["2017 Second International Conference on Fog and Mobile Edge Computing (FMEC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7939243\/7946388\/07946401.pdf?arnumber=7946401","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,26]],"date-time":"2019-09-26T00:30:48Z","timestamp":1569457848000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7946401\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,5]]},"references-count":31,"URL":"https:\/\/doi.org\/10.1109\/fmec.2017.7946401","relation":{},"subject":[],"published":{"date-parts":[[2017,5]]}}}