{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,19]],"date-time":"2026-02-19T02:19:22Z","timestamp":1771467562031,"version":"3.50.1"},"reference-count":14,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,8]]},"DOI":"10.1109\/icacci.2013.6637181","type":"proceedings-article","created":{"date-parts":[[2013,10,29]],"date-time":"2013-10-29T19:21:09Z","timestamp":1383074469000},"page":"261-265","source":"Crossref","is-referenced-by-count":18,"title":["Using location based encryption to improve the security of data access in cloud computing"],"prefix":"10.1109","author":[{"given":"Meer Soheil","family":"Abolghasemi","sequence":"first","affiliation":[]},{"given":"Mahdi Mokarrami","family":"Sefidab","sequence":"additional","affiliation":[]},{"given":"Reza Ebrahimi","family":"Atani","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"13","article-title":"Security analysis of geoencryption: A case study using loran","author":"qiu","year":"2007","journal-title":"Proceeding of ION GNSS"},{"key":"14","article-title":"Geoencryption using loran","author":"qiu","year":"2007","journal-title":"Proceeding of ION NTM"},{"key":"11","first-page":"391","article-title":"Advances in cryptology","author":"chandran","year":"2009","journal-title":"CRYPTO 2009 Lecture Notes in Computer Science Volume 5677"},{"key":"12","first-page":"288","article-title":"Location based encryption &its role in digital cinema distribution","author":"scott","year":"2003","journal-title":"Proceedings of ION GPS\/GNSS"},{"key":"3","article-title":"Cloud computing and soa convergence in your enterprise","author":"linthicum","year":"2010","journal-title":"Pearson"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1145\/1327512.1327513"},{"key":"1","author":"sosinsky","year":"2011","journal-title":"Cloud Computing Bible"},{"key":"10","author":"krutz","year":"2010","journal-title":"Vines Cloud Security A Comprehensive Guide to Secure Cloud Computing"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/TSSA.2012.6366028"},{"key":"6","article-title":"Cloud computing: Changing cogitation about computing","author":"boroujerdi","year":"2009","journal-title":"World Academy of Science Engineering and Technology"},{"key":"5","article-title":"Marketoriented cloud computing: Vision, hype, and reality for delivering it services as computing utilities","author":"buyya","year":"2008","journal-title":"Proceedings of the 10th IEEE International Conference on High Performance Computing and Communications (HPCC-08"},{"key":"4","author":"choubey","year":"2011","journal-title":"International Journal on Computer Science and Engineering (IJCSE"},{"key":"9","article-title":"Guidelines on security and privacy in public cloud computing","author":"jansen","year":"2011","journal-title":"Computer Security Division Information Technology Laboratory National Institute of Standards and Technology Gaithersburg"},{"key":"8","article-title":"Security and privacy issues in cloud computing","author":"hooks","year":"2011","journal-title":"Proceedings of the 44th Hawaii International Conference on System Sciences"}],"event":{"name":"2013 International Conference on Advances in Computing, Communications and Informatics (ICACCI)","location":"Mysore","start":{"date-parts":[[2013,8,22]]},"end":{"date-parts":[[2013,8,25]]}},"container-title":["2013 International Conference on Advances in Computing, Communications and Informatics (ICACCI)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6621059\/6637135\/06637181.pdf?arnumber=6637181","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,22]],"date-time":"2017-03-22T22:40:43Z","timestamp":1490222443000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6637181\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,8]]},"references-count":14,"URL":"https:\/\/doi.org\/10.1109\/icacci.2013.6637181","relation":{},"subject":[],"published":{"date-parts":[[2013,8]]}}}