{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,20]],"date-time":"2025-11-20T18:25:23Z","timestamp":1763663123989,"version":"3.28.0"},"reference-count":28,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,8]]},"DOI":"10.1109\/icacci.2013.6637286","type":"proceedings-article","created":{"date-parts":[[2013,10,29]],"date-time":"2013-10-29T19:21:09Z","timestamp":1383074469000},"page":"847-852","source":"Crossref","is-referenced-by-count":10,"title":["E-government cloud computing proposed model: Egyptian E_Government Cloud Computing"],"prefix":"10.1109","author":[{"given":"Maha Attia","family":"Hana","sequence":"first","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-22577-2_14"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.4018\/jaci.2011010102"},{"key":"18","doi-asserted-by":"crossref","first-page":"180","DOI":"10.1007\/978-3-642-22606-9_21","article-title":"An analysis of security related issues in cloud","volume":"168","author":"babu","year":"2011","journal-title":"Communications in Computer and Information Science"},{"key":"15","first-page":"47","article-title":"Proposed development model of e-government to appropriate cloud computing","volume":"9","author":"nasr","year":"2012","journal-title":"International Journal of Reviews in Computing"},{"key":"16","article-title":"The NIST definition to cloud computing (NIST special publication 800-145). USA: National Institute of Standards and Technology","author":"mell","year":"2011","journal-title":"Computer Security Division Information Technology Laboratory"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.5120\/2603-3629"},{"key":"14","article-title":"A review of cloud computing and e-governance","volume":"2","author":"vats","year":"2012","journal-title":"International Journal of Advanced Research in Computer Science and Software Engineering"},{"key":"11","article-title":"Cloud computing: Legal and privacy issues","author":"kerr","year":"2010","journal-title":"Proceedings of the Academy of Business Disciplines Conference"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijinfomgt.2009.09.004"},{"journal-title":"Cloud Computing in Africa Situation and Perspectives","year":"2012","key":"21"},{"key":"20","doi-asserted-by":"crossref","first-page":"36","DOI":"10.1007\/978-3-642-22577-2_5","article-title":"Security issues in cloud computing","volume":"169","author":"sharma","year":"2011","journal-title":"Communication in Computer and Information Science"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.5120\/1262-1613"},{"key":"23","first-page":"1","article-title":"The cloudy future of government IT: Cloud computing and the public sector around the world","volume":"1","author":"wyld","year":"2010","journal-title":"International Journal of Web &Semantic Technology"},{"key":"24","first-page":"156","article-title":"Prototype cloud computing for e-government in Indonesia","volume":"11","author":"hariguna","year":"2011","journal-title":"International Journal of Engineering &Technology"},{"key":"25","first-page":"89","article-title":"Cloud computing based rural e-governance model","volume":"3","author":"khare","year":"2012","journal-title":"Journal of Information and Operations Management"},{"key":"26","article-title":"E-government: Cloud solutions in labor regulatory area in greece","author":"stefanou","year":"2012","journal-title":"9th International Conference on Enterprise Systems Accounting and Logistics"},{"journal-title":"Community Cloud Governance-An Australian Government Perspective (Better Practice Guide","year":"2012","key":"27"},{"journal-title":"United Nations E-Government Survey 2012 EGovernment for the People","year":"2012","key":"28"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2010.07.006"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-18440-6_21"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1007\/s11623-010-0189-x"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.4018\/jgc.2011010102"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.4018\/jisp.2010040103"},{"key":"6","doi-asserted-by":"crossref","first-page":"214","DOI":"10.1007\/978-3-642-17604-3_24","article-title":"Challenges and security in cloud computing","volume":"120","author":"chang","year":"2010","journal-title":"Communications in Computer and Information Science"},{"key":"5","first-page":"541","article-title":"Secure document service for cloud computing","author":"xu","year":"2009","journal-title":"CloudCom '09 Proceedings of the 1st International Conference on Cloud Computing"},{"key":"4","doi-asserted-by":"crossref","first-page":"445","DOI":"10.1007\/978-3-642-22726-4_46","article-title":"Cloud computing security issues and challenges: A survey","volume":"193","author":"verma","year":"2011","journal-title":"Communications in Computer and Information Science"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.4018\/jeis.2010100104"},{"key":"8","article-title":"Towards analyzing data security risks in cloud computing environments","author":"sangroya","year":"2010","journal-title":"Information Systems"}],"event":{"name":"2013 International Conference on Advances in Computing, Communications and Informatics (ICACCI)","start":{"date-parts":[[2013,8,22]]},"location":"Mysore","end":{"date-parts":[[2013,8,25]]}},"container-title":["2013 International Conference on Advances in Computing, Communications and Informatics (ICACCI)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6621059\/6637135\/06637286.pdf?arnumber=6637286","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,21]],"date-time":"2017-06-21T21:02:01Z","timestamp":1498078921000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6637286\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,8]]},"references-count":28,"URL":"https:\/\/doi.org\/10.1109\/icacci.2013.6637286","relation":{},"subject":[],"published":{"date-parts":[[2013,8]]}}}