{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T22:59:19Z","timestamp":1729637959005,"version":"3.28.0"},"reference-count":30,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,8]]},"DOI":"10.1109\/icacci.2013.6637432","type":"proceedings-article","created":{"date-parts":[[2013,10,29]],"date-time":"2013-10-29T19:21:09Z","timestamp":1383074469000},"page":"1668-1674","source":"Crossref","is-referenced-by-count":2,"title":["Architectural design for iCloudIDM Layer-II (iCloudIDM-LII) Subsystem of eCloudIDS generic security framework"],"prefix":"10.1109","author":[{"given":"Madhan Kumar","family":"Srinivasan","sequence":"first","affiliation":[]},{"given":"K.","family":"Sarukesi","sequence":"additional","affiliation":[]},{"given":"P.","family":"Revathy","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Malicious Insider Attacks to Rise","year":"2009","author":"shiels","key":"19"},{"key":"17","first-page":"45","article-title":"Cloud computing identity management","volume":"7","author":"anu","year":"2009","journal-title":"Technical Report SETLabs Briefings"},{"journal-title":"Security Guidance for Critical Areas of Focus in Cloud Computing V2 1","year":"2009","key":"18"},{"journal-title":"Top Threats to Cloud Computing V1 0","year":"2010","key":"15"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1109\/MDM.2013.95"},{"journal-title":"Intel IT Center","article-title":"What's holding back the cloud?","year":"2012","key":"13"},{"key":"14","article-title":"Developing an enterprise cloud computing strategy","author":"li","year":"2009","journal-title":"Intel Corporation"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.5121\/ijasuc.2010.1406"},{"journal-title":"Juniper Networks","article-title":"Securing multi-tenancy and cloud computing","year":"2012","key":"12"},{"key":"21","first-page":"282","author":"lu","year":"2010","journal-title":"Secure Provenance The Essential of Bread and Butter of Data Forensics in Cloud Computing"},{"journal-title":"2010 Data Breach Investigations Report A Study Conducted by the Verizon RISK Team with Cooperation from the U S Secret Service and the Dutch High Tech Crime Unit","year":"2010","author":"baker","key":"20"},{"key":"22","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-25560-1_7","article-title":"Group-centric secure information-sharing models for isolated groups","author":"krishnan","year":"2011","journal-title":"ACM Transactions on Information and System Security"},{"key":"23","first-page":"166","author":"anchan","year":"2003","journal-title":"Regaining Single Sign-On Taming the Beast"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1109\/SC.2005.34"},{"key":"25","first-page":"167","author":"chen","year":"2013","journal-title":"Towards Verifiable Resource Accounting for Outsourced Computation"},{"journal-title":"Multi-Processor Architectural Support for Protecting Virtual Machine Privacy in Untrusted Cloud Environment","year":"2013","author":"wen","key":"26"},{"key":"27","first-page":"13","author":"steuer jr","year":"2010","journal-title":"Privacy Preserving Identity Attribute Verification in Windows CardSpace"},{"journal-title":"Cloud Security Alliance Research Paper","article-title":"Identity and access management in the cloud","year":"2010","key":"28"},{"key":"29","first-page":"49","author":"sun","year":"2010","journal-title":"OpenID Enabled Browser Towards Fixing the Broken Web Single Sign-On Triangle"},{"journal-title":"Accenture","article-title":"Cloud computing and sustainability: The environmental benefits of moving to the cloud","year":"2010","key":"3"},{"journal-title":"10 Security Concerns for Cloud Computing","year":"2010","author":"gregg","key":"2"},{"key":"10","first-page":"358","volume":"89","author":"kumar srinivasan","year":"2010","journal-title":"A Roadmap for the Comparison of Identity Management Solutions Based on State-of-The-art IdM Taxonomies"},{"key":"1","first-page":"470","author":"kumar srinivasan","year":"2012","journal-title":"State-of-The-art Cloud Computing Security Taxonomies-A Classification of Security Challenges in the Present Cloud Computing Environment"},{"year":"0","key":"30"},{"key":"7","first-page":"432","volume":"335","author":"kumar srinivasan","year":"2012","journal-title":"ECloudIDS Tier-1 UX-Engine Subsystem Design and Implementation Using Self-Organizing Map (SOM) for Secure Cloud Computing Environment"},{"key":"6","first-page":"358","volume":"335","author":"kumar srinivasan","year":"2012","journal-title":"ECloudIDS-Design Roadmap for the Architecture of Next-generation Hybrid Two-tier Expert Engine-based IDS for Cloud Computing Environment"},{"key":"5","first-page":"402","author":"kim","year":"2010","journal-title":"Exploring Application and Infrastructure Adaptation on Hybrid Grid-Cloud Infrastructure"},{"key":"4","first-page":"149","article-title":"Hybrid cloud tutorial: From planning to classroom","volume":"27","author":"rilett","year":"2012","journal-title":"Journal of Computing Sciences in Colleges"},{"journal-title":"Protecting Data Confidentiality in Cloud Systems","year":"2012","author":"tao","key":"9"},{"key":"8","article-title":"IT Cloud Services User Survey, pt. 2: Top Benefits &Challenges","author":"gens","year":"2008","journal-title":"IDC"}],"event":{"name":"2013 International Conference on Advances in Computing, Communications and Informatics (ICACCI)","start":{"date-parts":[[2013,8,22]]},"location":"Mysore","end":{"date-parts":[[2013,8,25]]}},"container-title":["2013 International Conference on Advances in Computing, Communications and Informatics (ICACCI)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6621059\/6637135\/06637432.pdf?arnumber=6637432","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,21]],"date-time":"2017-06-21T21:01:56Z","timestamp":1498078916000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6637432\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,8]]},"references-count":30,"URL":"https:\/\/doi.org\/10.1109\/icacci.2013.6637432","relation":{},"subject":[],"published":{"date-parts":[[2013,8]]}}}