{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,11]],"date-time":"2025-09-11T18:45:46Z","timestamp":1757616346295,"version":"3.44.0"},"reference-count":23,"publisher":"IEEE","license":[{"start":{"date-parts":[[2019,7,1]],"date-time":"2019-07-01T00:00:00Z","timestamp":1561939200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,7,1]],"date-time":"2019-07-01T00:00:00Z","timestamp":1561939200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,7]]},"DOI":"10.1109\/iceei47359.2019.8988832","type":"proceedings-article","created":{"date-parts":[[2020,2,10]],"date-time":"2020-02-10T22:56:26Z","timestamp":1581375386000},"page":"69-74","source":"Crossref","is-referenced-by-count":0,"title":["OTPAF: A Security Requirement Conceptual Model of SaaS for Malaysian Government based on Common Criteria"],"prefix":"10.1109","author":[{"given":"Norlaili binti Abdul","family":"Hamid","sequence":"first","affiliation":[{"name":"Faculty of Information Science &#x0026; Technology (FTSM), Universiti Kebangsaan Malaysia (UKM),Selangor,Malaysia"}]},{"given":"Ibrahim","family":"Mohamed","sequence":"additional","affiliation":[{"name":"Faculty of Information Science &#x0026; Technology (FTSM), Universiti Kebangsaan Malaysia (UKM),Selangor,Malaysia"}]},{"given":"Maslina","family":"Daud","sequence":"additional","affiliation":[{"name":"CyberSecurity Malaysia,Cyber Security Proactive Services Division,Selangor,Malaysia"}]},{"given":"Norahana","family":"Salimin","sequence":"additional","affiliation":[{"name":"CyberSecurity Malaysia,Malaysian Security Evaluation Facility (MySEF) Department,Selangor,Malaysia"}]},{"given":"Nur Ilyani","family":"Ahmad","sequence":"additional","affiliation":[{"name":"Faculty of Information Science &#x0026; Technology (FTSM), Universiti Kebangsaan Malaysia (UKM),Selangor,Malaysia"}]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/MoNeTeC.2018.8572267"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/s00766-015-0220-8"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/IEEM.2017.8290305"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/1655168.1655173"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/CloudCom.2014.85"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2017.03.009"},{"journal-title":"Cloud Control Matrix","year":"0","key":"ref16"},{"journal-title":"Top Threats to Cloud Computing Deep Dive","year":"2018","key":"ref17"},{"journal-title":"No Title","year":"0","author":"security","key":"ref18"},{"key":"ref19","first-page":"1","article-title":"Common Criteria for Information Technology Security Evaluation Part 1: Introduction and general model April 2017 Revision 5 Foreword","volume":"3","year":"2017","journal-title":"Common Criteria"},{"journal-title":"2016 Cloud Readiness Index","year":"2016","key":"ref4"},{"journal-title":"Cloud Adoption in the Malaysian FSI sector","year":"2018","author":"report","key":"ref3"},{"journal-title":"Security Directive (Revision 2017)","year":"2017","key":"ref6"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.4018\/IJEGR.2018040105"},{"journal-title":"Semantic hierarchies for extracting modeling and connecting compliance requirements in information security control standards","year":"2017","author":"hale","key":"ref8"},{"journal-title":"Information security Framework for Public Sector","year":"2016","key":"ref7"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/QRS.2017.45"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2007.70754"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TCC.2015.2511719"},{"journal-title":"Common Criteria portal","year":"0","key":"ref20"},{"journal-title":"NIAP Protection Profile for Application Software","year":"2014","key":"ref22"},{"key":"ref21","first-page":"1","article-title":"Common Criteria for Information Technology Security Evaluation Part 2: Security functional components","year":"2012","journal-title":"Security"},{"journal-title":"CloudMask","year":"2015","key":"ref23"}],"event":{"name":"2019 International Conference on Electrical Engineering and Informatics (ICEEI)","start":{"date-parts":[[2019,7,9]]},"location":"Bandung, Indonesia","end":{"date-parts":[[2019,7,10]]}},"container-title":["2019 International Conference on Electrical Engineering and Informatics (ICEEI)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8966551\/8988782\/08988832.pdf?arnumber=8988832","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,5]],"date-time":"2025-09-05T18:12:45Z","timestamp":1757095965000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8988832\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,7]]},"references-count":23,"URL":"https:\/\/doi.org\/10.1109\/iceei47359.2019.8988832","relation":{},"subject":[],"published":{"date-parts":[[2019,7]]}}}