{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T00:24:29Z","timestamp":1730247869555,"version":"3.28.0"},"reference-count":8,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,6]]},"DOI":"10.1109\/icisa.2013.6579424","type":"proceedings-article","created":{"date-parts":[[2013,8,28]],"date-time":"2013-08-28T21:12:51Z","timestamp":1377724371000},"page":"1-4","source":"Crossref","is-referenced-by-count":2,"title":["User-Centric Key Management Scheme for Personal Cloud Storage"],"prefix":"10.1109","author":[{"given":"SeongMin","family":"Yoo","sequence":"first","affiliation":[]},{"given":"PyungKoo","family":"Park","sequence":"additional","affiliation":[]},{"given":"JinSeop","family":"Shin","sequence":"additional","affiliation":[]},{"given":"JinSeok","family":"Oh","sequence":"additional","affiliation":[]},{"given":"HoYong","family":"Ryu","sequence":"additional","affiliation":[]},{"given":"JaeCheol","family":"Ryou","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"3","article-title":"Security guidance for critical areas of focus in cloud computing","author":"archer","year":"2009","journal-title":"Cloud Security Alliance"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/CSNT.2012.159"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1145\/2398776.2398827"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/5.993400"},{"key":"6","article-title":"Safeguarding cryptographic keys","volume":"48","author":"blakley","year":"1979","journal-title":"Proceedings of the National Computer Conference"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1145\/359168.359176"},{"journal-title":"Privacy Evaluation Model for Personal Cloud Service","year":"0","author":"na","key":"4"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1137\/S0036144502417715"}],"event":{"name":"2013 International Conference on Information Science and Applications (ICISA)","start":{"date-parts":[[2013,6,24]]},"location":"Suwon, Korea (South)","end":{"date-parts":[[2013,6,26]]}},"container-title":["2013 International Conference on Information Science and Applications (ICISA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6575223\/6579310\/06579424.pdf?arnumber=6579424","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,23]],"date-time":"2017-03-23T03:19:42Z","timestamp":1490239182000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6579424\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,6]]},"references-count":8,"URL":"https:\/\/doi.org\/10.1109\/icisa.2013.6579424","relation":{},"subject":[],"published":{"date-parts":[[2013,6]]}}}