{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T00:05:16Z","timestamp":1729641916279,"version":"3.28.0"},"reference-count":24,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,12]]},"DOI":"10.1109\/icitst.2013.6750184","type":"proceedings-article","created":{"date-parts":[[2014,3,27]],"date-time":"2014-03-27T15:20:46Z","timestamp":1395933646000},"page":"168-173","source":"Crossref","is-referenced-by-count":0,"title":["A framework for assuring the conformance of cloud-based email"],"prefix":"10.1109","author":[{"given":"Melanie","family":"Willett","sequence":"first","affiliation":[]},{"given":"Rossouw","family":"Von Solms","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1109\/CloudCom.2010.66"},{"journal-title":"Cloud Computing Synopsis and Recommendations","year":"2012","key":"17"},{"key":"22","first-page":"5","article-title":"Cloud computing and its security in higher education","volume":"26","author":"tout","year":"2009","journal-title":"The Proceedings of the Information Systems Education Conference 2009"},{"journal-title":"OECD Principles of Corporate Governance","year":"2004","key":"18"},{"journal-title":"Cloud Computing in Higher Education and Research Institutions and the USA Patriot ACT","year":"2012","author":"van hoboken","key":"23"},{"journal-title":"Public Cloud First","year":"2013","author":"middleton","key":"15"},{"key":"24","doi-asserted-by":"crossref","first-page":"73","DOI":"10.4102\/sajbm.v43i4.483","article-title":"Cloud computing service value a message to the board","volume":"43","author":"von solms","year":"2012","journal-title":"South African Journal of Business Management"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.5171\/2011.875547"},{"journal-title":"Federal Cloud Computing Strategy","year":"2011","author":"kundra","key":"13"},{"journal-title":"Off 365 Education","year":"2013","key":"14"},{"journal-title":"COBIT 5 A Business Framework for the Governance and Management of Enterprise IT","year":"2010","key":"11"},{"journal-title":"International Standard Pretoria Pretoria SABS Standards Division","article-title":"Corporate governance of information technology","year":"2008","key":"12"},{"key":"21","first-page":"25","article-title":"Identity management trust services foundations for cloud computing","author":"suess","year":"2009","journal-title":"EDUCA USE Review"},{"key":"3","article-title":"Cloud computing in higher education","author":"britto","year":"2012","journal-title":"Library Student Journal"},{"key":"20","first-page":"48","article-title":"Emerging role of cloud computing in redefining business operations","author":"shivakumar","year":"2010","journal-title":"Global Management Review"},{"journal-title":"The National Cloud Computing Strategy","year":"2013","key":"2"},{"key":"1","first-page":"22","article-title":"Email regulation issues leaving businesses confused","volume":"9","year":"2013","journal-title":"CPA Practice Management Forum"},{"journal-title":"Governance and Assurance Perspectives","article-title":"Cloud computing business benefits with security","year":"2009","key":"10"},{"journal-title":"Government Cloud Strategy","year":"2011","key":"7"},{"journal-title":"Google Apps for Education","year":"2013","key":"6"},{"journal-title":"Cloud Computing Benefits Risks and Recommendations for Information Security","year":"0","author":"catteddu","key":"5"},{"journal-title":"Second Life Out As Techies Embrace Cloud Email","year":"2009","author":"corbyn","key":"4"},{"journal-title":"International Framework for Assurance Engagements","year":"2004","key":"9"},{"journal-title":"The Benefits of Cloud Computing","year":"2009","key":"8"}],"event":{"name":"2013 8th International Conference for Internet Technology and Secured Transactions (ICITST)","start":{"date-parts":[[2013,12,9]]},"location":"London, United Kingdom","end":{"date-parts":[[2013,12,12]]}},"container-title":["8th International Conference for Internet Technology and Secured Transactions (ICITST-2013)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6745432\/6750143\/06750184.pdf?arnumber=6750184","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,9]],"date-time":"2019-08-09T00:08:00Z","timestamp":1565309280000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6750184\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,12]]},"references-count":24,"URL":"https:\/\/doi.org\/10.1109\/icitst.2013.6750184","relation":{},"subject":[],"published":{"date-parts":[[2013,12]]}}}