{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T17:26:09Z","timestamp":1729617969510,"version":"3.28.0"},"reference-count":26,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,12]]},"DOI":"10.1109\/icitst.2013.6750237","type":"proceedings-article","created":{"date-parts":[[2014,3,27]],"date-time":"2014-03-27T15:20:46Z","timestamp":1395933646000},"page":"428-436","source":"Crossref","is-referenced-by-count":4,"title":["Threat methodology for securing scalable video in the Cloud"],"prefix":"10.1109","author":[{"given":"Afnan Ullah","family":"Khan","sequence":"first","affiliation":[]},{"given":"Manuel","family":"Oriol","sequence":"additional","affiliation":[]},{"given":"Mariam","family":"Kiran","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","article-title":"Information security testing and assessment","author":"scarfone","year":"0","journal-title":"Special Publication 800-115"},{"year":"0","key":"17"},{"year":"0","key":"18"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2007.63"},{"journal-title":"Blue Pill Prototype Creates 100% Undetectable Malware","year":"0","author":"naraine","key":"16"},{"journal-title":"Technical Review of Using Cloud for Research","year":"2009","author":"wills","key":"13"},{"journal-title":"Information Security Forum (ISF)","article-title":"Information risk analysis methodology (IRAM)","year":"0","key":"14"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/GCE.2008.4738445"},{"journal-title":"European Research Consortium for Informatics and Mathematics","year":"0","key":"12"},{"key":"21","article-title":"Managing security threats in clouds","author":"kiran","year":"2012","journal-title":"Digital Research"},{"key":"20","article-title":"Challenging security requirements for uS government cloud computing adoption (draft)","author":"whiteside","year":"2012","journal-title":"Special Publication 500-296"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1109\/CloudCom.2012.6427574"},{"key":"23","first-page":"313","article-title":"Safeguarding cryptographic keys","volume":"48","author":"blakley","year":"1979","journal-title":"Proceedings of the National Computer Conference"},{"journal-title":"Information Security Forum (ISF)","article-title":"Information risk analysis methodology (IRAM)","year":"0","key":"24"},{"year":"2010","key":"25"},{"journal-title":"Keys for Protecting User Access to Media","year":"0","author":"khan","key":"26"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.2003.1246934"},{"key":"2","article-title":"Secure scalable streaming for wireless networks","author":"apostolopoulos","year":"2001","journal-title":"IEEE International Conference on Acoustics Speech and Signal Processing"},{"key":"10","doi-asserted-by":"crossref","first-page":"599","DOI":"10.1016\/j.future.2008.12.001","article-title":"Cloud computing and emerging iT platforms","volume":"25","author":"buyya","year":"2008","journal-title":"Vision Hype and Reality for Delivering Computing As the 5th Utility Future Generation Computer Systems"},{"year":"0","key":"1"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1145\/359168.359176"},{"key":"6","article-title":"The tESLA broadcast authentication protocol","volume":"5","author":"perrig","year":"2002","journal-title":"RSA CryptoBytes 2002"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1145\/501983.501988"},{"key":"4","first-page":"437","article-title":"Secure scalable streaming enabling transcoding without decryption","author":"apostolopoulos","year":"2001","journal-title":"ICIP (I)"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.2004.1418820"},{"key":"8","first-page":"159","article-title":"EHBT an efficient protocol for group key management","volume":"2233","author":"rafaeli","year":"2001","journal-title":"NGC LNCS"}],"event":{"name":"2013 8th International Conference for Internet Technology and Secured Transactions (ICITST)","start":{"date-parts":[[2013,12,9]]},"location":"London, United Kingdom","end":{"date-parts":[[2013,12,12]]}},"container-title":["8th International Conference for Internet Technology and Secured Transactions (ICITST-2013)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6745432\/6750143\/06750237.pdf?arnumber=6750237","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,22]],"date-time":"2017-06-22T10:27:39Z","timestamp":1498127259000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6750237\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,12]]},"references-count":26,"URL":"https:\/\/doi.org\/10.1109\/icitst.2013.6750237","relation":{},"subject":[],"published":{"date-parts":[[2013,12]]}}}