{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T18:37:27Z","timestamp":1729622247324,"version":"3.28.0"},"reference-count":19,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,12]]},"DOI":"10.1109\/icitst.2013.6750260","type":"proceedings-article","created":{"date-parts":[[2014,3,27]],"date-time":"2014-03-27T15:20:46Z","timestamp":1395933646000},"page":"542-547","source":"Crossref","is-referenced-by-count":1,"title":["Security in the cloud based systems: Structure and breaches"],"prefix":"10.1109","author":[{"given":"Vivek","family":"Shandilya","sequence":"first","affiliation":[]},{"given":"Sajjan","family":"Shiva","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Foundation for the Run-time Analysis of Software Systems","year":"2000","author":"viswanathan","key":"19"},{"journal-title":"Syferlock Technology Corporation Understanding and Selecting A Key Management Solution","year":"2013","key":"17"},{"journal-title":"Cloud Security Survey Global Executive Summary","article-title":"Trendmicro incorporation","year":"2012","key":"18"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.2316\/P.2011.757-027"},{"journal-title":"StilSecure Inc Safe Access Overview","year":"2012","key":"16"},{"key":"13","article-title":"Understanding and selecting a","author":"securosis","year":"2013","journal-title":"Key Management Solution"},{"key":"14","article-title":"Security in the cloud a stake holder's perspective","author":"shandilya","year":"2012","journal-title":"SAM"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/32.685256"},{"key":"12","article-title":"Decomposing properties into safety and liveliness using predicate logic","author":"schneider","year":"1987","journal-title":"Technical Report 87-874"},{"journal-title":"Maude Manuel","year":"0","author":"clavel","key":"3"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1145\/1838552.1838553"},{"journal-title":"Formal Specification and Analysis of Cloud Computing Management","year":"2012","author":"muhlbauer","key":"10"},{"key":"1","doi-asserted-by":"crossref","first-page":"386","DOI":"10.1007\/978-3-642-22944-2_28","article-title":"PVeStA a parallel statistical model checking and quantitative analysis tool","volume":"6859","author":"alturki","year":"2011","journal-title":"Algebra and Coalgebra in Computer Science Lecture Notes in Computer Science"},{"journal-title":"The Notorious Nine","year":"2013","key":"7"},{"journal-title":"Security Analysis in Cloud Computing Using Rewriting Logic","year":"2012","author":"eckhardt","key":"6"},{"journal-title":"Dropbox Authentication Server Compromised","year":"2011","key":"5"},{"key":"4","article-title":"Best practices for mitigating insider threat lessons learned from 250 cases","author":"cappelli","year":"2009","journal-title":"RSA Conference"},{"key":"9","article-title":"The nIST definition of cloud computing technical report 800-145","author":"mell","year":"2011","journal-title":"Computer Security Division Information Technology Laboratory"},{"journal-title":"Actor Model of Computation Scalable Robust Information Systems","year":"2011","author":"hewitt","key":"8"}],"event":{"name":"2013 8th International Conference for Internet Technology and Secured Transactions (ICITST)","start":{"date-parts":[[2013,12,9]]},"location":"London, United Kingdom","end":{"date-parts":[[2013,12,12]]}},"container-title":["8th International Conference for Internet Technology and Secured Transactions (ICITST-2013)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6745432\/6750143\/06750260.pdf?arnumber=6750260","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,22]],"date-time":"2017-06-22T10:27:40Z","timestamp":1498127260000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6750260\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,12]]},"references-count":19,"URL":"https:\/\/doi.org\/10.1109\/icitst.2013.6750260","relation":{},"subject":[],"published":{"date-parts":[[2013,12]]}}}