{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T00:16:19Z","timestamp":1729642579975,"version":"3.28.0"},"reference-count":23,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,12]]},"DOI":"10.1109\/icitst.2013.6750274","type":"proceedings-article","created":{"date-parts":[[2014,3,27]],"date-time":"2014-03-27T11:20:46Z","timestamp":1395919246000},"page":"607-611","source":"Crossref","is-referenced-by-count":1,"title":["Access control in probative value cloud"],"prefix":"10.1109","author":[{"given":"Mounira","family":"Msahli","sequence":"first","affiliation":[]},{"given":"Rached","family":"Abdeljaoued","sequence":"additional","affiliation":[]},{"given":"Ahmed","family":"Serhrouchni","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"PDF Advanced Electronic Signature Profiles Part I PAdES Overview-A Framework Document for P AdES","article-title":"Electronic signatures a nd infrastructures (ESI)","year":"0","key":"19"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4302-0139-7"},{"journal-title":"Pro Hadoop Build Scalable Distributed Applications in the Cloud","year":"0","author":"venner","key":"17"},{"journal-title":"SSL and TLS Securing the Web","year":"2000","author":"thomas","key":"23"},{"journal-title":"XML Advanced Electronic Signatures","year":"0","key":"18"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1145\/1415472.1415485"},{"key":"16","article-title":"RoleBased access control","volume":"4","author":"ferraiolo","year":"2001","journal-title":"Transactions on Lnfonnation and System Security"},{"journal-title":"Hadoop Security Design","year":"2009","author":"o'malley","key":"13"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4419-6655-1"},{"journal-title":"Hadoop in Action","year":"2011","author":"lam","key":"11"},{"journal-title":"Hadoop The Definitive Guide","year":"0","author":"white","key":"12"},{"journal-title":"Fran Ois Yergeau Extensible Markup Language","year":"2004","author":"bray","key":"21"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.4108\/icst.collaboratecom.2013.254190"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.17487\/rfc2560"},{"journal-title":"NIST Cloud Computing Reference Architecture A Survey","year":"2011","key":"2"},{"key":"1","article-title":"Cloud computing state-of-The-art and research challenges","author":"zhang","year":"2010","journal-title":"The Brazilian Computer Society"},{"key":"10","doi-asserted-by":"crossref","DOI":"10.1145\/984334.984339","article-title":"The -UCON aBC usage control model","author":"park","year":"2004","journal-title":"ACM Transactions on Information and System Security"},{"journal-title":"Security in Computing","year":"1997","author":"pfleeger","key":"7"},{"journal-title":"Cloud Security A Comprehensive Guide to Secure Cloud Computing","year":"0","author":"krutz","key":"6"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1145\/2184512.2184581"},{"key":"4","article-title":"Cloud security and privacy an enterprise perspective on risks and compliance","author":"mather","year":"2009","journal-title":"O'Reilly Media"},{"journal-title":"Role-based access control models","year":"1996","author":"sandhu","key":"9"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1145\/360303.360333"}],"event":{"name":"8th International Conference for Internet Technology and Secured Transactions (ICITST 2013)","start":{"date-parts":[[2013,12,9]]},"location":"London","end":{"date-parts":[[2013,12,12]]}},"container-title":["8th International Conference for Internet Technology and Secured Transactions (ICITST-2013)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6745432\/6750143\/06750274.pdf?arnumber=6750274","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,22]],"date-time":"2017-06-22T06:27:39Z","timestamp":1498112859000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6750274\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,12]]},"references-count":23,"URL":"https:\/\/doi.org\/10.1109\/icitst.2013.6750274","relation":{},"subject":[],"published":{"date-parts":[[2013,12]]}}}