{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T22:12:15Z","timestamp":1729635135298,"version":"3.28.0"},"reference-count":17,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011,9]]},"DOI":"10.1109\/icnss.2011.6060015","type":"proceedings-article","created":{"date-parts":[[2011,11,1]],"date-time":"2011-11-01T20:59:24Z","timestamp":1320181164000},"page":"280-284","source":"Crossref","is-referenced-by-count":3,"title":["Trustable outsourcing of business processes to cloud computing environments"],"prefix":"10.1109","author":[{"given":"Sami","family":"Alsouri","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Stefan","family":"Katzenbeisser","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Sebastian","family":"Biedermann","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"263","reference":[{"year":"2007","key":"ref10","article-title":"TPM main specification version 1.2, level 2 revision 103"},{"year":"2007","key":"ref11","article-title":"Web services business process execution language 2.0"},{"key":"ref12","article-title":"vTPM: virtualizing the trusted platform module","volume":"15","author":"berger","year":"2006","journal-title":"Proceedings of the 15th conference on USENIX Security Symposium"},{"key":"ref13","doi-asserted-by":"crossref","first-page":"33","DOI":"10.1007\/978-3-540-68979-9_3","article-title":"A Software-Based trusted platform module emulator","author":"strasser","year":"2008","journal-title":"Proceedings of the 1st International Conference on Trusted Computing and Trust in Information Technologies Trusted Computing - Challenges and Applications"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ICWS.2009.139"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ICWS.2005.136"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/1456492.1456496"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/SERVICES-I.2009.32"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ICADIWT.2008.4664329"},{"article-title":"Web services business process execution language 2.0, OASIS standard","year":"2007","author":"jordan","key":"ref3"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/s12599-009-0071-2"},{"key":"ref5","article-title":"Global sourcing of IT services and information security: Prudence before playing","volume":"20","author":"ramer","year":"2007","journal-title":"Communications of The Association for Information Systems"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/CEC-EEE.2007.4"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2011.03.005"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/s00778-007-0044-3"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jsis.2009.06.002"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-76993-4_31"}],"event":{"name":"2011 5th International Conference on Network and System Security (NSS)","start":{"date-parts":[[2011,9,6]]},"location":"Milan, Italy","end":{"date-parts":[[2011,9,8]]}},"container-title":["2011 5th International Conference on Network and System Security"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6044613\/6059944\/06060015.pdf?arnumber=6060015","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,20]],"date-time":"2017-06-20T08:56:11Z","timestamp":1497948971000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6060015\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,9]]},"references-count":17,"URL":"https:\/\/doi.org\/10.1109\/icnss.2011.6060015","relation":{},"subject":[],"published":{"date-parts":[[2011,9]]}}}