{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,19]],"date-time":"2025-03-19T16:24:56Z","timestamp":1742401496736,"version":"3.28.0"},"reference-count":8,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,10]]},"DOI":"10.1109\/ictc.2013.6675484","type":"proceedings-article","created":{"date-parts":[[2013,12,4]],"date-time":"2013-12-04T15:58:59Z","timestamp":1386172739000},"page":"807-812","source":"Crossref","is-referenced-by-count":14,"title":["Applying an agent-based user authentication and access control model for cloud servers"],"prefix":"10.1109","author":[{"given":"Mostafa","family":"Hajivali","sequence":"first","affiliation":[]},{"given":"Faraz","family":"Fatemi Moghaddam","sequence":"additional","affiliation":[]},{"given":"Maen T.","family":"Alrashdan","sequence":"additional","affiliation":[]},{"given":"Abdualeem Z. M.","family":"Alothmani","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/CloudCom.2012.6427574"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/CSCWD.2012.6221866"},{"key":"1","first-page":"85","article-title":"Cloud computing model based on mpi and openmp,\" in","volume":"7","author":"peng","year":"2010","journal-title":"Proc 2nd International Conf on Computer Engineering and Technology (ICCET"},{"key":"7","first-page":"1","article-title":"Aes proposal: Rijndael","author":"daemen","year":"2001","journal-title":"National Institute of Standards and Technology"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2012.153"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/DASC.2011.133"},{"key":"4","first-page":"1126","article-title":"Applying agents to the data security in cloud computing,\" in","author":"zhang","year":"2012","journal-title":"Proc International Conf On Computer Science and Information Processing (CSIP"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.7763\/JACN.2013.V1.47"}],"event":{"name":"2013 International Conference on ICT Convergence (ICTC)","start":{"date-parts":[[2013,10,14]]},"location":"Jeju","end":{"date-parts":[[2013,10,16]]}},"container-title":["2013 International Conference on ICT Convergence (ICTC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6661630\/6675287\/06675484.pdf?arnumber=6675484","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,3,29]],"date-time":"2019-03-29T03:00:39Z","timestamp":1553828439000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/6675484\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,10]]},"references-count":8,"URL":"https:\/\/doi.org\/10.1109\/ictc.2013.6675484","relation":{},"subject":[],"published":{"date-parts":[[2013,10]]}}}