{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T04:39:44Z","timestamp":1729658384877,"version":"3.28.0"},"reference-count":16,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012,7]]},"DOI":"10.1109\/indin.2012.6301237","type":"proceedings-article","created":{"date-parts":[[2012,9,17]],"date-time":"2012-09-17T16:46:11Z","timestamp":1347900371000},"page":"852-856","source":"Crossref","is-referenced-by-count":4,"title":["Holistic framework of security management for cloud service providers"],"prefix":"10.1109","author":[{"given":"Gang","family":"Zhao","sequence":"first","affiliation":[]}],"member":"263","reference":[{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/CLOUD.2011.9"},{"key":"16","first-page":"131","article-title":"Cloud computing framework: A framework to evaluate cloud computing for it service providers","author":"bulander","year":"2011","journal-title":"Proceedings of the 1st International Conference on Cloud Computing and Services Science"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-25731-5_1"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/CNSI.2011.82"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.4028\/www.scientific.net\/AMM.145.272"},{"key":"12","doi-asserted-by":"crossref","first-page":"3810","DOI":"10.4028\/www.scientific.net\/AMM.121-126.3810","article-title":"Analysis of cloud computing and information security","volume":"121 126","author":"wang","year":"2012","journal-title":"Applied Mechanics and Materials Frontiers of Manufacturing and Design Science II"},{"key":"3","first-page":"578","article-title":"The evolution of standardization for mobile cloud","author":"yoon","year":"2011","journal-title":"2011 International Conference on ICT Convergence ICTC 2011"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1016\/j.ssci.2011.08.028"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1117\/12.920151"},{"key":"10","first-page":"573","article-title":"Tackling the loss of control: Standards-based conjoint management of security requirements for cloud services","author":"han","year":"2011","journal-title":"Proc 2011 IEEE 4th International Conference on Cloud Computing CLOUD 2011"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/NCCA.2011.11"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/CCGrid.2011.51"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/CloudCom.2011.78"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/SERVICES.2011.92"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2011.05.023"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/ISIAS.2011.6122783"}],"event":{"name":"2012 10th IEEE International Conference on Industrial Informatics (INDIN)","start":{"date-parts":[[2012,7,25]]},"location":"Beijing, China","end":{"date-parts":[[2012,7,27]]}},"container-title":["IEEE 10th International Conference on Industrial Informatics"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6294017\/6300337\/06301237.pdf?arnumber=6301237","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,20]],"date-time":"2017-06-20T20:20:48Z","timestamp":1497990048000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6301237\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,7]]},"references-count":16,"URL":"https:\/\/doi.org\/10.1109\/indin.2012.6301237","relation":{},"subject":[],"published":{"date-parts":[[2012,7]]}}}