{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,2]],"date-time":"2025-07-02T17:14:11Z","timestamp":1751476451232},"reference-count":13,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012,3]]},"DOI":"10.1109\/infrkm.2012.6205035","type":"proceedings-article","created":{"date-parts":[[2012,6,1]],"date-time":"2012-06-01T18:52:10Z","timestamp":1338576730000},"page":"54-59","source":"Crossref","is-referenced-by-count":10,"title":["Security framework of cloud data storage based on Multi Agent system architecture - A pilot study"],"prefix":"10.1109","author":[{"given":"Amir Mohamed","family":"Talib","sequence":"first","affiliation":[]},{"given":"Rodziah","family":"Atan","sequence":"additional","affiliation":[]},{"given":"Rusli","family":"Abdullah","sequence":"additional","affiliation":[]},{"given":"Masrah Azrifah","family":"Azmi Murad","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/ICOS.2011.6079311"},{"journal-title":"Developing An Instrument Construct Made Simple","year":"2008","author":"aziz","key":"11"},{"key":"12","first-page":"396","author":"aziz","year":"2008","journal-title":"Evaluation of Information Professionals Competency Face Validity Test Using Rasch Model"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.3923\/jse.2011.78.90"},{"journal-title":"Cloud Security and Privacy An Enterprise Perspective on Risks and Compliance","year":"2009","author":"mather","key":"2"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-22410-2_23"},{"journal-title":"Zetta Enterprise Cloud Storage on Demand","year":"2008","key":"10"},{"journal-title":"Forrester A Close Look at Cloud Computing Security Issues","year":"2009","author":"wang","key":"7"},{"key":"6","first-page":"475","author":"jing","year":"2010","journal-title":"A Brief Survey on the Security Model of Cloud Computing"},{"key":"5","first-page":"1","author":"wang","year":"2009","journal-title":"Ensuring Data Storage Security in Cloud Computing"},{"key":"4","first-page":"1","author":"ramgovind","year":"2010","journal-title":"The Management of Security in Cloud Computing"},{"journal-title":"Vertica for the Cloud","year":"2008","key":"9"},{"journal-title":"VPN Cubed","year":"2008","key":"8"}],"event":{"name":"2012 International Conference on Information Retrieval & Knowledge Management (CAMP)","start":{"date-parts":[[2012,3,13]]},"location":"Kuala Lumpur, Malaysia","end":{"date-parts":[[2012,3,15]]}},"container-title":["2012 International Conference on Information Retrieval &amp; Knowledge Management"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6200786\/6204970\/06205035.pdf?arnumber=6205035","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,21]],"date-time":"2017-03-21T16:15:10Z","timestamp":1490112910000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6205035\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,3]]},"references-count":13,"URL":"https:\/\/doi.org\/10.1109\/infrkm.2012.6205035","relation":{},"subject":[],"published":{"date-parts":[[2012,3]]}}}