{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T05:37:48Z","timestamp":1725428268175},"reference-count":20,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,10]]},"DOI":"10.1109\/iotsms.2018.8554785","type":"proceedings-article","created":{"date-parts":[[2018,12,4]],"date-time":"2018-12-04T00:54:17Z","timestamp":1543884857000},"page":"244-249","source":"Crossref","is-referenced-by-count":1,"title":["An Approach to Enhancing Confidentiality and Integrity on Mobile Multi-Cloud Systems: The \u201cARIANNA\u201d Experience"],"prefix":"10.1109","author":[{"given":"Riccardo","family":"Di Pietro","sequence":"first","affiliation":[]},{"given":"Marco","family":"Scarpa","sequence":"additional","affiliation":[]},{"given":"Maurizio","family":"Giacobbe","sequence":"additional","affiliation":[]},{"given":"Antonio","family":"Puliafito","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"TwinCloud A Client-Side Encryption Solution for Secure Sharing on Clouds Without Explicit Key Management","year":"2016","author":"bicakci","key":"ref10"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/CloudTech.2015.7336991"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/IEEE.EDGE.2017.14"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ICEMIS.2016.7745297"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ICCPCT.2015.7159380"},{"journal-title":"Google Drive cloud storage & file backup for photos docs & more","year":"2018","key":"ref15"},{"journal-title":"DropBox","year":"2018","key":"ref16"},{"journal-title":"Openstack swift object storage service","year":"2018","key":"ref17"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2018.2800740"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/2906153"},{"journal-title":"IBM cyber security intelligence index 2016","year":"2017","key":"ref4"},{"journal-title":"Mobile and Distributed Systems Laboratory at University of Messina","year":"2018","key":"ref3"},{"journal-title":"Homer odyssey 11 320","year":"0","key":"ref6"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/SMARTCOMP.2018.00055"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/DICTAP.2016.7544002"},{"journal-title":"Hesiod Theogony 947","year":"0","key":"ref7"},{"key":"ref2","doi-asserted-by":"crossref","first-page":"328","DOI":"10.1007\/978-3-319-67910-5_27","article-title":"Secure storage as a service in multi-cloud environment","author":"di pietro","year":"2017","journal-title":"Ad-Hoc Mobile and Wireless Networks"},{"journal-title":"Cloud is the New Normal AWS Government Education & Nonprofits Blog","year":"2016","key":"ref1"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCN.2017.8038521"},{"journal-title":"Keystone the OpenStack Identity Service","year":"2018","key":"ref20"}],"event":{"name":"2018 Fifth International Conference on Internet of Things: Systems, Management and Security (IoTSMS)","start":{"date-parts":[[2018,10,15]]},"location":"Valencia","end":{"date-parts":[[2018,10,18]]}},"container-title":["2018 Fifth International Conference on Internet of Things: Systems, Management and Security"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8537438\/8554379\/08554785.pdf?arnumber=8554785","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,27]],"date-time":"2022-01-27T13:00:36Z","timestamp":1643288436000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8554785\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,10]]},"references-count":20,"URL":"https:\/\/doi.org\/10.1109\/iotsms.2018.8554785","relation":{},"subject":[],"published":{"date-parts":[[2018,10]]}}}