{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,3]],"date-time":"2026-03-03T19:51:26Z","timestamp":1772567486005,"version":"3.50.1"},"reference-count":49,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010,10]]},"DOI":"10.1109\/iucs.2010.5666772","type":"proceedings-article","created":{"date-parts":[[2010,12,21]],"date-time":"2010-12-21T18:34:53Z","timestamp":1292956493000},"page":"40-46","source":"Crossref","is-referenced-by-count":84,"title":["Services in the Cloud Computing era: A survey"],"prefix":"10.1109","author":[{"given":"Minqi","family":"Zhou","sequence":"first","affiliation":[]},{"given":"Rong","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Dadan","family":"Zeng","sequence":"additional","affiliation":[]},{"given":"Weining","family":"Qian","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","article-title":"Media temple","author":"temple","year":"2008"},{"key":"ref38","article-title":"Multifactor authentication","author":"authentication","year":"2008"},{"key":"ref33","doi-asserted-by":"crossref","first-page":"249","DOI":"10.1007\/3-540-45067-X_22","article-title":"A taxonomy of single sign-on systems","author":"pashalidis","year":"2003","journal-title":"Lecture Notes in Computer Science"},{"key":"ref32","article-title":"Federated identity and software as a service (saas): Single sign-on to the cloud","author":"paper","year":"2008"},{"key":"ref31","article-title":"Engine yard security overview","author":"yard","year":"2008"},{"key":"ref30","article-title":"Engine yard","author":"yard","year":"2008"},{"key":"ref37","article-title":"Arcot systems","author":"systems","year":"2008"},{"key":"ref36","first-page":"3","article-title":"The ten-twenty electrode system of the International Federation","author":"jasper","year":"1983","journal-title":"Recommendations for the practice of clinical neurophysiology"},{"key":"ref35","article-title":"Myonelogin","year":"2008","journal-title":"MyOneLogin"},{"key":"ref34","article-title":"Tricipher","year":"2008","journal-title":"TriCipher"},{"key":"ref28","article-title":"At & t","year":"2008","journal-title":"AT & T"},{"key":"ref27","article-title":"Verizon bandwidth on demand service","year":"2008","journal-title":"Verizon"},{"key":"ref29","article-title":"Azure service platform","year":"2008","journal-title":"Microsoft"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/945449.945450"},{"key":"ref1","article-title":"Above the clouds: A Berkeley view of cloud computing","author":"armbrust","year":"2009","journal-title":"Tech Rep"},{"key":"ref20","article-title":"Sqs","year":"2008","journal-title":"Amazon"},{"key":"ref22","article-title":"Gogrid","year":"2008","journal-title":"GoGrid"},{"key":"ref21","article-title":"Mosso","year":"2008","journal-title":"MOSS"},{"key":"ref24","article-title":"Skytap","year":"2008","journal-title":"Skytap"},{"key":"ref23","article-title":"Term of service","year":"2008","journal-title":"GoGrid"},{"key":"ref26","article-title":"Toward systemically secure it architectures","author":"network","year":"2008"},{"key":"ref25","article-title":"Sun network","author":"network","year":"2008"},{"key":"ref10","article-title":"Saleforce crm","year":"2008","journal-title":"SaleForce"},{"key":"ref11","article-title":"Ec2","year":"2008","journal-title":"Amazon"},{"key":"ref40","article-title":"Hosting.com","author":"nine","year":"2008"},{"key":"ref12","article-title":"Elastic mapreduce","year":"2009","journal-title":"Amazon"},{"key":"ref13","article-title":"Auto scaling","year":"2009","journal-title":"Amazon"},{"key":"ref14","article-title":"S3","author":"aws","year":"2008"},{"key":"ref15","article-title":"Simpledb","year":"2008","journal-title":"Amazon"},{"key":"ref16","article-title":"Elastic block storage","year":"2009","journal-title":"Amazon"},{"key":"ref17","article-title":"Cloudfront","year":"2009","journal-title":"Amazon"},{"key":"ref18","article-title":"Virtual private cloud","year":"2009","journal-title":"Amazon"},{"key":"ref19","article-title":"Elastic load balancing","year":"2009","journal-title":"Amazon"},{"key":"ref4","article-title":"Amazon web services: Overview of security processes","year":"2008"},{"key":"ref3","first-page":"10","article-title":"MapReduce: simplified data processing on large clusters","author":"dean","year":"2004","journal-title":"Proceedings of the 6th conference on Symposium on Opearting Systems Design & Implementation-Volume 6 table of contents"},{"key":"ref6","article-title":"An overview of force.com security","year":"2008","journal-title":"SaleForce"},{"key":"ref5","article-title":"Appengine","year":"2008","journal-title":"Google"},{"key":"ref8","article-title":"Strikeiron","year":"2008","journal-title":"Strikeiron"},{"key":"ref7","article-title":"Datadirect technologies","author":"technologies","year":"2008"},{"key":"ref49","article-title":"Newservers","year":"2008","journal-title":"Newser"},{"key":"ref9","article-title":"Webex","year":"2008","journal-title":"Cisco"},{"key":"ref46","article-title":"3tera","year":"2008","journal-title":"3tera"},{"key":"ref45","article-title":"Flexiscale","year":"2008","journal-title":"Flexiscale"},{"key":"ref48","article-title":"Terremark enterprise cloud","author":"cloud","year":"2008"},{"key":"ref47","article-title":"Appnexus","year":"2008","journal-title":"AppNexus"},{"key":"ref42","article-title":"Gridlayer","year":"2008","journal-title":"GridLayer"},{"key":"ref41","article-title":"Hosting365","year":"2008","journal-title":"Hosting365"},{"key":"ref44","article-title":"Joyente","year":"2008","journal-title":"Joyent"},{"key":"ref43","article-title":"At & t synaptic hostingsm service security overview","year":"2008","journal-title":"AT & T"}],"event":{"name":"2010 4th International Universal Communication Symposium (IUCS)","location":"Beijing, China","start":{"date-parts":[[2010,10,18]]},"end":{"date-parts":[[2010,10,19]]}},"container-title":["2010 4th International Universal Communication Symposium"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5654670\/5666004\/05666772.pdf?arnumber=5666772","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,19]],"date-time":"2017-06-19T13:30:40Z","timestamp":1497879040000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5666772\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,10]]},"references-count":49,"URL":"https:\/\/doi.org\/10.1109\/iucs.2010.5666772","relation":{},"subject":[],"published":{"date-parts":[[2010,10]]}}}