{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,23]],"date-time":"2025-11-23T15:24:50Z","timestamp":1763911490134},"reference-count":26,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,10]]},"DOI":"10.1109\/lcnw.2015.7365920","type":"proceedings-article","created":{"date-parts":[[2015,12,28]],"date-time":"2015-12-28T16:30:27Z","timestamp":1451320227000},"page":"722-729","source":"Crossref","is-referenced-by-count":17,"title":["Secure access control for multi-cloud resources"],"prefix":"10.1109","author":[{"given":"Hendrik","family":"Graupner","sequence":"first","affiliation":[]},{"given":"Kennedy","family":"Torkura","sequence":"additional","affiliation":[]},{"given":"Philipp","family":"Berger","sequence":"additional","affiliation":[]},{"given":"Christoph","family":"Meinel","sequence":"additional","affiliation":[]},{"given":"Maxim","family":"Schnjakin","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","article-title":"Above the Clouds: A Berkeley View of Cloud Computing","author":"armbrust","year":"2009","journal-title":"Tech Rep UCBIEECS-2009-28"},{"key":"ref11","article-title":"Creating a &#x2018;Cloud Storage&#x2019; Mashup for High Performance, Low Cost Content Delivery","author":"broberg","year":"2009","journal-title":"Service-Oriented Computing (Volume 5472) ICSOC'08 Workshops"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/1807128.1807165"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2013.167"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/1966445.1966449"},{"article-title":"Cloud security standards:what to expect & what to negotiate","year":"2013","author":"council","key":"ref15"},{"key":"ref16","first-page":"166","article-title":"Towards a Cross Platform Cloud API &#x2013; Components for Cloud Federation","author":"petcu","year":"2011","journal-title":"CLOSER"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/NBiS.2013.23"},{"journal-title":"Google whitepaper","article-title":"Google Cloud Storage &#x2013; A simple way to store, protect, and share data","year":"2012","key":"ref18"},{"journal-title":"Google Cloud Storage Access Control","year":"2014","author":"mehner","key":"ref19"},{"article-title":"Factors that affect the adoption of cloud computing for an enterprise: A case study of cloud adoption within intel corporation","year":"2013","author":"mcgeogh","key":"ref4"},{"journal-title":"The Washington Post (2013) NSA infiltrates links to Yahoo Google data centers worldwide Snowden documents say","year":"2014","key":"ref3"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2012.153"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/1855118.1855137"},{"journal-title":"CSA SecaaS Implementation Guidance Category 1 &#x2013; Identity and Access Management Cloud Security Alliance","year":"2012","key":"ref8"},{"key":"ref7","first-page":"510","article-title":"Critical evaluation on jclouds and cloudify abstract apis against ec 2, azure and hp-cloud","author":"graham","year":"2014","journal-title":"COMPSAC Workshops"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/2664168.2664176"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/CSE.2013.20"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/s13174-010-0007-6"},{"journal-title":"Developing Cloud Applications with Windows Azure Storage","year":"2013","author":"mehner","key":"ref20"},{"journal-title":"Introduction to Managing Access Permissions to Your Amazon S3 Resources","year":"2014","author":"mehner","key":"ref22"},{"journal-title":"Amazon Amazon Simple Storage Service &#x2013; Developer Guide","year":"2006","key":"ref21"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/s10723-013-9283-2"},{"journal-title":"OpenStack OpenStack Object Storage Administrator Guide","year":"2014","key":"ref23"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/CloudCom.2011.116"},{"journal-title":"The Oauth 2 0 Authorization Framework","year":"2014","key":"ref25"}],"event":{"name":"2015 IEEE 40th Local Computer Networks Conference Workshops (LCN Workshops)","start":{"date-parts":[[2015,10,26]]},"location":"Clearwater Beach, FL","end":{"date-parts":[[2015,10,29]]}},"container-title":["2015 IEEE 40th Local Computer Networks Conference Workshops (LCN Workshops)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7360341\/7365758\/07365920.pdf?arnumber=7365920","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,24]],"date-time":"2017-03-24T20:42:39Z","timestamp":1490388159000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7365920\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,10]]},"references-count":26,"URL":"https:\/\/doi.org\/10.1109\/lcnw.2015.7365920","relation":{},"subject":[],"published":{"date-parts":[[2015,10]]}}}