{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T00:34:31Z","timestamp":1725410071682},"reference-count":24,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011,11]]},"DOI":"10.1109\/milcis.2011.6470391","type":"proceedings-article","created":{"date-parts":[[2013,3,2]],"date-time":"2013-03-02T07:39:17Z","timestamp":1362209957000},"page":"1-7","source":"Crossref","is-referenced-by-count":0,"title":["Reference Security Management Architecture - Guiding governmental and military Inter-Cloud initiatives"],"prefix":"10.1109","author":[{"given":"Michael","family":"Kretzschmar","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Marcus","family":"Knuepfer","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"263","reference":[{"journal-title":"\"Cloud Computing Use Cases \/ National Institute of Standards and Technology Information Technology Laboratory \" Online","year":"2010","author":"badger","key":"19"},{"journal-title":"Cloud Computing - Benefits Risks and Recommendations for Information Security","year":"2009","author":"catteddu","key":"22"},{"journal-title":"\"Architecture for Managing Clouds - A White Paper from the Open Cloud Standards Incubator \" Online","year":"2010","key":"17"},{"journal-title":"\"Interpoperable Clouds - A White Paper from the Open Cloud Standards Incubator \" Online","year":"2009","key":"23"},{"journal-title":"Anwendungsfallgetriebene Anforderungsanalyse fu?r Das Sicherheitsmanagement Eines Anbietersin der Inter-Cloud und Identifikation Von Sicherheitsmanagement-Funktionen","year":"2011","author":"grebe","key":"18"},{"key":"24","article-title":"Security Management Infrastructure challenges in Collaborative Clouds - Status Quo, gaps and Cloud Security Management Model","author":"kretzschmar","year":"0","journal-title":"MilCis 2010 Conference Paper"},{"key":"15","article-title":"Reaching the Clouds Won't Be a One-Stop Trip","author":"strassmann","year":"2011","journal-title":"SIGNAL Magazine Online"},{"journal-title":"\"Introduction to Global Inter-Cloud Technology Forum (GICTF) and Its Roadmaps \" Online","year":"2010","author":"sakai","key":"16"},{"journal-title":"\"Cloud Computing Use Cases \" Online","year":"2011","key":"13"},{"journal-title":"\"Cloud Computing in a Military Context - Beyond the Hype \" Online","year":"2009","author":"greenfield","key":"14"},{"journal-title":"Collaboration in the Cloud and Challenges to Cyber Defence","year":"2010","key":"11"},{"journal-title":"State of Public Sector Cloud Computing Report","year":"2010","author":"kundra","key":"12"},{"journal-title":"Cloudscape III Cloud Computing and Interoperability Use-cases","year":"2011","author":"brown","key":"21"},{"journal-title":"Concept of a NATO Security Management Infrastructure","year":"2008","key":"3"},{"journal-title":"Cloud Computing Business Scenario Workshop \/ the Open Group","year":"2009","author":"blevins","key":"20"},{"journal-title":"Global Inter-Cloud Technology Forum 2010","article-title":"Use cases and functional requirements for inter-cloud computing","year":"2010","key":"2"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/CLOUD.2010.23"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-10665-1_6"},{"journal-title":"Security Architecture for Open Systems Inter- connection for CCITT Applications","year":"1991","key":"7"},{"journal-title":"ITIL","article-title":"Glossary of Terms, Definitions and Acronyms","year":"2007","key":"6"},{"journal-title":"Information Security Management Systems","year":"2009","key":"5"},{"journal-title":"Enterprise Security Management A Context Overview","year":"2009","key":"4"},{"journal-title":"\"NATO Embraces Cloud Computing \" Online","year":"2011","author":"schultz","key":"9"},{"journal-title":"EDA Cloud Computing Workshop","article-title":"Cloud Computing at the Tactical (Battlefield) and Emergency Response Levels - From a European Perspective","year":"2010","key":"8"}],"event":{"name":"2011 Military Communications and Information Systems Conference (MilCIS)","start":{"date-parts":[[2011,11,8]]},"location":"Canberra, Australia","end":{"date-parts":[[2011,11,10]]}},"container-title":["2011 Military Communications and Information Systems Conference"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6461167\/6470383\/06470391.pdf?arnumber=6470391","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,22]],"date-time":"2017-03-22T22:00:36Z","timestamp":1490220036000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6470391\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,11]]},"references-count":24,"URL":"https:\/\/doi.org\/10.1109\/milcis.2011.6470391","relation":{},"subject":[],"published":{"date-parts":[[2011,11]]}}}