{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T17:30:46Z","timestamp":1729618246906,"version":"3.28.0"},"reference-count":28,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011,11]]},"DOI":"10.1109\/milcom.2011.6127588","type":"proceedings-article","created":{"date-parts":[[2012,3,1]],"date-time":"2012-03-01T16:34:31Z","timestamp":1330619671000},"page":"1888-1893","source":"Crossref","is-referenced-by-count":2,"title":["A case for DoD application of public cloud computing services"],"prefix":"10.1109","author":[{"given":"Kris E","family":"Barcomb","sequence":"first","affiliation":[]},{"given":"Jeffrey W","family":"Humphries","sequence":"additional","affiliation":[]},{"given":"Robert F","family":"Mills","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Through 2014 Public IT Cloud Services Will Grow at More Than Five Times the Rate of","year":"2010","key":"19"},{"journal-title":"Secure Applications to Meet the Needs of Government","year":"2011","key":"17"},{"journal-title":"Federal Risk and Authorization Management Program (FedRAMP)","year":"2011","key":"18"},{"journal-title":"DoD Instruction 8500 2 Information Assurance Implememtation","year":"2003","key":"15"},{"journal-title":"AWS Receives ISO 27001 Certification","year":"2010","key":"16"},{"journal-title":"SP 800-53 Rev 3 2010 Information Security","year":"2009","key":"13"},{"journal-title":"DoD Directive 8500 01E Information Assurance","year":"2007","key":"14"},{"journal-title":"FIPS Publication 200","year":"2006","key":"11"},{"journal-title":"FIPS Publication 199","year":"2004","key":"12"},{"journal-title":"Securing Microsoft's Cloud Infrastructure","year":"2009","key":"21"},{"journal-title":"Amazon Web Services Overview of Security Processes","year":"2010","key":"20"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1145\/1629575.1629606"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1145\/945461.945464"},{"key":"24","article-title":"Towards Trusted Cloud Computing","author":"santos","year":"2009","journal-title":"HotCloud"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1145\/1655008.1655022"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1016\/j.giq.2010.01.002"},{"key":"27","doi-asserted-by":"publisher","DOI":"10.1109\/SCC.2009.84"},{"key":"28","first-page":"2","author":"kundra","year":"2011","journal-title":"Federal Cloud Computing Strategy"},{"journal-title":"The NIST Definition of Cloud Computing","year":"2009","author":"mell","key":"3"},{"journal-title":"Is the Cloud Reliable Enough for Your Business?","year":"2009","author":"waxer","key":"2"},{"journal-title":"The Case Against Cloud Computing","year":"2009","author":"golden","key":"10"},{"journal-title":"The Big Switch Rewiring the World from Edison to Google","year":"2009","author":"carr","key":"1"},{"key":"7","doi-asserted-by":"crossref","first-page":"61","DOI":"10.1109\/MSP.2009.87","article-title":"Data Security in the World of Cloud Computing","volume":"7","author":"harauz","year":"2009","journal-title":"IEEE Security & Privacy Magazine"},{"journal-title":"Memorandum for Chief Information Officers Update on the Federal Data Center Consolidation Initiative","year":"2010","author":"kundra","key":"6"},{"journal-title":"Jeff Bezos Talks about Animoto at Startup School","year":"2008","author":"bezos","key":"5"},{"journal-title":"Virtualization for Dummies Sun and AMD Special Edition","year":"2008","author":"golden","key":"4"},{"journal-title":"Moving to the Cloud An Introduction to Cloud Computing in Government","year":"2009","author":"wyld","key":"9"},{"journal-title":"New IDC IT Cloud Services Survey Top Benefits and Challenges","year":"2009","key":"8"}],"event":{"name":"MILCOM 2011 - 2011 IEEE Military Communications Conference","start":{"date-parts":[[2011,11,7]]},"location":"Baltimore, MD, USA","end":{"date-parts":[[2011,11,10]]}},"container-title":["2011 - MILCOM 2011 Military Communications Conference"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6111660\/6127424\/06127588.pdf?arnumber=6127588","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,20]],"date-time":"2017-06-20T15:03:47Z","timestamp":1497971027000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6127588\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,11]]},"references-count":28,"URL":"https:\/\/doi.org\/10.1109\/milcom.2011.6127588","relation":{},"subject":[],"published":{"date-parts":[[2011,11]]}}}