{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,3]],"date-time":"2024-09-03T21:26:04Z","timestamp":1725398764613},"reference-count":23,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,5]]},"DOI":"10.1109\/mipro.2014.6859781","type":"proceedings-article","created":{"date-parts":[[2014,7,30]],"date-time":"2014-07-30T16:19:16Z","timestamp":1406737156000},"page":"1372-1375","source":"Crossref","is-referenced-by-count":1,"title":["Security assessment of Eucalyptus' web management interface"],"prefix":"10.1109","author":[{"given":"Aleksandar","family":"Donevski","sequence":"first","affiliation":[]},{"given":"Sasko","family":"Ristov","sequence":"additional","affiliation":[]},{"given":"Marjan","family":"Gusev","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","first-page":"81","article-title":"Live deduplication storage of virtual machine images in an open-source cloud","author":"ng","year":"2011","journal-title":"Proceedings of the ACM\/IFIP\/USENIX 11th International Conference on Middleware ser Middleware '10"},{"journal-title":"Acunetix Web Vulnerability Scanner","year":"2012","key":"22"},{"key":"17","first-page":"1375","article-title":"Security assessment of virtual machines in open source clouds","author":"donevski","year":"2013","journal-title":"MIPRO 2013 Proceedings of the 35th International Convention IEEE Conference Publications"},{"journal-title":"Acunetix Web Vulnerability Scanner Manual","year":"2013","author":"nurmi","key":"23"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1109\/CloudCom.2012.6427581"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1145\/2490257.2490285"},{"key":"16","first-page":"101","article-title":"Openstack cloud security vulnerabilities from inside and outside","author":"ristov","year":"2013","journal-title":"Proceedings of the 4th International Conference on Cloud Computing GRIDs and Virtualization (CLOUD COMPUTING 2013)"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.5121\/ijnsa.2012.4206"},{"journal-title":"Information Security Management Systems-Requirements","year":"2012","key":"14"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/SERVICES.2010.118"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2011.245"},{"journal-title":"Amazon Elastic Block Store","year":"2012","key":"21"},{"journal-title":"OpenNebula Cloud Software","year":"2012","key":"3"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1109\/CCGRID.2009.93"},{"journal-title":"Eucalyptus Cloud","year":"2013","key":"2"},{"journal-title":"OpenStack Cloud Software","year":"2012","key":"1"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2010.115"},{"key":"7","doi-asserted-by":"crossref","first-page":"417","DOI":"10.1109\/CloudCom.2010.42","article-title":"A comparison and critique of Eucalyptus, openNebula and Nimbus","author":"sempolinski","year":"2010","journal-title":"Cloud Computing Technology and Science (CloudCom) 2010 IEEE Second International Conference on"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/GCC.2010.77"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/CloudCom.2011.84"},{"journal-title":"Cloudstack Opens Source Cloud Computing","year":"2012","key":"4"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/NCCA.2011.28"},{"key":"8","first-page":"137","article-title":"Criteria for evaluation of open source cloud computing solutions","author":"voras","year":"2011","journal-title":"Proceedings of the ITI 2011 33rd International Conference on Information Technology Interfaces ITI"}],"event":{"name":"2014 37th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO)","start":{"date-parts":[[2014,5,26]]},"location":"Opatija, Croatia","end":{"date-parts":[[2014,5,30]]}},"container-title":["2014 37th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6849597\/6859515\/06859781.pdf?arnumber=6859781","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,22]],"date-time":"2017-06-22T17:35:49Z","timestamp":1498152949000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6859781\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,5]]},"references-count":23,"URL":"https:\/\/doi.org\/10.1109\/mipro.2014.6859781","relation":{},"subject":[],"published":{"date-parts":[[2014,5]]}}}