{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T02:05:26Z","timestamp":1725415526849},"reference-count":14,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,5]]},"DOI":"10.1109\/mipro.2014.6859824","type":"proceedings-article","created":{"date-parts":[[2014,7,30]],"date-time":"2014-07-30T12:19:16Z","timestamp":1406722756000},"page":"1617-1621","source":"Crossref","is-referenced-by-count":0,"title":["Cloud dilemma"],"prefix":"10.1109","author":[{"given":"A. B. Robert","family":"Petrunic","sequence":"first","affiliation":[]},{"given":"C. Igor","family":"Orovic","sequence":"additional","affiliation":[]},{"given":"i D.E. Vjeran","family":"Buselic","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Law on Lottery","year":"2009","key":"13"},{"journal-title":"The Notorious Nine Cloud Computing Top Threats in","year":"2013","key":"14"},{"journal-title":"Electronic Signature Law","year":"2002","key":"11"},{"journal-title":"Regulation on Information Security Measures","year":"2008","key":"12"},{"key":"3","article-title":"Cloudy on the Client side","author":"petrunic","year":"2011","journal-title":"Windays 2011"},{"journal-title":"The NIST Definition of Cloud Computing","year":"2011","key":"2"},{"key":"1","article-title":"The cloud imperative","author":"garfinkel","year":"2011","journal-title":"Technology Review (MIT)"},{"journal-title":"Data Secrecy Law","year":"2007","key":"10"},{"journal-title":"Guidelines for Adequately Managing Outsourcing Related Risks","year":"2005","key":"7"},{"journal-title":"Guidelines for IS Management in Order to Lower the Operational Risk","year":"2014","key":"6"},{"journal-title":"US Department of Justice","year":"2014","key":"5"},{"key":"4","article-title":"Cloud v2.0","author":"petrunic","year":"2011","journal-title":"Windays 2012"},{"journal-title":"Information Security Law","year":"2007","key":"9"},{"journal-title":"Private Data Protection Law","year":"2003","key":"8"}],"event":{"name":"2014 37th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO)","start":{"date-parts":[[2014,5,26]]},"location":"Opatija, Croatia","end":{"date-parts":[[2014,5,30]]}},"container-title":["2014 37th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6849597\/6859515\/06859824.pdf?arnumber=6859824","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,23]],"date-time":"2017-03-23T11:55:30Z","timestamp":1490270130000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6859824\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,5]]},"references-count":14,"URL":"https:\/\/doi.org\/10.1109\/mipro.2014.6859824","relation":{},"subject":[],"published":{"date-parts":[[2014,5]]}}}