{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T22:08:50Z","timestamp":1729634930303,"version":"3.28.0"},"reference-count":28,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010,5]]},"DOI":"10.1109\/notere.2010.5536569","type":"proceedings-article","created":{"date-parts":[[2010,8,9]],"date-time":"2010-08-09T22:13:57Z","timestamp":1281392037000},"page":"333-338","source":"Crossref","is-referenced-by-count":5,"title":["A mechanism for policy-driven selection of service providers in SOA and cloud environments"],"prefix":"10.1109","author":[{"given":"Siani","family":"Pearson","sequence":"first","affiliation":[]},{"given":"Tomas","family":"Sander","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ICPADS.2008.60"},{"journal-title":"The Enterprise Privacy Authorization Language (EPAL) EPAL specification","year":"2004","key":"ref11"},{"journal-title":"Extensible Access Control Markup Language (XACML)","year":"0","key":"ref12"},{"journal-title":"Platform for Privacy Preferences","year":"2002","key":"ref13"},{"journal-title":"Web Privacy with P3P","year":"2002","author":"cranor","key":"ref14"},{"journal-title":"The Ponder policy specification language","year":"2001","author":"damianou","key":"ref15"},{"journal-title":"Privacy and identity management for europe","year":"2008","key":"ref16"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/1408664.1408674"},{"journal-title":"REALM project","year":"0","key":"ref18"},{"journal-title":"eContracts specification","year":"2007","key":"ref19"},{"year":"0","key":"ref28"},{"article-title":"Cloud Computing: Benefits, risks and recommendations for information security","year":"2009","author":"catteddu","key":"ref4"},{"key":"ref27","article-title":"A Data Assurance Policy Specification and Enforcement Framework for Outsourced Services","author":"li","year":"2009","journal-title":"HP Labs Research Report HPL-2009-357"},{"year":"2008","key":"ref3","article-title":"Assessing the Security Risks of Cloud Computing"},{"journal-title":"Drools","year":"0","key":"ref6"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/EDOCW.2009.5331996"},{"year":"0","key":"ref8"},{"journal-title":"Jericho Forum","article-title":"Cloud Cube Model: Selecting Cloud Formations for Secure Collaboration","year":"2009","key":"ref7"},{"year":"2009","key":"ref2","article-title":"Security Guidance for Critical Areas of Focus in Cloud Computing"},{"key":"ref9","article-title":"Time and cost trade-off management for scheduling parallel applications on Utility Grids","author":"garg","year":"2009","journal-title":"Future Generation Computer Systems"},{"key":"ref1","article-title":"Privacy in the Clouds: Risks to Privacy and Confidentiality from Cloud Computing","author":"gellman","year":"2009","journal-title":"World Privacy Forum (WPF) Report"},{"key":"ref20","doi-asserted-by":"crossref","first-page":"5","DOI":"10.1109\/TSE.2007.70746","article-title":"Analyzing Regulatory Rules for Privacy and Security Requirements","volume":"34","author":"travis","year":"2008","journal-title":"IEEE Transactions on Software Engineering"},{"journal-title":"Guidelines Governing the Protection of Privacy and Transborder Flow of Personal Data","year":"1980","key":"ref22"},{"key":"ref21","article-title":"The Value of Privacy Engineering","volume":"1","author":"kenny","year":"2002","journal-title":"Journal of Information Law and Technology (JILT)"},{"journal-title":"Artificial Intelligence - A Modern Approach","year":"2003","author":"russel","key":"ref24"},{"article-title":"Privacy Rules: A Steeple Chase for Systems Architects","year":"2007","author":"borking","key":"ref23"},{"journal-title":"Question-Generation in Constraint-Based Expert Systems","year":"0","author":"bowen","key":"ref26"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/FIE.2001.964056"}],"event":{"name":"2010 10th Annual International Conference on New Technologies of Distributed Systems (NOTERE)","start":{"date-parts":[[2010,5,31]]},"location":"Tozeur, Tunisia","end":{"date-parts":[[2010,6,2]]}},"container-title":["2010 10th Annual International Conference on New Technologies of Distributed Systems (NOTERE)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5520336\/5536542\/05536569.pdf?arnumber=5536569","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,19]],"date-time":"2017-06-19T12:19:55Z","timestamp":1497874795000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5536569\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,5]]},"references-count":28,"URL":"https:\/\/doi.org\/10.1109\/notere.2010.5536569","relation":{},"subject":[],"published":{"date-parts":[[2010,5]]}}}