{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,22]],"date-time":"2025-03-22T11:44:22Z","timestamp":1742643862349},"reference-count":27,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,12,13]],"date-time":"2021-12-13T00:00:00Z","timestamp":1639353600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,12,13]],"date-time":"2021-12-13T00:00:00Z","timestamp":1639353600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,12,13]],"date-time":"2021-12-13T00:00:00Z","timestamp":1639353600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,12,13]]},"DOI":"10.1109\/pst52912.2021.9647766","type":"proceedings-article","created":{"date-parts":[[2021,12,21]],"date-time":"2021-12-21T16:08:01Z","timestamp":1640102881000},"page":"1-7","source":"Crossref","is-referenced-by-count":1,"title":["Secure Allocation for Graph-Based Virtual Machines in Cloud Environments"],"prefix":"10.1109","author":[{"given":"Mansour","family":"Aldawood","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Arshad","family":"Jhumka","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/CLOUD.2017.95"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/CyberC.2013.28"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom.2016.0236"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom.2016.0123"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2019.05.005"},{"key":"ref15","article-title":"A novel scheduling framework leveraging hardware cache partitioning for cache-side-channel elimination in clouds","author":"sprabery","year":"2017","journal-title":"arXiv preprint arXiv 1708 09721"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/Trustcom\/BigDataSE\/ICESS.2017.270"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/2996429.2996435"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-30436-1_32"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/Trustcom\/BigDataSE\/ICESS.2017.257"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.5220\/0010459202480259"},{"article-title":"Side channels in the cloud: Isolation challenges, attacks, and countermeasures","year":"2017","author":"bazm","key":"ref3"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2015.2429132"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/SOCA.2017.12"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2019.102507"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-61176-1_15"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/WETICE49692.2020.00021"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2011.103"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/1723028.1723041"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/2752952.2752964"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.3233\/JCS-171104"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/1592568.1592576"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TC.1985.6312192"},{"key":"ref24","first-page":"205","article-title":"Serverless in the wild: Characterizing and optimizing the serverless workload at a large cloud provider","author":"shahrad","year":"2020","journal-title":"2020 USENIX Annual Technical Conference ( USENIX ATC 20)"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/UCC.2011.24"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/2664168.2664179"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/CAIS.2019.8769534"}],"event":{"name":"2021 18th International Conference on Privacy, Security and Trust (PST)","start":{"date-parts":[[2021,12,13]]},"location":"Auckland, New Zealand","end":{"date-parts":[[2021,12,15]]}},"container-title":["2021 18th International Conference on Privacy, Security and Trust (PST)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9647713\/9647738\/09647766.pdf?arnumber=9647766","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T12:59:51Z","timestamp":1652187591000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9647766\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,12,13]]},"references-count":27,"URL":"https:\/\/doi.org\/10.1109\/pst52912.2021.9647766","relation":{},"subject":[],"published":{"date-parts":[[2021,12,13]]}}}