{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T07:03:07Z","timestamp":1729666987540,"version":"3.28.0"},"reference-count":14,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,8]]},"DOI":"10.1109\/repa.2014.6894843","type":"proceedings-article","created":{"date-parts":[[2014,9,17]],"date-time":"2014-09-17T02:12:45Z","timestamp":1410919965000},"page":"43-46","source":"Crossref","is-referenced-by-count":4,"title":["Threat and countermeasure patterns for cloud computing"],"prefix":"10.1109","author":[{"given":"Takao","family":"Okubo","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Yoshiro","family":"Wataguchi","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Nobuyuki","family":"Kanaya","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"263","reference":[{"journal-title":"Security Patterns Integrating Security and Systems Engineering","year":"2006","author":"schumacher","key":"13"},{"key":"14","first-page":"397","article-title":"Security architectures for cloud computing","volume":"46","author":"okuhara","year":"2010","journal-title":"Fujits U Science Technology Journal"},{"year":"2014","author":"wasc","key":"11"},{"journal-title":"Security Patterns Repository Version 1 0","year":"2002","author":"kienzle","key":"12"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/BioMedCom.2012.29"},{"key":"2","article-title":"Two patterns for cloud computing: Secure virtual machine ima ge repository and cloud policy management point","author":"fernandez","year":"2013","journal-title":"Procs of 20th Conf on Pattern Languages of Programs (PLoP 2013)"},{"key":"1","article-title":"Patterns for cloud firewalls","author":"fernandez","year":"2014","journal-title":"Procs of AsianPLoP (Pattern Languages of Programs) 2014"},{"journal-title":"The Security Development Lifecycle","year":"2006","author":"howard","key":"10"},{"year":"2013","key":"7","first-page":"500"},{"year":"2014","author":"osa","key":"6"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1145\/2524629.2524644"},{"journal-title":"Security Engineering for Cloud Computing Approaches and Tools","year":"2012","author":"rosado","key":"4"},{"journal-title":"Threat Modeling","year":"2004","author":"swiderski","key":"9"},{"key":"8","doi-asserted-by":"crossref","DOI":"10.1145\/1943226.1943247","article-title":"Goal-oriented security threat mitigation patterns: A case of credit card theft mitigation","author":"supakkul","year":"2009","journal-title":"Plo P 09"}],"event":{"name":"2014 IEEE 4th International Workshop on Requirements Patterns (RePa)","start":{"date-parts":[[2014,8,26]]},"location":"Karlskrona, Sweden","end":{"date-parts":[[2014,8,26]]}},"container-title":["2014 IEEE 4th International Workshop on Requirements Patterns (RePa)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6887461\/6894833\/06894843.pdf?arnumber=6894843","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,7,16]],"date-time":"2023-07-16T16:07:31Z","timestamp":1689523651000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6894843\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,8]]},"references-count":14,"URL":"https:\/\/doi.org\/10.1109\/repa.2014.6894843","relation":{},"subject":[],"published":{"date-parts":[[2014,8]]}}}