{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,21]],"date-time":"2025-05-21T06:32:02Z","timestamp":1747809122422,"version":"3.28.0"},"reference-count":29,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,6]]},"DOI":"10.1109\/sncc.2014.6866505","type":"proceedings-article","created":{"date-parts":[[2014,7,30]],"date-time":"2014-07-30T17:18:09Z","timestamp":1406740689000},"page":"1-6","source":"Crossref","is-referenced-by-count":11,"title":["Security problems in cloud infrastructure"],"prefix":"10.1109","author":[{"given":"Amir","family":"Djenna","sequence":"first","affiliation":[]},{"given":"Mohamed","family":"Batouche","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"crossref","DOI":"10.1145\/1721654.1721672","article-title":"A view of cloud computing","author":"armbrust","year":"2010","journal-title":"ACM communication"},{"journal-title":"A Deep Understanding of Cloud Computing Security","year":"2012","author":"hongjiao","key":"17"},{"journal-title":"Virtualization Security for Cloud Computing Service","year":"2011","author":"shengmei","key":"18"},{"journal-title":"Cloud Computing Automating the Virtualized Data Center","year":"2012","author":"venkata","key":"15"},{"journal-title":"Analysis and Research about Cloud Computing Security Protect Policy","year":"2011","author":"haoyong","key":"16"},{"journal-title":"Top Threats to Cloud Computing","year":"2010","author":"archer","key":"13"},{"key":"14","article-title":"Virtualization: A survey on concepts","author":"sahoo","year":"2010","journal-title":"Taxonomy and Associated Security Issues"},{"journal-title":"New IT Cloud Services Survey 2009 Top Benefits and Challenges","year":"0","key":"11"},{"journal-title":"Security in Multi-tenancy Cloud","year":"2010","author":"amarnath","key":"12"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2009.20"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-30867-3_42"},{"year":"0","key":"22"},{"year":"0","key":"23"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-38586-5"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1109\/SERVICES.2011.20"},{"year":"0","key":"26"},{"year":"0","key":"27"},{"key":"28","doi-asserted-by":"publisher","DOI":"10.1504\/IJCNDS.2012.044323"},{"key":"29","article-title":"A survey on Security threats for Cloud Computing","volume":"1","author":"kilari","year":"2012","journal-title":"International Journal of Engineering Research & Technology (IJERT)"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1145\/1655008.1655022"},{"journal-title":"Monitoring Intrusions and Security Breaches in Highly Distributed Cloud Environment","year":"2010","author":"monfared","key":"2"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSACW.2010.74"},{"key":"1","article-title":"Cloud computing-issues, research and implementation","volume":"16","author":"mladen","year":"2008","journal-title":"Journal of Computing and Information Technology - CIT"},{"year":"0","key":"7"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2010.173"},{"key":"5","article-title":"Cloud computing seen as next wave for technology investors","author":"hamilton","year":"2008","journal-title":"Repport"},{"journal-title":"Security Best Practices for Cloud Computing","year":"2009","key":"4"},{"journal-title":"3 Major Barriers to Cloud Computing","year":"2009","author":"ness","key":"9"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/CLOUD.2009.60"}],"event":{"name":"2014 International Symposium on Networks, Computers and Communications (ISNCC)","start":{"date-parts":[[2014,6,17]]},"location":"Hammamet, Tunisia","end":{"date-parts":[[2014,6,19]]}},"container-title":["The 2014 International Symposium on Networks, Computers and Communications"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6861313\/6866503\/06866505.pdf?arnumber=6866505","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,22]],"date-time":"2017-06-22T13:37:22Z","timestamp":1498138642000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6866505\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,6]]},"references-count":29,"URL":"https:\/\/doi.org\/10.1109\/sncc.2014.6866505","relation":{},"subject":[],"published":{"date-parts":[[2014,6]]}}}