{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,11]],"date-time":"2025-07-11T10:44:08Z","timestamp":1752230648017},"reference-count":33,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"4","license":[{"start":{"date-parts":[[2018,10,1]],"date-time":"2018-10-01T00:00:00Z","timestamp":1538352000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Cloud Comput."],"published-print":{"date-parts":[[2018,10,1]]},"DOI":"10.1109\/tcc.2016.2570752","type":"journal-article","created":{"date-parts":[[2016,5,20]],"date-time":"2016-05-20T05:33:30Z","timestamp":1463722410000},"page":"1149-1163","source":"Crossref","is-referenced-by-count":15,"title":["Securing Services in Networked Cloud Infrastructures"],"prefix":"10.1109","volume":"6","author":[{"given":"Vijay","family":"Varadharajan","sequence":"first","affiliation":[]},{"given":"Udaya","family":"Tupakula","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref33","article-title":"BotTrack: Tracking botnets using NetFlow\n and PageRank","author":"francois","year":"0","journal-title":"10th International IFIP TC 6 Conference on Networking"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-68768-1_1"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/2420950.2420969"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/2413176.2413217"},{"key":"ref10","doi-asserted-by":"crossref","first-page":"560","DOI":"10.1147\/JRD.2009.5429060","article-title":"Security for the cloud infrastructure: Trusted virtual\n data center implementation","volume":"53","author":"berger","year":"2009","journal-title":"IBM J Res Develop"},{"key":"ref11","article-title":"Towards automated provisioning of secure virtualised\n networks","author":"cabuk","year":"0","journal-title":"14th ACM Conf Computer and Communications Security"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-14597-1_10"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1002\/spe.2317"},{"key":"ref14","year":"1998","journal-title":"IEEE standards for local and metropolitan area networks Standard for Interoperable LAN\/MAN Security (SILS) IEEE Std 802 10-1998"},{"key":"ref15","author":"debar","year":"2007","journal-title":"The Intrusion Detection Message Exchange Format"},{"key":"ref16","article-title":"Design and implementation of a TCG-based integrity\n measurement architecture","author":"sailer","year":"0","journal-title":"Proc 13th Usenix Security Symp"},{"key":"ref17","article-title":"Techniques for trust enhanced distributed authorisation using\n trusted platforms","author":"krishna","year":"2010"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/1065907.1066038"},{"key":"ref19","article-title":"Consensus assessments initiative questionnaire","year":"2015"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2014.45"},{"key":"ref4","author":"balacheff","year":"2003","journal-title":"Trusted Computing Platforms TCPA Technology in Context"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.40"},{"key":"ref3","article-title":"Trusted virtual domains: Toward secure distributed\n services","author":"griffin","year":"0","journal-title":"Proc 1st IEEE Workshop Hot Topics in Syst Dependability"},{"key":"ref6","article-title":"A virtual machine introspection based architecture for intrusion detection","author":"garfinkel","year":"0","journal-title":"Proc Symp Network and Distributed System Security"},{"key":"ref29","article-title":"Peer to peer botnet detection based on flow intervals","author":"zhao","year":"0","journal-title":"IFIP Information Security and Privacy Conf"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/945461.945462"},{"key":"ref8","year":"2015"},{"key":"ref7","year":"0"},{"key":"ref2","article-title":"Trusted Virtual Domains: Secure Foundations for Business\n and IT Services","author":"bussani","year":"2005","journal-title":"RC23792"},{"key":"ref9","year":"2015"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.6028\/NIST.SP.800-145"},{"key":"ref20","article-title":"Security, Trust & Assurance Registry","year":"2015"},{"key":"ref22","article-title":"Securing local area and metropolitan area networks: A practical\n approach","author":"varadharajan","year":"0","journal-title":"Natl Information Systems Security Conf"},{"key":"ref21","author":"claise","year":"2013","journal-title":"Specification of the IP Flow Information Export (IPFIX) protocol for the exchange of flow information"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/MSECP.2003.1219056"},{"key":"ref23","author":"cooper","year":"2008","journal-title":"RFC 5280 - Internet X 509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile"},{"key":"ref26","article-title":"Tracking rootkit footprints with a practical memory analysis system","author":"cui","year":"0","journal-title":"Usenix Security Symp"},{"key":"ref25","first-page":"22","article-title":"Secure and robust monitoring of virtual machines through\n guest-assisted introspection","author":"carbone","year":"0","journal-title":"Research in Attacks, Intrusions, and Defenses"}],"container-title":["IEEE Transactions on Cloud Computing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6245519\/8558660\/07473937.pdf?arnumber=7473937","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,27]],"date-time":"2022-01-27T04:42:33Z","timestamp":1643258553000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/7473937\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,10,1]]},"references-count":33,"journal-issue":{"issue":"4"},"URL":"https:\/\/doi.org\/10.1109\/tcc.2016.2570752","relation":{},"ISSN":["2168-7161","2372-0018"],"issn-type":[{"value":"2168-7161","type":"electronic"},{"value":"2372-0018","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,10,1]]}}}