{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T21:06:54Z","timestamp":1740172014330,"version":"3.37.3"},"reference-count":60,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"2","license":[{"start":{"date-parts":[[2023,4,1]],"date-time":"2023-04-01T00:00:00Z","timestamp":1680307200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2023,4,1]],"date-time":"2023-04-01T00:00:00Z","timestamp":1680307200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,4,1]],"date-time":"2023-04-01T00:00:00Z","timestamp":1680307200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001871","name":"Fundacao para a Ciencia e a Tecnologia","doi-asserted-by":"publisher","award":["UIDB\/50021\/2020"],"award-info":[{"award-number":["UIDB\/50021\/2020"]}],"id":[{"id":"10.13039\/501100001871","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Cloud Comput."],"published-print":{"date-parts":[[2023,4,1]]},"DOI":"10.1109\/tcc.2022.3178982","type":"journal-article","created":{"date-parts":[[2022,5,30]],"date-time":"2022-05-30T22:13:16Z","timestamp":1653948796000},"page":"2011-2027","source":"Crossref","is-referenced-by-count":3,"title":["MIRES: Intrusion Recovery for Applications Based on Backend-As-a-Service"],"prefix":"10.1109","volume":"11","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-5329-2401","authenticated-orcid":false,"given":"Diogo","family":"Vaz","sequence":"first","affiliation":[{"name":"INESC-ID, Instituto Superior T&#x00E9;cnico, Universidade de Lisboa, Lisboa, Portugal"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6834-705X","authenticated-orcid":false,"given":"David R.","family":"Matos","sequence":"additional","affiliation":[{"name":"INESC-ID, Instituto Superior T&#x00E9;cnico, Universidade de Lisboa, Lisboa, Portugal"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2872-7300","authenticated-orcid":false,"given":"Miguel L.","family":"Pardal","sequence":"additional","affiliation":[{"name":"INESC-ID, Instituto Superior T&#x00E9;cnico, Universidade de Lisboa, Lisboa, Portugal"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7873-5531","authenticated-orcid":false,"given":"Miguel","family":"Correia","sequence":"additional","affiliation":[{"name":"INESC-ID, Instituto Superior T&#x00E9;cnico, Universidade de Lisboa, Lisboa, Portugal"}]}],"member":"263","reference":[{"key":"ref13","first-page":"81","article-title":"Data recovery for web applications","author":"akku?","year":"0","journal-title":"Proc IEEE\/IFIP Int Conf Dependable Syst Netw"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1109\/UCC-Companion.2018.00054"},{"key":"ref12","first-page":"1","article-title":"Undo for operators: Building an undoable e-mail store","author":"brown","year":"0","journal-title":"Proc USENIX Annu Tech Conf"},{"article-title":"OWASP top 10-2017 rcl - the ten most critical web application security risks","year":"2017","author":"williams","key":"ref56"},{"key":"ref15","first-page":"1024","article-title":"Design, implementation, and evaluation of a repairable database management system","author":"chiueh","year":"0","journal-title":"Proc 21st IEEE Int l Conf Data Eng"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1023\/A:1008689312900"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/2043556.2043567"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1145\/359545.359563"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1145\/2490257.2490292"},{"key":"ref52","first-page":"45","article-title":"Adding generic process containers to the linux kernel","author":"menage","year":"0","journal-title":"Proc Linux Symp"},{"journal-title":"Database Systems The Complete Book","year":"2008","author":"garcia-molina","key":"ref11"},{"journal-title":"MongoDB The Definitive Guide","year":"2013","author":"chodorow","key":"ref55"},{"year":"2019","key":"ref10","article-title":"Vulnerabilities and threats in mobile applications 2019"},{"key":"ref54","first-page":"1","article-title":"A survey and comparison of relational and non-relational database","volume":"1","author":"jatana","year":"2012","journal-title":"Int J Eng Res Technol"},{"key":"ref17","first-page":"89","article-title":"Intrusion recovery using selective re-execution","author":"kim","year":"0","journal-title":"Proc 9th USENIX Symp Operating Syst Des Implementation"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/NCA.2016.7778616"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2015.72"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/3135974.3135978"},{"article-title":"Cloud programming simplified: A berkeley view on serverless computing","year":"2019","author":"jonas","key":"ref51"},{"key":"ref50","first-page":"502","article-title":"Serverless execution of scientific workflows: Experiments with hyperflow, AWS lambda and google cloud functions","author":"malawski","year":"2017","journal-title":"Future Gener Comput Syst"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1016\/0196-6774(90)90022-7"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1145\/214451.214456"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1145\/3448891.3448932"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1145\/197917.197973"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2021.3139472"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1145\/2517349.2522725"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1023\/B:JIIS.0000047394.02444.8d"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1145\/3274808.3274817"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1002\/qre.1927"},{"key":"ref8","article-title":"Overview of the backend-as-a-service (BaaS) space","author":"lane","year":"2013","journal-title":"API Evangelist"},{"key":"ref7","first-page":"59","article-title":"Mobile cloud computing","volume":"1","author":"ferreira","year":"2014","journal-title":"Open J Mob Comput Cloud Comput"},{"year":"2016","key":"ref9","article-title":"OWASP mobile top 10"},{"key":"ref4","first-page":"36","article-title":"Decentralized privacy-preserving proximity tracing","volume":"43","author":"troncoso","year":"2020","journal-title":"IEEE Data Eng Bull"},{"journal-title":"Mobile Applications Archite Design and Development","year":"2004","author":"lee","key":"ref3"},{"key":"ref6","article-title":"Grow your own backend-as-a-service (BaaS) platform","author":"carter","year":"0","journal-title":"Proc Conf College Inf Comput Technol"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/1721654.1721672"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1145\/1352592.1352603"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1145\/1095810.1095826"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/ACSAC.2009.52"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/FITS.2003.1264933"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1145\/319151.319159"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2002.1033782"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2004.1311910"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/NOMS.2008.4575125"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/1165389.945467"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2010.155"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/1042091.1042095"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/ACSAC.2006.16"},{"key":"ref38","first-page":"217","article-title":"Design, implementation, and evaluation of repairable file service","author":"zhu","year":"0","journal-title":"Proc Int Conf Dependable Syst Netw"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1002\/sec.1224"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/2594291.2594299"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4842-2943-9"},{"key":"ref25","first-page":"1","article-title":"DroidPosture: A trusted posture assessment service for mobile devices","author":"yalew","year":"0","journal-title":"Proc 13th IEEE Int Conf Wireless Mobile Comput Netw Commun"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2004.2"},{"key":"ref22","first-page":"131","article-title":"Flexible and fine-grained mandatory access control on android for diverse security and privacy policies","author":"bugiel","year":"0","journal-title":"Proc 22nd USENIX Secur Symp"},{"key":"ref21","first-page":"639","article-title":"These aren&#x2019;t the droids you&#x2019;re looking for: Retrofitting android to protect data from imperious applications","author":"hornyack","year":"0","journal-title":"Proc 18th ACM Conf Comput Commun Secur"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/SESS.2007.12"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-15497-3_5"},{"article-title":"A formal approach to recovery by compensating transactions","year":"1990","author":"korth","key":"ref29"},{"year":"2020","key":"ref60","article-title":"Q4 2019 store intelligence data digest"}],"container-title":["IEEE Transactions on Cloud Computing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6245519\/10144930\/09785708.pdf?arnumber=9785708","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,6,26]],"date-time":"2023-06-26T18:46:06Z","timestamp":1687805166000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9785708\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,4,1]]},"references-count":60,"journal-issue":{"issue":"2"},"URL":"https:\/\/doi.org\/10.1109\/tcc.2022.3178982","relation":{},"ISSN":["2168-7161","2372-0018"],"issn-type":[{"type":"electronic","value":"2168-7161"},{"type":"electronic","value":"2372-0018"}],"subject":[],"published":{"date-parts":[[2023,4,1]]}}}