{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,13]],"date-time":"2026-03-13T13:34:29Z","timestamp":1773408869318,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":40,"publisher":"ACM","license":[{"start":{"date-parts":[[2010,6,11]],"date-time":"2010-06-11T00:00:00Z","timestamp":1276214400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2010,6,11]]},"DOI":"10.1145\/1809842.1809872","type":"proceedings-article","created":{"date-parts":[[2010,6,11]],"date-time":"2010-06-11T18:52:58Z","timestamp":1276282378000},"page":"183-192","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":30,"title":["Data protection models for service provisioning in the cloud"],"prefix":"10.1145","author":[{"given":"Dan","family":"Lin","sequence":"first","affiliation":[{"name":"Missouri University of Science and Technology, Rolla, MO, USA"}]},{"given":"Anna","family":"Squicciarini","sequence":"additional","affiliation":[{"name":"The Pennsylvania State University, University Park, PA, USA"}]}],"member":"320","published-online":{"date-parts":[[2010,6,11]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"OASIS Standard","author":"Extensible","year":"2005","unstructured":"Extensible access control markup language (XACML) version 2.0 . OASIS Standard , 2005 . Extensible access control markup language (XACML) version 2.0. OASIS Standard, 2005."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/POLICY.2005.25"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/775412.775438"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/1315245.1315318"},{"key":"e_1_3_2_1_5_1","unstructured":"Microsoft Azure Platform. http:\/\/www.microsoft.com\/windowsazure\/?wt.srch=1.  Microsoft Azure Platform. http:\/\/www.microsoft.com\/windowsazure\/?wt.srch=1."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30108-0_3"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/967900.967983"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/504909.504910"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1314436.1314439"},{"key":"e_1_3_2_1_10_1","first-page":"1","article-title":"Privacy in the clouds","author":"Cavoukian A.","year":"2008","unstructured":"A. Cavoukian . Privacy in the clouds . Identity in the Information Society , 1 , 2008 . A. Cavoukian. Privacy in the clouds. Identity in the Information Society, 1, 2008.","journal-title":"Identity in the Information Society"},{"key":"e_1_3_2_1_11_1","unstructured":"RightScale Cloud Computing. Delivered. http:\/\/www.rightscale.com\/.  RightScale Cloud Computing. Delivered. http:\/\/www.rightscale.com\/."},{"key":"e_1_3_2_1_12_1","unstructured":"Google Application Engine. http:\/\/code.google.com\/appengine\/.  Google Application Engine. http:\/\/code.google.com\/appengine\/."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1062455.1062502"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1008647823331"},{"key":"e_1_3_2_1_15_1","volume-title":"World Privacy Forum","author":"Gellman R.","year":"2009","unstructured":"R. Gellman . Privacy in the clouds: Risks to privacy and confidentiality from cloud computing . World Privacy Forum , 2009 . R. Gellman. Privacy in the clouds: Risks to privacy and confidentiality from cloud computing. World Privacy Forum, 2009."},{"key":"e_1_3_2_1_16_1","volume-title":"Cloud computing and information policy: Computing in a policy cloud? Journal of Information Technology and politics, 5(3)","author":"Jaeger P. T.","year":"2009","unstructured":"P. T. Jaeger , J. Lin , and J. M. Grimes . Cloud computing and information policy: Computing in a policy cloud? Journal of Information Technology and politics, 5(3) , 2009 . P. T. Jaeger, J. Lin, and J. M. Grimes. Cloud computing and information policy: Computing in a policy cloud? Journal of Information Technology and politics, 5(3), 2009."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/1069774.1069790"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/SCC.2009.84"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2009.87"},{"key":"e_1_3_2_1_20_1","first-page":"29","volume-title":"USENIX Annual Technical Conference, General Track","author":"Lillibridge M.","year":"2003","unstructured":"M. Lillibridge , S. Elnikety , A. Birrell , M. Burrows , and M. Isard . A cooperative internet backup scheme . In USENIX Annual Technical Conference, General Track , pages 29 -- 41 , 2003 . M. Lillibridge, S. Elnikety, A. Birrell, M. Burrows, and M. Isard. A cooperative internet backup scheme. In USENIX Annual Technical Conference, General Track, pages 29--41, 2003."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/1266840.1266842"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/32.824414"},{"key":"e_1_3_2_1_23_1","volume-title":"Cloud Security and Privacy: An Enterprise Perspective on Risks and Compliance (Theory in Practice). O'Reilly","author":"Mather T.","year":"2009","unstructured":"T. Mather , S. Kumaraswamy , and S. Latif . Cloud Security and Privacy: An Enterprise Perspective on Risks and Compliance (Theory in Practice). O'Reilly , 2009 . T. Mather, S. Kumaraswamy, and S. Latif. Cloud Security and Privacy: An Enterprise Perspective on Risks and Compliance (Theory in Practice). O'Reilly, 2009."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/1133058.1133089"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-39650-5_9"},{"key":"e_1_3_2_1_26_1","volume-title":"Clash of the clouds. The economist","author":"Computing Cloud","year":"2009","unstructured":"Cloud Computing : Clash of the clouds. The economist . 2009 . Cloud Computing: Clash of the clouds. The economist. 2009."},{"key":"e_1_3_2_1_27_1","volume-title":"International Conference on Cloud Computing. http:\/\/thecloudcomputing.org\/2009\/2\/.","author":"IEEE","unstructured":"IEEE International Conference on Cloud Computing. http:\/\/thecloudcomputing.org\/2009\/2\/. IEEE International Conference on Cloud Computing. http:\/\/thecloudcomputing.org\/2009\/2\/."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-10665-1_12"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-10665-1_9"},{"key":"e_1_3_2_1_30_1","unstructured":"Proofpoint. http:\/\/www.proofpoint.com\/.  Proofpoint. http:\/\/www.proofpoint.com\/."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/1542207.1542218"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/NCM.2009.218"},{"key":"e_1_3_2_1_34_1","unstructured":"Salesforce. http:\/\/www.salesforce.com\/.  Salesforce. http:\/\/www.salesforce.com\/."},{"key":"e_1_3_2_1_35_1","unstructured":"J. Salmon. Louded in uncertainty - The legal pitfalls of cloud computing. Sept 2008.  J. Salmon. Louded in uncertainty - The legal pitfalls of cloud computing. Sept 2008."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2006.80"},{"key":"e_1_3_2_1_37_1","unstructured":"Amazon Web Services. http:\/\/aws.amazon.com\/.  Amazon Web Services. http:\/\/aws.amazon.com\/."},{"key":"e_1_3_2_1_38_1","volume-title":"Technical Report (TR-CTIT-08-64)","author":"Tang W.","year":"2008","unstructured":"W. Tang . On using encryption techniques to enhance sticky policies enforcement. Technical Report (TR-CTIT-08-64) , Centre for Telematics and Information Technology , 2008 . W. Tang. On using encryption techniques to enhance sticky policies enforcement. Technical Report (TR-CTIT-08-64), Centre for Telematics and Information Technology, 2008."},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.5555\/1813084.1813114"},{"key":"e_1_3_2_1_40_1","unstructured":"Workday. http:\/\/www.workday.com\/.  Workday. http:\/\/www.workday.com\/."},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1007\/11556992_32"}],"event":{"name":"SACMAT'10: 15th ACM Symposium on Access Control Models and Technologies","location":"Pittsburgh Pennsylvania USA","acronym":"SACMAT'10","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 15th ACM symposium on Access control models and technologies"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1809842.1809872","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1809842.1809872","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T11:39:26Z","timestamp":1750246766000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1809842.1809872"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,6,11]]},"references-count":40,"alternative-id":["10.1145\/1809842.1809872","10.1145\/1809842"],"URL":"https:\/\/doi.org\/10.1145\/1809842.1809872","relation":{},"subject":[],"published":{"date-parts":[[2010,6,11]]},"assertion":[{"value":"2010-06-11","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}