{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,11]],"date-time":"2025-12-11T20:38:09Z","timestamp":1765485489513,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":18,"publisher":"ACM","license":[{"start":{"date-parts":[[2010,10,8]],"date-time":"2010-10-08T00:00:00Z","timestamp":1286496000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2010,10,8]]},"DOI":"10.1145\/1866835.1866837","type":"proceedings-article","created":{"date-parts":[[2010,10,12]],"date-time":"2010-10-12T15:38:31Z","timestamp":1286897911000},"page":"1-6","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":75,"title":["Authentication in the clouds"],"prefix":"10.1145","author":[{"given":"Richard","family":"Chow","sequence":"first","affiliation":[{"name":"PARC, Palo Alto, CA, USA"}]},{"given":"Markus","family":"Jakobsson","sequence":"additional","affiliation":[{"name":"FatSkunk, Mountain View, CA, USA"}]},{"given":"Ryusuke","family":"Masuoka","sequence":"additional","affiliation":[{"name":"Fujitsu Laboratories of America, Sunnyvale, CA, USA"}]},{"given":"Jesus","family":"Molina","sequence":"additional","affiliation":[{"name":"Fujitsu Laboratories of America, Sunnyvale, CA, USA"}]},{"given":"Yuan","family":"Niu","sequence":"additional","affiliation":[{"name":"University of California - Davis, Davis, CA, USA"}]},{"given":"Elaine","family":"Shi","sequence":"additional","affiliation":[{"name":"PARC, Palo Alto, CA, USA"}]},{"given":"Zhexuan","family":"Song","sequence":"additional","affiliation":[{"name":"Fujitsu Labs of America, Sunnyvale, CA, USA"}]}],"member":"320","published-online":{"date-parts":[[2010,10,8]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"}}Amazon Elastic Compute Cloud (Amazon EC2). On the Web at http:\/\/aws.amazon.com\/ec2\/.  }}Amazon Elastic Compute Cloud (Amazon EC2). On the Web at http:\/\/aws.amazon.com\/ec2\/."},{"key":"e_1_3_2_1_2_1","unstructured":"}}Android. On the Web at http:\/\/www.android.com\/.  }}Android. On the Web at http:\/\/www.android.com\/."},{"key":"e_1_3_2_1_3_1","unstructured":"}}Entrust IdentityGuard. On the Web at http:\/\/www.entrust.com\/strong-authentication\/identityguard\/index.htm.  }}Entrust IdentityGuard. On the Web at http:\/\/www.entrust.com\/strong-authentication\/identityguard\/index.htm."},{"key":"e_1_3_2_1_4_1","unstructured":"}}Google App Engine. On the Web at http:\/\/code.google.com\/appengine.  }}Google App Engine. On the Web at http:\/\/code.google.com\/appengine."},{"key":"e_1_3_2_1_5_1","unstructured":"}}List of countries by number of mobile phones in use. On the Web at http:\/\/en.wikipedia.org\/wiki\/List_of_ countries_by_number_of_mobile_phones_in_use.  }}List of countries by number of mobile phones in use. On the Web at http:\/\/en.wikipedia.org\/wiki\/List_of_ countries_by_number_of_mobile_phones_in_use."},{"key":"e_1_3_2_1_6_1","unstructured":"}}OpenID. On the Web at http:\/\/openid.net.  }}OpenID. On the Web at http:\/\/openid.net."},{"key":"e_1_3_2_1_7_1","unstructured":"}}RSA Adaptive Authentication. On the Web at http:\/\/www.rsa.com\/node.aspx?id=3018.  }}RSA Adaptive Authentication. On the Web at http:\/\/www.rsa.com\/node.aspx?id=3018."},{"key":"e_1_3_2_1_8_1","unstructured":"}}SecurID. On the Web at http:\/\/en.wikipedia.org\/wiki\/SecurID.  }}SecurID. On the Web at http:\/\/en.wikipedia.org\/wiki\/SecurID."},{"key":"e_1_3_2_1_9_1","unstructured":"}}The 41st Parameter. On the Web at http:\/\/www.the41st.com\/.  }}The 41st Parameter. On the Web at http:\/\/www.the41st.com\/."},{"key":"e_1_3_2_1_10_1","unstructured":"}}Trusted Computing Group. On the Web at http:\/\/www.trustedcomputinggroup.org\/.  }}Trusted Computing Group. On the Web at http:\/\/www.trustedcomputinggroup.org\/."},{"key":"e_1_3_2_1_11_1","unstructured":"}}Trusted Network Connect. On the Web at http:\/\/www.trustedcomputinggroup.org\/ developers\/trusted_network_connect\/.  }}Trusted Network Connect. On the Web at http:\/\/www.trustedcomputinggroup.org\/ developers\/trusted_network_connect\/."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/1456377.1456383"},{"key":"e_1_3_2_1_13_1","volume-title":"Implicit Authentication for Mobile Devices. In HotSec '09: Proceedings of the 4th USENIX Workshop on Hot Topics in Security","author":"Jakobsson M.","year":"2009","unstructured":"}} M. Jakobsson , E. Shi , P. Golle , and R. Chow . Implicit Authentication for Mobile Devices. In HotSec '09: Proceedings of the 4th USENIX Workshop on Hot Topics in Security , 2009 . }}M. Jakobsson, E. Shi, P. Golle, and R. Chow. Implicit Authentication for Mobile Devices. In HotSec '09: Proceedings of the 4th USENIX Workshop on Hot Topics in Security, 2009."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2006.8"},{"key":"e_1_3_2_1_15_1","volume-title":"USER Workshop of SOUPS","author":"Niu Y.","year":"2010","unstructured":"}} Y. Niu , E. Shi , R. Chow , P. Golle , and M. Jakobsson . One experience collecting sensitive mobile data . In USER Workshop of SOUPS , 2010 . }}Y. Niu, E. Shi, R. Chow, P. Golle, and M. Jakobsson. One experience collecting sensitive mobile data. In USER Workshop of SOUPS, 2010."},{"key":"e_1_3_2_1_16_1","volume-title":"Proceedings of the 17th USENIX Security Symposium (Security)","author":"Oberheide J.","year":"2008","unstructured":"}} J. Oberheide , E. Cooke , and F. Jahanian . CloudAV: N-Version Antivirus in the Network Cloud . In Proceedings of the 17th USENIX Security Symposium (Security) , 2008 . }}J. Oberheide, E. Cooke, and F. Jahanian. CloudAV: N-Version Antivirus in the Network Cloud. In Proceedings of the 17th USENIX Security Symposium (Security), 2008."},{"key":"e_1_3_2_1_17_1","volume-title":"Information Security Conference (ISC)","author":"Shi E.","year":"2010","unstructured":"}} E. Shi , Y. Niu , M. Jakobsson , and R. Chow . Implicit authentication through learning user behavior . In Information Security Conference (ISC) , 2010 . }}E. Shi, Y. Niu, M. Jakobsson, and R. Chow. Implicit authentication through learning user behavior. In Information Security Conference (ISC), 2010."},{"key":"e_1_3_2_1_18_1","volume-title":"Proceedings of the First International Conference","author":"Song Z.","year":"2009","unstructured":"}} Z. Song , J. Molina , S. Lee , H. Lee , S. Kotani , and R. Masuoka . Trustcube: An infrastructure that builds trust in client. In Future of Trust in Computing , Proceedings of the First International Conference , 2009 . }}Z. Song, J. Molina, S. Lee, H. Lee, S. Kotani, and R. Masuoka. Trustcube: An infrastructure that builds trust in client. In Future of Trust in Computing, Proceedings of the First International Conference, 2009."}],"event":{"name":"CCS '10: 17th ACM Conference on Computer and Communications Security 2010","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Chicago Illinois USA","acronym":"CCS '10"},"container-title":["Proceedings of the 2010 ACM workshop on Cloud computing security workshop"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1866835.1866837","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1866835.1866837","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T10:52:59Z","timestamp":1750243979000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1866835.1866837"}},"subtitle":["a framework and its application to mobile users"],"short-title":[],"issued":{"date-parts":[[2010,10,8]]},"references-count":18,"alternative-id":["10.1145\/1866835.1866837","10.1145\/1866835"],"URL":"https:\/\/doi.org\/10.1145\/1866835.1866837","relation":{},"subject":[],"published":{"date-parts":[[2010,10,8]]},"assertion":[{"value":"2010-10-08","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}