{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:27:51Z","timestamp":1750307271663,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":21,"publisher":"ACM","license":[{"start":{"date-parts":[[2010,10,8]],"date-time":"2010-10-08T00:00:00Z","timestamp":1286496000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2010,10,8]]},"DOI":"10.1145\/1866835.1866839","type":"proceedings-article","created":{"date-parts":[[2010,10,12]],"date-time":"2010-10-12T15:38:31Z","timestamp":1286897911000},"page":"13-18","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":20,"title":["Towards a discipline of mission-aware cloud computing"],"prefix":"10.1145","author":[{"given":"Ravi","family":"Sandhu","sequence":"first","affiliation":[{"name":"University of Texas at San Antonio, San Antonio, TX, USA"}]},{"given":"Raj","family":"Boppana","sequence":"additional","affiliation":[{"name":"University of Texas at San Antonio, San Antonio, TX, USA"}]},{"given":"Ram","family":"Krishnan","sequence":"additional","affiliation":[{"name":"University of Texas at San Antonio, San Antonio, TX, USA"}]},{"given":"Jeff","family":"Reich","sequence":"additional","affiliation":[{"name":"University of Texas at San Antonio, San Antonio, TX, USA"}]},{"given":"Todd","family":"Wolff","sequence":"additional","affiliation":[{"name":"University of Texas at San Antonio, San Antonio, TX, USA"}]},{"given":"Josh","family":"Zachry","sequence":"additional","affiliation":[{"name":"University of Texas at San Antonio, San Antonio, TX, USA"}]}],"member":"320","published-online":{"date-parts":[[2010,10,8]]},"reference":[{"volume-title":"Cloud Security Alliance","year":"2009","key":"e_1_3_2_1_1_1","unstructured":"}}Security guidance for critical areas of focus in cloud computing, version 2.1 . Cloud Security Alliance , December 2009 . }}Security guidance for critical areas of focus in cloud computing, version 2.1. Cloud Security Alliance, December 2009."},{"key":"e_1_3_2_1_2_1","unstructured":"}}DoD Directive 3020.40 January 14 2010.  }}DoD Directive 3020.40 January 14 2010."},{"key":"e_1_3_2_1_3_1","unstructured":"}}DoD Directive 8500.01 October 24 2002.  }}DoD Directive 8500.01 October 24 2002."},{"key":"e_1_3_2_1_5_1","volume-title":"HotCloud'09: Usenix Workshop on Hot Topics in Cloud Computing","author":"Banks D.","year":"2009","unstructured":"}} D. Banks , J. S. Erickson , and M. Rhodes . Toward cloud-based collaboration services . In HotCloud'09: Usenix Workshop on Hot Topics in Cloud Computing , 2009 . }}D. Banks, J. S. Erickson, and M. Rhodes. Toward cloud-based collaboration services. In HotCloud'09: Usenix Workshop on Hot Topics in Cloud Computing, 2009."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/CCGRID.2009.97"},{"key":"e_1_3_2_1_7_1","volume-title":"December","author":"}}DoD National Computer Security Center (DoD 5200.28-STD).","year":"1985","unstructured":"}}DoD National Computer Security Center (DoD 5200.28-STD). Trusted Computer System Evaluation Criteria , December 1985 . }}DoD National Computer Security Center (DoD 5200.28-STD). Trusted Computer System Evaluation Criteria, December 1985."},{"volume-title":"Grid Computing Environments Workshop, 2008. GCE'08.","author":"Foster I.","key":"e_1_3_2_1_8_1","unstructured":"}} I. Foster , Y. Zhao , I. Raicu , and S. Lu . Cloud computing and grid computing 360-degree compared . In Grid Computing Environments Workshop, 2008. GCE'08. }}I. Foster, Y. Zhao, I. Raicu, and S. Lu. Cloud computing and grid computing 360-degree compared. In Grid Computing Environments Workshop, 2008. GCE'08."},{"volume-title":"Gartner says cloud consumers need brokerages to unlock the potential of cloud services","year":"2009","key":"e_1_3_2_1_9_1","unstructured":"}}Gartner Press Release. Gartner says cloud consumers need brokerages to unlock the potential of cloud services . July 9, 2009 . }}Gartner Press Release. Gartner says cloud consumers need brokerages to unlock the potential of cloud services. July 9, 2009."},{"key":"e_1_3_2_1_10_1","volume-title":"HotCloud'09: Usenix Workshop on Hot Topics in Cloud Computing","author":"Geambasu R.","year":"2009","unstructured":"}} R. Geambasu , S. D. Gribble , and H. M. Levy . Cloudviews: Communal data sharing in public clouds . In HotCloud'09: Usenix Workshop on Hot Topics in Cloud Computing , 2009 . }}R. Geambasu, S. D. Gribble, and H. M. Levy. Cloudviews: Communal data sharing in public clouds. In HotCloud'09: Usenix Workshop on Hot Topics in Cloud Computing, 2009."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2008.107"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2010.45"},{"key":"e_1_3_2_1_13_1","volume-title":"InfoWorld","author":"Krill P.","year":"2009","unstructured":"}} P. Krill . The cloud-SOA connection . InfoWorld , Feb 10, 2009 . }}P. Krill. The cloud-SOA connection. InfoWorld, Feb 10, 2009."},{"key":"e_1_3_2_1_14_1","volume-title":"The NIST definition of cloud computing: version 15","author":"Mell P.","year":"2009","unstructured":"}} P. Mell and T. Grance . The NIST definition of cloud computing: version 15 . National Institute of Standards and Technology , Oct 7, 2009 . }}P. Mell and T. Grance. The NIST definition of cloud computing: version 15. National Institute of Standards and Technology, Oct 7, 2009."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/1743546.1743565"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653687"},{"key":"e_1_3_2_1_17_1","volume-title":"HotCloud'09: Proc. of USENIX Workshop on Hot Topics in Cloud Computing","author":"Santos N.","year":"2009","unstructured":"}} N. Santos , K. Gummadi , and R. Rodrigues . Towards trusted cloud computing . HotCloud'09: Proc. of USENIX Workshop on Hot Topics in Cloud Computing , 2009 . }}N. Santos, K. Gummadi, and R. Rodrigues. Towards trusted cloud computing. HotCloud'09: Proc. of USENIX Workshop on Hot Topics in Cloud Computing, 2009."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2009.252"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/1655008.1655021"},{"volume-title":"Information assurance - wikipedia, the free encyclopedia","year":"2010","key":"e_1_3_2_1_20_1","unstructured":"}}Wikipedia. Information assurance - wikipedia, the free encyclopedia , 2010 . {Online; accessed 7-July-2010}. }}Wikipedia. Information assurance - wikipedia, the free encyclopedia, 2010. {Online; accessed 7-July-2010}."},{"volume-title":"Grid Computing Environments Workshop, 2008. GCE'08.","author":"Youseff L.","key":"e_1_3_2_1_21_1","unstructured":"}} L. Youseff , M. Butrico , and D. Da Silva . Toward a unified ontology of cloud computing . In Grid Computing Environments Workshop, 2008. GCE'08. }}L. Youseff, M. Butrico, and D. Da Silva. Toward a unified ontology of cloud computing. In Grid Computing Environments Workshop, 2008. GCE'08."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/1655008.1655026"}],"event":{"name":"CCS '10: 17th ACM Conference on Computer and Communications Security 2010","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Chicago Illinois USA","acronym":"CCS '10"},"container-title":["Proceedings of the 2010 ACM workshop on Cloud computing security workshop"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1866835.1866839","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1866835.1866839","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T10:52:59Z","timestamp":1750243979000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1866835.1866839"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,10,8]]},"references-count":21,"alternative-id":["10.1145\/1866835.1866839","10.1145\/1866835"],"URL":"https:\/\/doi.org\/10.1145\/1866835.1866839","relation":{},"subject":[],"published":{"date-parts":[[2010,10,8]]},"assertion":[{"value":"2010-10-08","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}