{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,18]],"date-time":"2026-04-18T09:36:46Z","timestamp":1776505006392,"version":"3.51.2"},"publisher-location":"New York, NY, USA","reference-count":35,"publisher":"ACM","license":[{"start":{"date-parts":[[2012,8,3]],"date-time":"2012-08-03T00:00:00Z","timestamp":1343952000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100004963","name":"Seventh Framework Programme","doi-asserted-by":"publisher","award":["FP7-ICT-2009-5-257448"],"award-info":[{"award-number":["FP7-ICT-2009-5-257448"]}],"id":[{"id":"10.13039\/501100004963","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2012,8,3]]},"DOI":"10.1145\/2345396.2345422","type":"proceedings-article","created":{"date-parts":[[2012,8,7]],"date-time":"2012-08-07T12:28:17Z","timestamp":1344342497000},"page":"148-154","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":16,"title":["V2C"],"prefix":"10.1145","author":[{"given":"Sathyanarayanan","family":"Rangarajan","sequence":"first","affiliation":[{"name":"Fraunhofer AISEC, Garching, Germany"}]},{"given":"Monica","family":"Verma","sequence":"additional","affiliation":[{"name":"Siemens CERT, Munich, Germany"}]},{"given":"Anand","family":"Kannan","sequence":"additional","affiliation":[{"name":"KTH, Royal Institute of Technology, Stockholm, Sweden"}]},{"given":"Ayush","family":"Sharma","sequence":"additional","affiliation":[{"name":"Fraunhofer AISEC, Garching, Germany"}]},{"given":"Ingmar","family":"Schoen","sequence":"additional","affiliation":[{"name":"Fraunhofer AISEC, Garching, Germany"}]}],"member":"320","published-online":{"date-parts":[[2012,8,3]]},"reference":[{"key":"e_1_3_2_1_1_1","first-page":"84","article-title":"DRAFT Cloud Computing Synopsis and Recommendations of the National Institute of Standards and Technology","volume":"117","author":"Badger Lee","year":"2011","unstructured":"Lee Badger , Robert Patt-corner, and Jeff Voas . DRAFT Cloud Computing Synopsis and Recommendations of the National Institute of Standards and Technology . NIST Special Publication , 117 : 84 , 2011 . Lee Badger, Robert Patt-corner, and Jeff Voas. DRAFT Cloud Computing Synopsis and Recommendations of the National Institute of Standards and Technology. NIST Special Publication, 117:84, 2011.","journal-title":"NIST Special Publication"},{"issue":"6","key":"e_1_3_2_1_2_1","first-page":"7","article-title":"The NIST Definition of Cloud Computing (Draft) Recommendations of the National Institute of Standards and Technology","volume":"145","author":"Mell Peter","year":"2011","unstructured":"Peter Mell and Timothy Grance . The NIST Definition of Cloud Computing (Draft) Recommendations of the National Institute of Standards and Technology . NIST Special Publication , 145 ( 6 ): 7 , 2011 . Peter Mell and Timothy Grance. The NIST Definition of Cloud Computing (Draft) Recommendations of the National Institute of Standards and Technology. NIST Special Publication, 145(6):7, 2011.","journal-title":"NIST Special Publication"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/CNSI.2011.82"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/Allerton.2011.6120232"},{"key":"e_1_3_2_1_5_1","volume-title":"European Commission's 7th Framework Program","author":"Edwall Thomas","year":"2011","unstructured":"Thomas Edwall . Scalable &amp; Adaptive Internet Solutions (SAIL). Technical report , European Commission's 7th Framework Program , 2011 . Thomas Edwall. Scalable &amp; Adaptive Internet Solutions (SAIL). Technical report, European Commission's 7th Framework Program, 2011."},{"key":"e_1_3_2_1_6_1","volume-title":"European Commission's 7th Framework Program","author":"Murray Paul","year":"2011","unstructured":"Paul Murray . D-5.2 (D-D.1) Cloud Network Architecture Description . Technical report , European Commission's 7th Framework Program , 2011 . Paul Murray. D-5.2 (D-D.1) Cloud Network Architecture Description. Technical report, European Commission's 7th Framework Program, 2011."},{"key":"e_1_3_2_1_7_1","volume-title":"Intel's Smart WiMAX Car - Mobility \"Innovision\" for Centrino","author":"Kaplan K","year":"2008","unstructured":"K Kaplan . Intel's Smart WiMAX Car - Mobility \"Innovision\" for Centrino 2, July 2008 . K Kaplan. Intel's Smart WiMAX Car - Mobility \"Innovision\" for Centrino 2, July 2008."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICTON.2010.5549094"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/VETECF.2008.461"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/IVS.2009.5164440"},{"issue":"7","key":"e_1_3_2_1_11_1","first-page":"3684","article-title":"Fair Transmit Power Control for Safety-Critical Information. Vehicular Technology","volume":"58","author":"Torrent-Moreno M.","year":"2009","unstructured":"M. Torrent-Moreno , J. Mittag , P. Santi , and H Hartenstein . Vehicle-to- Vehicle Communication : Fair Transmit Power Control for Safety-Critical Information. Vehicular Technology , IEEE Transactions on , 58 ( 7 ): 3684 -- 3703 , Sept. 2009 . M. Torrent-Moreno, J. Mittag, P. Santi, and H Hartenstein. Vehicle-to-Vehicle Communication: Fair Transmit Power Control for Safety-Critical Information. Vehicular Technology, IEEE Transactions on, 58(7):3684--3703, Sept. 2009.","journal-title":"IEEE Transactions on"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2006.888621"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/PST.2010.5593244"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/APNOMS.2011.6076964"},{"key":"e_1_3_2_1_15_1","volume-title":"Fusenig and Ayush Sharma. Security Architecture for Cloud Networking. In International Conference on Computing, Networking and Communication (ICNC)","author":"Volker","year":"2012","unstructured":"Volker Fusenig and Ayush Sharma. Security Architecture for Cloud Networking. In International Conference on Computing, Networking and Communication (ICNC) , Maui, Hawaii, USA, 30th Jan. - 2nd Feb. 2012 . Volker Fusenig and Ayush Sharma. Security Architecture for Cloud Networking. In International Conference on Computing, Networking and Communication (ICNC), Maui, Hawaii, USA, 30th Jan. - 2nd Feb. 2012."},{"key":"e_1_3_2_1_16_1","first-page":"298","volume-title":"MONAMI","author":"Schoo Peter","year":"2010","unstructured":"Peter Schoo , Volker Fusenig , Victor Souza , Marcio Melo , Paul Murray , Herve Debar , Houssem Medhioub , and Djamal Zeghlache . Challenges for Cloud Networking Security . In MONAMI , pages 298 -- 313 , 2010 . Peter Schoo, Volker Fusenig, Victor Souza, Marcio Melo, Paul Murray, Herve Debar, Houssem Medhioub, and Djamal Zeghlache. Challenges for Cloud Networking Security. In MONAMI, pages 298--313, 2010."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/APNOMS.2011.6077035"},{"key":"e_1_3_2_1_18_1","first-page":"249","volume-title":"Communications in Computer and Information Science","author":"Vijayakumar P.","year":"2011","unstructured":"P. Vijayakumar , S. Bose , A. Kannan , and S Siva Subramanian . A Secure Key Distribution Protocol for Multicast Communication . In Communications in Computer and Information Science , volume 140 , pages 249 -- 257 . Springer , 2011 . P. Vijayakumar, S. Bose, A. Kannan, and S Siva Subramanian. A Secure Key Distribution Protocol for Multicast Communication. In Communications in Computer and Information Science, volume 140, pages 249--257. Springer, 2011."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICNP.2010.5762765"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICEBE.2009.82"},{"key":"e_1_3_2_1_21_1","volume-title":"Trouessin. Organization Based Access Control. In 4th IEEE International Workshop on Policies for Distributed Systems and Networks (Policy'03)","author":"Kalam A. Abou El","year":"2003","unstructured":"A. Abou El Kalam , R. El Baida , P. Balbiani , S. Benferhat , F. Cuppens , Y. Deswarte , A. Mi\u00e8ge , C. Saurel , and G Trouessin. Organization Based Access Control. In 4th IEEE International Workshop on Policies for Distributed Systems and Networks (Policy'03) , June 2003 . A. Abou El Kalam, R. El Baida, P. Balbiani, S. Benferhat, F. Cuppens, Y. Deswarte, A. Mi\u00e8ge, C. Saurel, and G Trouessin. Organization Based Access Control. In 4th IEEE International Workshop on Policies for Distributed Systems and Networks (Policy'03), June 2003."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.5555\/647801.737001"},{"key":"e_1_3_2_1_23_1","first-page":"184","volume-title":"Wilson. A Comparison of Commercial and Military Computer Security Policies. In IEEE symposium on security and privacy","author":"Clark D.","year":"1987","unstructured":"D. Clark and D Wilson. A Comparison of Commercial and Military Computer Security Policies. In IEEE symposium on security and privacy , pages 184 -- 194 , 1987 . D. Clark and D Wilson. A Comparison of Commercial and Military Computer Security Policies. In IEEE symposium on security and privacy, pages 184--194, 1987."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.5555\/646117.680107"},{"key":"e_1_3_2_1_25_1","volume-title":"Proceedings of the 9th International Conference on Telecommunication Systems - Modeling and Analysis, Special Session on Security Aspects of Telecommunication Systems","author":"Knorr Konstantin","year":"2001","unstructured":"Konstantin Knorr . Multilevel Security and Information Flow in Petri Net Workflows. Technical report , In Proceedings of the 9th International Conference on Telecommunication Systems - Modeling and Analysis, Special Session on Security Aspects of Telecommunication Systems , 2001 . Konstantin Knorr. Multilevel Security and Information Flow in Petri Net Workflows. Technical report, In Proceedings of the 9th International Conference on Telecommunication Systems - Modeling and Analysis, Special Session on Security Aspects of Telecommunication Systems, 2001."},{"key":"e_1_3_2_1_26_1","first-page":"1","volume-title":"Policy","author":"Parducci Bill","year":"2010","unstructured":"Bill Parducci , Hal Lockhart , and Erik Rissanen . XACML v3. 0 Privacy Policy Profile Version 1.0 . Policy , pages 1 -- 11 , August 2010 . Bill Parducci, Hal Lockhart, and Erik Rissanen. XACML v3.0 Privacy Policy Profile Version 1.0. Policy, pages 1--11, August 2010."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF00165470"},{"key":"e_1_3_2_1_28_1","volume-title":"Roshan Zamir and Mubarak Shah. Accurate Image Localization Based on Google Maps Street View. In Proceedings of the European Conference on Computer Vision (ECCV)","author":"Amir","year":"2010","unstructured":"Amir Roshan Zamir and Mubarak Shah. Accurate Image Localization Based on Google Maps Street View. In Proceedings of the European Conference on Computer Vision (ECCV) , 2010 . Amir Roshan Zamir and Mubarak Shah. Accurate Image Localization Based on Google Maps Street View. In Proceedings of the European Conference on Computer Vision (ECCV), 2010."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.3138\/J0L0-5301-2262-N779"},{"key":"e_1_3_2_1_31_1","first-page":"c1","author":"Video Jitter IEEE","year":"2003","unstructured":"IEEE Standard for Measurement of Video Jitter and Wander . IEEE Std 1521-- 2003 , pages c1 -- 14 , 14 2009. IEEE Standard for Measurement of Video Jitter and Wander. IEEE Std 1521--2003, pages c1--14, 14 2009.","journal-title":"IEEE Std 1521--"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/501449.501451"},{"key":"e_1_3_2_1_33_1","volume-title":"European Commission's 7th Framework Program","author":"Edwall Thomas","year":"2011","unstructured":"Thomas Edwall . Description of project wide scenarios and use cases. Technical report , European Commission's 7th Framework Program , 2011 . Thomas Edwall. Description of project wide scenarios and use cases. Technical report, European Commission's 7th Framework Program, 2011."},{"key":"e_1_3_2_1_34_1","volume-title":"IBM Cloud Computing &amp","author":"Schmidt-Wesche B","year":"2010","unstructured":"B Schmidt-Wesche , Brian Snitzer , Gerd Breiter , Gerhard Widmayer , Jim Whitmore , Julissa Villareal , Michael Behrendt , R Caponigro , R Chang , S Pappe , and Et Al . IBM Cloud Computing &amp ; Common Cloud Management Platform Reference Architecture (CC &amp; CCMP RA) 1.0, 2010 . B Schmidt-Wesche, Brian Snitzer, Gerd Breiter, Gerhard Widmayer, Jim Whitmore, Julissa Villareal, Michael Behrendt, R Caponigro, R Chang, S Pappe, and Et Al. IBM Cloud Computing &amp; Common Cloud Management Platform Reference Architecture (CC &amp; CCMP RA) 1.0, 2010."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/WCSE.2010.93"},{"key":"e_1_3_2_1_36_1","first-page":"012051","article-title":"Eucalyptus Systems Eucalyptus Open-Source Cloud Computing Infrastructure - An Overview Eucalyptus Systems An Overview","volume":"180","author":"Systems Eucalyptus","year":"2009","unstructured":"Eucalyptus Systems . Eucalyptus Systems Eucalyptus Open-Source Cloud Computing Infrastructure - An Overview Eucalyptus Systems An Overview . Technology , 180 : 012051 , August 2009 . Eucalyptus Systems. Eucalyptus Systems Eucalyptus Open-Source Cloud Computing Infrastructure - An Overview Eucalyptus Systems An Overview. Technology, 180:012051, August 2009.","journal-title":"Technology"}],"event":{"name":"ICACCI '12: 2012 International Conference on Advances in Computing, Communications and Informatics","location":"Chennai India","acronym":"ICACCI '12","sponsor":["ISCA International Society for Computers and Their Applications","RPS Research Publishing Services"]},"container-title":["Proceedings of the International Conference on Advances in Computing, Communications and Informatics"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2345396.2345422","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2345396.2345422","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T20:13:49Z","timestamp":1750277629000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2345396.2345422"}},"subtitle":["a secure vehicle to cloud framework for virtualized and on-demand service provisioning"],"short-title":[],"issued":{"date-parts":[[2012,8,3]]},"references-count":35,"alternative-id":["10.1145\/2345396.2345422","10.1145\/2345396"],"URL":"https:\/\/doi.org\/10.1145\/2345396.2345422","relation":{},"subject":[],"published":{"date-parts":[[2012,8,3]]},"assertion":[{"value":"2012-08-03","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}