{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:19:21Z","timestamp":1750306761521,"version":"3.41.0"},"reference-count":3,"publisher":"Association for Computing Machinery (ACM)","issue":"2","license":[{"start":{"date-parts":[[2013,7,23]],"date-time":"2013-07-23T00:00:00Z","timestamp":1374537600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["SIGOPS Oper. Syst. Rev."],"published-print":{"date-parts":[[2013,7,23]]},"DOI":"10.1145\/2506164.2506169","type":"journal-article","created":{"date-parts":[[2013,7,25]],"date-time":"2013-07-25T19:12:41Z","timestamp":1374779561000},"page":"20-22","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Dependability issues in cloud computing"],"prefix":"10.1145","volume":"47","author":[{"given":"Miguel","family":"Correia","sequence":"first","affiliation":[{"name":"INESC-ID \/ Instituto Superior T\u00e9cnico, Lisboa, Portugal"}]},{"given":"Neeraj","family":"Mittal","sequence":"additional","affiliation":[{"name":"The University of Texas at Dallas, Richardson, Texas, USA"}]}],"member":"320","published-online":{"date-parts":[[2013,7,23]]},"reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/1721654.1721672"},{"key":"e_1_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2004.2"},{"key":"e_1_2_1_3_1","volume-title":"The notorious nine -- cloud computing top threats","author":"Alliance Cloud Security","year":"2013","unstructured":"Cloud Security Alliance . The notorious nine -- cloud computing top threats in 2013 , Feb. 2013. Cloud Security Alliance. The notorious nine -- cloud computing top threats in 2013, Feb. 2013."}],"container-title":["ACM SIGOPS Operating Systems Review"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2506164.2506169","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2506164.2506169","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T07:28:43Z","timestamp":1750231723000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2506164.2506169"}},"subtitle":["extended papers from the 1st international workshop on dependability issues in cloud computing -- DISCCO"],"short-title":[],"issued":{"date-parts":[[2013,7,23]]},"references-count":3,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2013,7,23]]}},"alternative-id":["10.1145\/2506164.2506169"],"URL":"https:\/\/doi.org\/10.1145\/2506164.2506169","relation":{},"ISSN":["0163-5980"],"issn-type":[{"type":"print","value":"0163-5980"}],"subject":[],"published":{"date-parts":[[2013,7,23]]},"assertion":[{"value":"2013-07-23","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}