{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:17:14Z","timestamp":1750306634404,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":28,"publisher":"ACM","license":[{"start":{"date-parts":[[2014,6,4]],"date-time":"2014-06-04T00:00:00Z","timestamp":1401840000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2014,6,4]]},"DOI":"10.1145\/2590296.2590310","type":"proceedings-article","created":{"date-parts":[[2014,5,30]],"date-time":"2014-05-30T18:18:31Z","timestamp":1401473911000},"page":"519-524","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":6,"title":["Cyber defenses for physical attacks and insider threats in cloud computing"],"prefix":"10.1145","author":[{"given":"Jakub","family":"Szefer","sequence":"first","affiliation":[{"name":"Yale University, New Haven, CT, USA"}]},{"given":"Pramod","family":"Jamkhedkar","sequence":"additional","affiliation":[{"name":"Princeton University, Princeton, NJ, USA"}]},{"given":"Diego","family":"Perez-Botero","sequence":"additional","affiliation":[{"name":"Princeton University, Princeton, NJ, USA"}]},{"given":"Ruby B.","family":"Lee","sequence":"additional","affiliation":[{"name":"Princeton University, Princeton, NJ, USA"}]}],"member":"320","published-online":{"date-parts":[[2014,6,4]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Amazon EC2 Instance Types. http:\/\/aws.amazon.com\/ec2\/instance-types\/.  Amazon EC2 Instance Types. http:\/\/aws.amazon.com\/ec2\/instance-types\/."},{"key":"e_1_3_2_1_2_1","unstructured":"The Apache HTTP Server Project. http:\/\/httpd.apache.org\/.  The Apache HTTP Server Project. http:\/\/httpd.apache.org\/."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA.2010.5416657"},{"volume-title":"Proceedings of the International Conference on Informatics and Systems, INFOS","year":"2010","author":"Dawoud W.","key":"e_1_3_2_1_4_1"},{"key":"e_1_3_2_1_5_1","unstructured":"Dbench filesystem benchmark. http:\/\/dbench.samba.org\/.  Dbench filesystem benchmark. http:\/\/dbench.samba.org\/."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/1315245.1315294"},{"key":"e_1_3_2_1_7_1","unstructured":"Faban Harness and Benchmark Framework. http:\/\/java.net\/projects\/faban\/.  Faban Harness and Benchmark Framework. http:\/\/java.net\/projects\/faban\/."},{"key":"e_1_3_2_1_8_1","unstructured":"L. J. Fennelly. Effective Physical Security. Butterworth-Heinemann 3rd edition 2003.  L. J. Fennelly. Effective Physical Security. Butterworth-Heinemann 3rd edition 2003."},{"key":"e_1_3_2_1_9_1","unstructured":"GlassFish - Open Source Application Server. http:\/\/glassfish.java.net\/.  GlassFish - Open Source Application Server. http:\/\/glassfish.java.net\/."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1506409.1506429"},{"volume-title":"SANS Institute","year":"2001","author":"Heare S.","key":"e_1_3_2_1_11_1"},{"volume":"10","journal-title":"J. Higgins. The","author":"K","key":"e_1_3_2_1_12_1"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1958746.1958790"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.5555\/2038041"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISCA.2005.14"},{"key":"e_1_3_2_1_16_1","unstructured":"mstone multi-protocol testing system. http:\/\/sourceforge.net\/projects\/mstone\/.  mstone multi-protocol testing system. http:\/\/sourceforge.net\/projects\/mstone\/."},{"key":"e_1_3_2_1_17_1","unstructured":"OpenStack. OpenStack Compute: An Overview.  OpenStack. OpenStack Compute: An Overview."},{"volume-title":"Princeton University","year":"2013","author":"Perez-Botero D.","key":"e_1_3_2_1_18_1"},{"key":"e_1_3_2_1_19_1","unstructured":"S. D. Scalet. 19 Ways to Build Physical Security into a Data Center. http:\/\/www.csoonline.com\/.  S. D. Scalet. 19 Ways to Build Physical Security into a Data Center. http:\/\/www.csoonline.com\/."},{"key":"e_1_3_2_1_20_1","unstructured":"J. S. Schultz. Should you trust mint.com? From New York Times http:\/\/bucks.blogs.nytimes.com\/2010\/07\/06\/should-you-trust-mint-com\/?_r=0.  J. S. Schultz. Should you trust mint.com? From New York Times http:\/\/bucks.blogs.nytimes.com\/2010\/07\/06\/should-you-trust-mint-com\/?_r=0."},{"key":"e_1_3_2_1_21_1","unstructured":"smtp-sink(1) - Linux man page. http:\/\/linux.die.net\/man\/1\/smtp-sink.  smtp-sink(1) - Linux man page. http:\/\/linux.die.net\/man\/1\/smtp-sink."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/782814.782838"},{"key":"e_1_3_2_1_23_1","unstructured":"SysBench: a system performance benchmark. http:\/\/sysbench.sourceforge.net\/.  SysBench: a system performance benchmark. http:\/\/sysbench.sourceforge.net\/."},{"volume-title":"Physical Attack Protection with Human-Secure Virtualization in Data Centers. In Workshop on Open Resilient human-aware Cyber-physical Systems, WORCS","year":"2012","author":"Szefer J.","key":"e_1_3_2_1_24_1"},{"key":"e_1_3_2_1_25_1","unstructured":"TrueCrypt - Free Open-Source On-The-Fly Disk Encryption Software. http:\/\/www.truecrypt.org\/.  TrueCrypt - Free Open-Source On-The-Fly Disk Encryption Software. http:\/\/www.truecrypt.org\/."},{"key":"e_1_3_2_1_26_1","unstructured":"VLC media player. http:\/\/www.videolan.org.  VLC media player. http:\/\/www.videolan.org."},{"volume-title":"Cengage Learning","year":"2011","author":"Whitman M. E.","key":"e_1_3_2_1_27_1"},{"key":"e_1_3_2_1_28_1","unstructured":"Wireshark: the world's foremost network protocol analyzer. http:\/\/www.wireshark.org\/.  Wireshark: the world's foremost network protocol analyzer. http:\/\/www.wireshark.org\/."}],"event":{"name":"ASIA CCS '14: 9th ACM Symposium on Information, Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Kyoto Japan","acronym":"ASIA CCS '14"},"container-title":["Proceedings of the 9th ACM symposium on Information, computer and communications security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2590296.2590310","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2590296.2590310","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T06:55:51Z","timestamp":1750229751000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2590296.2590310"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,6,4]]},"references-count":28,"alternative-id":["10.1145\/2590296.2590310","10.1145\/2590296"],"URL":"https:\/\/doi.org\/10.1145\/2590296.2590310","relation":{},"subject":[],"published":{"date-parts":[[2014,6,4]]},"assertion":[{"value":"2014-06-04","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}