{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:13:22Z","timestamp":1750306402059,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":6,"publisher":"ACM","license":[{"start":{"date-parts":[[2015,10,1]],"date-time":"2015-10-01T00:00:00Z","timestamp":1443657600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2015,10]]},"DOI":"10.1145\/2801948.2802030","type":"proceedings-article","created":{"date-parts":[[2015,9,22]],"date-time":"2015-09-22T12:31:10Z","timestamp":1442925070000},"page":"165-166","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Assessment and security issues in cloud computing services"],"prefix":"10.1145","author":[{"given":"Aristeidis","family":"Koutsouras","sequence":"first","affiliation":[{"name":"Technological Educational Institute of Athens, Ag. Spiridonos, Aigaleo"}]},{"given":"Dimosthenis","family":"Kougioumoutzakis","sequence":"additional","affiliation":[{"name":"Technological Educational Institute of Athens, Ag. Spiridonos, Aigaleo"}]},{"given":"Ioanna","family":"Kantzavelou","sequence":"additional","affiliation":[{"name":"Technological Educational Institute of Athens, Ag. Spiridonos, Aigaleo"}]}],"member":"320","published-online":{"date-parts":[[2015,10]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"crossref","unstructured":"Mell P. and Grance T. 2011. The NIST Definition of Cloud Computing NIST U.S. Dept. of Commerce Special Publication 800-145 Sep. 2011.  Mell P. and Grance T. 2011. The NIST Definition of Cloud Computing NIST U.S. Dept. of Commerce Special Publication 800-145 Sep. 2011.","DOI":"10.6028\/NIST.SP.800-145"},{"key":"e_1_3_2_1_2_1","first-page":"03","article-title":"Cloud Computing Environment: Problems in Implementation","volume":"01","author":"Sharma A.","year":"2012","journal-title":"International Journal of Computers & Distributed Systems"},{"key":"e_1_3_2_1_3_1","first-page":"02","article-title":"Investigation of Vulnerabilities in Cloud Environment: A Research Analysis","volume":"04","author":"Sharma A.","year":"2013","journal-title":"International Journal of Computer Science and Technology"},{"key":"e_1_3_2_1_4_1","unstructured":"Cross-site scripting The Open Web Application Security Project (OWASP) 2011. {Online} Available at: https:\/\/www.owasp.org\/index.php\/Cross-site_Scripting_%28XSS%29 (Accessed on 18\/2\/2015)  Cross-site scripting The Open Web Application Security Project (OWASP) 2011. {Online} Available at: https:\/\/www.owasp.org\/index.php\/Cross-site_Scripting_%28XSS%29 (Accessed on 18\/2\/2015)"},{"key":"e_1_3_2_1_5_1","unstructured":"JavaScript Edition of the OWASP ESAPI Toolkit 2011. {Online} Available at: https:\/\/www.owasp.org\/index.php\/ESAPI_JavaScript_Readme  JavaScript Edition of the OWASP ESAPI Toolkit 2011. {Online} Available at: https:\/\/www.owasp.org\/index.php\/ESAPI_JavaScript_Readme"},{"volume-title":"February, 2012. {Online} Available at: http:\/\/www.christian-schneider.net\/CsrfAndSameOriginXss.html (Accessed on 25\/2\/2015)","author":"Schneider C.","key":"e_1_3_2_1_6_1"}],"event":{"name":"PCI '15: 19th Panhellenic Conference on Informatics","acronym":"PCI '15","location":"Athens Greece"},"container-title":["Proceedings of the 19th Panhellenic Conference on Informatics"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2801948.2802030","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2801948.2802030","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T05:07:29Z","timestamp":1750223249000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2801948.2802030"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,10]]},"references-count":6,"alternative-id":["10.1145\/2801948.2802030","10.1145\/2801948"],"URL":"https:\/\/doi.org\/10.1145\/2801948.2802030","relation":{},"subject":[],"published":{"date-parts":[[2015,10]]},"assertion":[{"value":"2015-10-01","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}