{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,9]],"date-time":"2026-01-09T15:03:26Z","timestamp":1767971006050,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":13,"publisher":"ACM","license":[{"start":{"date-parts":[[2016,3,4]],"date-time":"2016-03-04T00:00:00Z","timestamp":1457049600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2016,3,4]]},"DOI":"10.1145\/2905055.2905315","type":"proceedings-article","created":{"date-parts":[[2016,8,26]],"date-time":"2016-08-26T12:40:09Z","timestamp":1472215209000},"page":"1-5","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":5,"title":["Security Challenges of Virtualization in Cloud Computing"],"prefix":"10.1145","author":[{"given":"Manjeet","family":"Gupta","sequence":"first","affiliation":[{"name":"Uttarakhand Technical University, Dehradun"}]},{"given":"Devesh Kumar","family":"Srivastava","sequence":"additional","affiliation":[{"name":"Manipal University, Jaipur"}]},{"given":"Durg Singh","family":"Chauhan","sequence":"additional","affiliation":[{"name":"G.L.A University, Mathura"}]}],"member":"320","published-online":{"date-parts":[[2016,3,4]]},"reference":[{"key":"e_1_3_2_1_1_1","first-page":"407","volume-title":"CMG Conference","author":"Virtualization Daniel A.","year":"2005","unstructured":"Menasce, Daniel A. \" Virtualization : Concepts, applications, and performance modeling.\" In Int . CMG Conference , pp. 407 -- 414 . 2005 . Menasce, Daniel A. \"Virtualization: Concepts, applications, and performance modeling.\" In Int. CMG Conference, pp. 407--414. 2005."},{"key":"e_1_3_2_1_2_1","first-page":"V3","article-title":"Virtualization Technology in Cloud Computing Environment","author":"Koganti Tej","year":"2013","unstructured":"Tej Koganti , Krishna, Eswar Patnala , Sai Sagar Narasingu , and J. N. Chaitanya . \" Virtualization Technology in Cloud Computing Environment .\" International Journal of Emerging Technology and Advanced Engineering V3 ( 2013 ). Tej Koganti, Krishna, Eswar Patnala, Sai Sagar Narasingu, and J. N. Chaitanya. \"Virtualization Technology in Cloud Computing Environment.\" International Journal of Emerging Technology and Advanced Engineering V3 (2013).","journal-title":"International Journal of Emerging Technology and Advanced Engineering"},{"key":"e_1_3_2_1_3_1","volume-title":"Proceedings of 4th IRF International Conference, Pune, 16th March-2014","author":"Amazon's Aishwarya Anand","unstructured":"Aishwarya Anand \" Amazon's Approach to Cloud Security\" Proceedings of 4th IRF International Conference, Pune, 16th March-2014 , ISBN: 978-93-82702-66-5 pp. 173--178, 2014 Aishwarya Anand \"Amazon's Approach to Cloud Security\" Proceedings of 4th IRF International Conference, Pune, 16th March-2014, ISBN: 978-93-82702-66-5 pp. 173--178, 2014"},{"key":"e_1_3_2_1_4_1","unstructured":"https:\/\/www.google.co.in\/trends\/explore#q=cloud%20computing%20security  https:\/\/www.google.co.in\/trends\/explore#q=cloud%20computing%20security"},{"key":"e_1_3_2_1_5_1","first-page":"35","volume-title":"2010 IEEE International Carnahan Conference on","author":"Shah Payal","year":"2010","unstructured":"Jasti, Amarnath, Payal Shah , Rajeev Nagaraj , and Ravi Pendse . \"Security in multi-tenancy cloud.\" In Security Technology (ICCST) , 2010 IEEE International Carnahan Conference on , pp. 35 -- 41 . IEEE, 2010 . Jasti, Amarnath, Payal Shah, Rajeev Nagaraj, and Ravi Pendse. \"Security in multi-tenancy cloud.\" In Security Technology (ICCST), 2010 IEEE International Carnahan Conference on, pp. 35--41. IEEE, 2010."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.4236\/ijcns.2015.87026"},{"key":"e_1_3_2_1_7_1","first-page":"222","volume-title":"Volume-2, Issue-3","author":"Desai Ankita","year":"2013","unstructured":"Ankita Desai , Rachana Oza , Pratik Sharma , Bhautik Patel \" Hypervisor : A Survey on Concepts and Taxonomy\" International Journal of Innovative Technology and Exploring Engineering (IJITEE) ISSN: 2278--3075 , Volume-2, Issue-3 , February 2013 pp. 222 -- 225 Ankita Desai, Rachana Oza, Pratik Sharma, Bhautik Patel \"Hypervisor: A Survey on Concepts and Taxonomy\" International Journal of Innovative Technology and Exploring Engineering (IJITEE) ISSN: 2278--3075, Volume-2, Issue-3, February 2013 pp. 222--225"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1186\/1869-0238-4-5"},{"key":"e_1_3_2_1_9_1","unstructured":"Husain Zeshan and Akshay Gummadi. \"Vulnerabilities in Cloud Computing.\" http:\/\/www.chinacloud.cn\/upload\/2013-05\/13050613111874.pdf (2013).  Husain Zeshan and Akshay Gummadi. \"Vulnerabilities in Cloud Computing.\" http:\/\/www.chinacloud.cn\/upload\/2013-05\/13050613111874.pdf (2013)."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1186\/2192-113X-1-11"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.sysarc.2014.07.004"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-16120-9_9"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046660.2046664"}],"event":{"name":"ICTCS '16: Second International Conference on Information and Communication Technology for Competitive Strategies","location":"Udaipur India","acronym":"ICTCS '16"},"container-title":["Proceedings of the Second International Conference on Information and Communication Technology for Competitive Strategies"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2905055.2905315","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2905055.2905315","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:38:46Z","timestamp":1750221526000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2905055.2905315"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,3,4]]},"references-count":13,"alternative-id":["10.1145\/2905055.2905315","10.1145\/2905055"],"URL":"https:\/\/doi.org\/10.1145\/2905055.2905315","relation":{},"subject":[],"published":{"date-parts":[[2016,3,4]]},"assertion":[{"value":"2016-03-04","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}