{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:11:36Z","timestamp":1750306296348,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":14,"publisher":"ACM","license":[{"start":{"date-parts":[[2016,5,9]],"date-time":"2016-05-09T00:00:00Z","timestamp":1462752000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2016,5,9]]},"DOI":"10.1145\/2908446.2908459","type":"proceedings-article","created":{"date-parts":[[2016,11,4]],"date-time":"2016-11-04T12:49:08Z","timestamp":1478263748000},"page":"133-138","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["A Cloud Computing Security Framework Based on Cloud Security Trusted Authority"],"prefix":"10.1145","author":[{"given":"Mohammed M.","family":"Dawoud","sequence":"first","affiliation":[{"name":"Computer and Systems Engineering Department, Faculty of Engineering, Ain Shams University, Cairo, Egypt"}]},{"given":"Gamal A.","family":"Ebrahim","sequence":"additional","affiliation":[{"name":"Computer and Systems Engineering Department, Faculty of Engineering, Ain Shams University, Cairo, Egypt"}]},{"given":"Sameh A.","family":"Youssef","sequence":"additional","affiliation":[{"name":"Computer and Systems Engineering Department, Faculty of Engineering, Ain Shams University, Cairo, Egypt"}]}],"member":"320","published-online":{"date-parts":[[2016,5,9]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046752"},{"key":"e_1_3_2_1_2_1","volume-title":"A Guide to Physical Security for Data Centers. The Datacenter Journal (Jul","author":"Baker D.","year":"2012","unstructured":"Baker , D. 2012. A Guide to Physical Security for Data Centers. The Datacenter Journal (Jul . 2012 ). Baker, D. 2012. A Guide to Physical Security for Data Centers. The Datacenter Journal (Jul. 2012)."},{"key":"e_1_3_2_1_3_1","volume-title":"Security Guidance for Critical Areas of Focus in Cloud Computing, v. 3.0","author":"Cloud Security Alliance","year":"2011","unstructured":"Cloud Security Alliance . 2011. Security Guidance for Critical Areas of Focus in Cloud Computing, v. 3.0 ( 2011 ). Cloud Security Alliance. 2011. Security Guidance for Critical Areas of Focus in Cloud Computing, v. 3.0 (2011)."},{"key":"e_1_3_2_1_4_1","volume-title":"SecaaS implementation guidance. Category 1: Identity and access management (Sept","author":"Cloud Security Alliance","year":"2012","unstructured":"Cloud Security Alliance . 2012. SecaaS implementation guidance. Category 1: Identity and access management (Sept . 2012 ). Cloud Security Alliance. 2012. SecaaS implementation guidance. Category 1: Identity and access management (Sept. 2012)."},{"key":"e_1_3_2_1_5_1","volume-title":"Security for cloud computing: Ten steps to ensure success, v. 2 (Mar","author":"Cloud Standards Customer Council","year":"2015","unstructured":"Cloud Standards Customer Council . 2015. Security for cloud computing: Ten steps to ensure success, v. 2 (Mar . 2015 ). Cloud Standards Customer Council. 2015. Security for cloud computing: Ten steps to ensure success, v. 2 (Mar. 2015)."},{"key":"e_1_3_2_1_6_1","volume-title":"White paper","author":"Hansen J. H.","year":"2013","unstructured":"Hansen , J. H. 2013. How ISO 27001 revision affects your risk management process. Neupart Information Security management , White paper ( 2013 ). Hansen, J. H. 2013. How ISO 27001 revision affects your risk management process. Neupart Information Security management, White paper (2013)."},{"key":"e_1_3_2_1_7_1","volume-title":"Proceedings of CSA Congress 2013","author":"Hibbard E. A.","year":"2013","unstructured":"Hibbard , E. A. 2013 . Latest in Cloud Computing Standards . In Proceedings of CSA Congress 2013 ( Orlando, FL , Dec. 2013). Hibbard, E. A. 2013. Latest in Cloud Computing Standards. In Proceedings of CSA Congress 2013 (Orlando, FL, Dec. 2013)."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.istr.2011.08.001"},{"key":"e_1_3_2_1_9_1","volume-title":"Cloud Computing Security Issues and Challenges. In Proceedings of the 33rd International Convention MIPRO","author":"Popovi\u0107 K.","year":"2010","unstructured":"Popovi\u0107 , K. and Hocenski , Z . 2010 . Cloud Computing Security Issues and Challenges. In Proceedings of the 33rd International Convention MIPRO ( Opatija, Croatia , May 2010 ), 344--349. Popovi\u0107, K. and Hocenski, Z. 2010. Cloud Computing Security Issues and Challenges. In Proceedings of the 33rd International Convention MIPRO (Opatija, Croatia, May 2010), 344--349."},{"key":"e_1_3_2_1_10_1","first-page":"6","article-title":"A systematic review of information security governance frameworks in the cloud computing environment. Journal of Universal Computer Science (J.","volume":"18","author":"Rebollo O.","year":"2012","unstructured":"Rebollo , O. , Mellado , D. , and Fernandez-Medina , E. 2012 . A systematic review of information security governance frameworks in the cloud computing environment. Journal of Universal Computer Science (J. UCS) 18 , 6 (Jun. 2012), 798--815. Rebollo, O., Mellado, D., and Fernandez-Medina, E. 2012. A systematic review of information security governance frameworks in the cloud computing environment. Journal of Universal Computer Science (J.UCS) 18, 6 (Jun. 2012), 798--815.","journal-title":"UCS)"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCC.2014.20"},{"key":"e_1_3_2_1_12_1","first-page":"5","article-title":"A Security framework in cloud computing infrastructure","volume":"5","author":"Ukil A.","year":"2013","unstructured":"Ukil , A. , Jana , D. , and De Sarkar , A. 2013 . A Security framework in cloud computing infrastructure . International Journal of Network Security & Its Applications (IJNSA) 5 , 5 (Sept. 2013), 11--24. Ukil, A., Jana, D., and De Sarkar, A. 2013. A Security framework in cloud computing infrastructure. International Journal of Network Security & Its Applications (IJNSA) 5, 5 (Sept. 2013), 11--24.","journal-title":"International Journal of Network Security & Its Applications (IJNSA)"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/CC.2014.6911084"},{"key":"e_1_3_2_1_14_1","first-page":"4","article-title":"A framework for secure cloud computing","volume":"9","author":"Youssef A. E.","year":"2012","unstructured":"Youssef , A. E. and Alageel , M. 2012 . A framework for secure cloud computing . International Journal of Computer Science Issues (IJCSI) 9 , 4 (Jul. 2012), 487--500. Youssef, A. E. and Alageel, M. 2012. A framework for secure cloud computing. International Journal of Computer Science Issues (IJCSI) 9, 4 (Jul. 2012), 487--500.","journal-title":"International Journal of Computer Science Issues (IJCSI)"}],"event":{"name":"INFOS '16: The 10th International Conference on Informatics and Systems","acronym":"INFOS '16","location":"Giza Egypt"},"container-title":["Proceedings of the 10th International Conference on Informatics and Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2908446.2908459","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2908446.2908459","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:39:12Z","timestamp":1750221552000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2908446.2908459"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,5,9]]},"references-count":14,"alternative-id":["10.1145\/2908446.2908459","10.1145\/2908446"],"URL":"https:\/\/doi.org\/10.1145\/2908446.2908459","relation":{},"subject":[],"published":{"date-parts":[[2016,5,9]]},"assertion":[{"value":"2016-05-09","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}