{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:11:02Z","timestamp":1750306262294,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":7,"publisher":"ACM","license":[{"start":{"date-parts":[[2016,11,26]],"date-time":"2016-11-26T00:00:00Z","timestamp":1480118400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"CERNET Innovation Project","award":["NGII20151203"],"award-info":[{"award-number":["NGII20151203"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2016,11,26]]},"DOI":"10.1145\/3017971.3017985","type":"proceedings-article","created":{"date-parts":[[2017,1,17]],"date-time":"2017-01-17T13:45:20Z","timestamp":1484660720000},"page":"30-34","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Comparison of Security Frameworks for Governmental Clouds between United States and European Union"],"prefix":"10.1145","author":[{"given":"Zhilong","family":"Wang","sequence":"first","affiliation":[{"name":"College of Information Science and Engineering, Ocean University of China, Qingdao, Shandong, China"}]},{"given":"Tao","family":"Zhang","sequence":"additional","affiliation":[{"name":"College of Information Science and Engineering, Ocean University of China, Qingdao, Shandong, China"}]},{"given":"Yu","family":"Yang","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Haidian District, Beijing, China"}]},{"given":"Haipeng","family":"Qu","sequence":"additional","affiliation":[{"name":"College of Information Science and Engineering, Ocean University of China, Qingdao, Shandong, China"}]}],"member":"320","published-online":{"date-parts":[[2016,11,26]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/SERVICES.2011.105"},{"key":"e_1_3_2_1_2_1","volume-title":"Mell and Timothy Grance","author":"Peter M.","year":"2011","unstructured":"Peter M. Mell and Timothy Grance . 2011 . SP 800--145. the NIST Definition of Cloud Computing. Technical Report. NIST, Gaithersburg, MD, United States . Peter M. Mell and Timothy Grance. 2011. SP 800--145. the NIST Definition of Cloud Computing. Technical Report. NIST, Gaithersburg, MD, United States."},{"key":"e_1_3_2_1_3_1","unstructured":"ENISA(2015).\"Security Framework for Govenmental Clouds\". Available online at http:\/\/www.enisa.europa.eu\/activities\/Resilience-and-CIIP\/cloud-computing\/governmental-cloud-security\/security-framework-for-govenmental-clouds\/security-framework-for-governmental-clouds\/at_download\/fullReport Feb 2015.  ENISA(2015).\"Security Framework for Govenmental Clouds\". Available online at http:\/\/www.enisa.europa.eu\/activities\/Resilience-and-CIIP\/cloud-computing\/governmental-cloud-security\/security-framework-for-govenmental-clouds\/security-framework-for-governmental-clouds\/at_download\/fullReport Feb 2015."},{"key":"e_1_3_2_1_4_1","volume-title":"Cloud Computing: Benefits, Risks and Recommendations for Information Security. Web Application Security","author":"Catteddu D.","year":"2010","unstructured":"Catteddu , D. ( 2010 ). Cloud Computing: Benefits, Risks and Recommendations for Information Security. Web Application Security . Springer Berlin Heidelberg . Catteddu, D. (2010). Cloud Computing: Benefits, Risks and Recommendations for Information Security. Web Application Security. Springer Berlin Heidelberg."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.giq.2010.01.002"},{"key":"e_1_3_2_1_6_1","unstructured":"NIST. \"NIST Cloud Computing Security Reference Architecture\". Available online at http:\/\/collaborate.nist.gov\/twiki-cloud-computing\/pub\/CloudComputing\/CloudSecurity\/NIST_Security_Reference_Architecture_2013.05.15_v1.0.pdf  NIST. \"NIST Cloud Computing Security Reference Architecture\". Available online at http:\/\/collaborate.nist.gov\/twiki-cloud-computing\/pub\/CloudComputing\/CloudSecurity\/NIST_Security_Reference_Architecture_2013.05.15_v1.0.pdf"},{"key":"e_1_3_2_1_7_1","unstructured":"Iorga Michaela. \"Challenging Security Requirements for US Government Cloud Computing Adoption.\" NIST (2012).  Iorga Michaela. \"Challenging Security Requirements for US Government Cloud Computing Adoption.\" NIST (2012)."}],"event":{"name":"ICCNS '16: 6th International Conference on Communication and Network Security","acronym":"ICCNS '16","location":"Singapore Singapore"},"container-title":["Proceedings of the 6th International Conference on Communication and Network Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3017971.3017985","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3017971.3017985","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:24:17Z","timestamp":1750220657000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3017971.3017985"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,11,26]]},"references-count":7,"alternative-id":["10.1145\/3017971.3017985","10.1145\/3017971"],"URL":"https:\/\/doi.org\/10.1145\/3017971.3017985","relation":{},"subject":[],"published":{"date-parts":[[2016,11,26]]},"assertion":[{"value":"2016-11-26","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}