{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:50:16Z","timestamp":1750308616557,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":15,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,2,26]],"date-time":"2017-02-26T00:00:00Z","timestamp":1488067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,2,26]]},"DOI":"10.1145\/3056662.3056705","type":"proceedings-article","created":{"date-parts":[[2017,5,1]],"date-time":"2017-05-01T15:09:30Z","timestamp":1493651370000},"page":"181-185","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["TrustDocs"],"prefix":"10.1145","author":[{"given":"Mohammadshareefuddin","family":"Salash-arong","sequence":"first","affiliation":[{"name":"Chulalongkorn University, Bangkok, Thailand"}]},{"given":"Natawut","family":"Nupairoj","sequence":"additional","affiliation":[{"name":"Chulalongkorn University, Bangkok, Thailand"}]}],"member":"320","published-online":{"date-parts":[[2017,2,26]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICPP.2013.56"},{"key":"e_1_3_2_1_2_1","unstructured":"J. Kincaid September 2010 Google confirms that it fired engineer for breaking internal privacy policies Available:http:\/\/techcrunch.com\/2010\/09\/14\/google-engineer-spying-fired\/Chu (last access June 21 2016) J. Kincaid September 2010 Google confirms that it fired engineer for breaking internal privacy policies Available:http:\/\/techcrunch.com\/2010\/09\/14\/google-engineer-spying-fired\/Chu (last access June 21 2016)"},{"key":"e_1_3_2_1_3_1","unstructured":"Google Google terms of service April 2014 https:\/\/www.google.com\/intl\/en\/policies\/terms Google Google terms of service April 2014 https:\/\/www.google.com\/intl\/en\/policies\/terms"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"crossref","unstructured":"Bicakci K. Yavuz D. D. & Gurkan S. (2016). TwinCloud: Secure Cloud Sharing Without Explicit Key Management. arXiv preprint arXiv:1606.04705.DOI= https:\/\/arxiv.org\/abs\/1606.04705 Bicakci K. Yavuz D. D. & Gurkan S. (2016). TwinCloud: Secure Cloud Sharing Without Explicit Key Management. arXiv preprint arXiv:1606.04705.DOI= https:\/\/arxiv.org\/abs\/1606.04705","DOI":"10.1109\/CNS.2016.7860552"},{"key":"e_1_3_2_1_5_1","unstructured":"Bamrah G. S. & Pandey 2014 A. Analyzing the Security Schemes of Various Cloud Storage Services. http:\/\/ece.gmu.edu\/coursewebpages\/ECE\/ECE646\/F15\/project\/F15_Project_Resources\/F14_Cloud_Storage_report.pdf Bamrah G. S. & Pandey 2014 A. Analyzing the Security Schemes of Various Cloud Storage Services. http:\/\/ece.gmu.edu\/coursewebpages\/ECE\/ECE646\/F15\/project\/F15_Project_Resources\/F14_Cloud_Storage_report.pdf"},{"key":"e_1_3_2_1_6_1","unstructured":"Best Free Encryption Utility for Cloud Storage http:\/\/www.techsupportalert.com\/best-free-encryption-utility-for-cloud-stora Best Free Encryption Utility for Cloud Storage http:\/\/www.techsupportalert.com\/best-free-encryption-utility-for-cloud-stora"},{"key":"e_1_3_2_1_7_1","unstructured":"A. Ferdowsi Yesterday's Authentication Bug Dropbox Blog June 2011 https:\/\/blogs.dropbox.com\/dropbox\/2011\/06\/yesterdays-authentication-bug\/ A. Ferdowsi Yesterday's Authentication Bug Dropbox Blog June 2011 https:\/\/blogs.dropbox.com\/dropbox\/2011\/06\/yesterdays-authentication-bug\/"},{"volume-title":"Internet Technology and Secured Transactions, 2012 International Conference for (pp. 589--595)","year":"2012","author":"Michalas A.","key":"e_1_3_2_1_8_1"},{"key":"e_1_3_2_1_9_1","first-page":"337","volume-title":"OSDI (Vol. 10","author":"Feldman A. J.","year":"2010"},{"key":"e_1_3_2_1_10_1","unstructured":"SafeGDocs A secure way to work with Google Docs documents http:\/\/www.safegdocs.com\/ SafeGDocs A secure way to work with Google Docs documents http:\/\/www.safegdocs.com\/"},{"key":"e_1_3_2_1_11_1","unstructured":"Boxcryptor - Chrome Web Store - Google https:\/\/chrome.google.com\/webstore\/detail\/boxcryptor\/ijmndaodmdjamfepoijpolhjddgfgmme Boxcryptor - Chrome Web Store - Google https:\/\/chrome.google.com\/webstore\/detail\/boxcryptor\/ijmndaodmdjamfepoijpolhjddgfgmme"},{"key":"e_1_3_2_1_12_1","unstructured":"Fogpad - Chrome Web Store - Google; https:\/\/chrome.google.com\/webstore\/detail\/fogpad\/akpccnipkpejnigppmpalammcodfbonj Fogpad - Chrome Web Store - Google; https:\/\/chrome.google.com\/webstore\/detail\/fogpad\/akpccnipkpejnigppmpalammcodfbonj"},{"key":"e_1_3_2_1_13_1","unstructured":"TrustDocs - Google Docs add-on. https:\/\/chrome.google.com\/webstore\/detail\/trustdocs\/mghcpeobheaiohijlhbdgeeagbjhadok TrustDocs - Google Docs add-on. https:\/\/chrome.google.com\/webstore\/detail\/trustdocs\/mghcpeobheaiohijlhbdgeeagbjhadok"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"crossref","unstructured":"Lerman L. Markowitch O. Nakahara Jr J. & Samarati P. P. (2012 July). Key Management as a Service. In SECRYPT (pp. 276--281). Lerman L. Markowitch O. Nakahara Jr J. & Samarati P. P. (2012 July). Key Management as a Service. In SECRYPT (pp. 276--281).","DOI":"10.5220\/0004071102760281"},{"key":"e_1_3_2_1_15_1","unstructured":"Parvathi S. S. L. & Reddy B. S. Trust Your Cloud 2014 Service Provider: User Based Crypto Model. Research and Applications ISSN : 2248--9622 Vol. 4 Issue 10(Part - 6) pp. 127--134 Parvathi S. S. L. & Reddy B. S. Trust Your Cloud 2014 Service Provider: User Based Crypto Model. Research and Applications ISSN : 2248--9622 Vol. 4 Issue 10(Part - 6) pp. 127--134"}],"event":{"name":"ICSCA 2017: 2017 6th International Conference on Software and Computer Applications","acronym":"ICSCA 2017","location":"Bangkok Thailand"},"container-title":["Proceedings of the 6th International Conference on Software and Computer Applications"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3056662.3056705","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3056662.3056705","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T19:07:31Z","timestamp":1750273651000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3056662.3056705"}},"subtitle":["Google Docs add-on securing document in untrusted cloud-based environment"],"short-title":[],"issued":{"date-parts":[[2017,2,26]]},"references-count":15,"alternative-id":["10.1145\/3056662.3056705","10.1145\/3056662"],"URL":"https:\/\/doi.org\/10.1145\/3056662.3056705","relation":{},"subject":[],"published":{"date-parts":[[2017,2,26]]},"assertion":[{"value":"2017-02-26","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}