{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T13:54:31Z","timestamp":1763474071953,"version":"3.45.0"},"publisher-location":"New York, NY, USA","reference-count":47,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,12,5]],"date-time":"2017-12-05T00:00:00Z","timestamp":1512432000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,12,5]]},"DOI":"10.1145\/3147234.3148098","type":"proceedings-article","created":{"date-parts":[[2017,12,6]],"date-time":"2017-12-06T16:25:26Z","timestamp":1512577526000},"page":"233-238","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["A Multi-layered Cloud Protection Framework"],"prefix":"10.1145","author":[{"given":"Saad","family":"Khan","sequence":"first","affiliation":[{"name":"University of Huddersfield, Huddersfield, United Kingdom"}]},{"given":"Simon","family":"Parkinson","sequence":"additional","affiliation":[{"name":"University of Huddersfield, Huddersfield, United Kingdom"}]},{"given":"Andrew","family":"Crampton","sequence":"additional","affiliation":[{"name":"University of Huddersfield, Huddersfield, United Kingdom"}]}],"member":"320","published-online":{"date-parts":[[2017,12,5]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"A Reliable User Authentication and Data Protection Model in Cloud Computing Environments. arXiv preprint arXiv:1508.01703","author":"Ahmadi Mohammad","year":"2015","unstructured":"Mohammad Ahmadi, Mostafa Vali, Farez Moghaddam, Aida Hakemi, and Kasra Madadipouya. 2015. A Reliable User Authentication and Data Protection Model in Cloud Computing Environments. arXiv preprint arXiv:1508.01703 (2015)."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/ITNG.2015.101"},{"key":"e_1_3_2_1_3_1","first-page":"657","article-title":"Systems and methods for state-less authentication. (Feb. 2 2010)","volume":"7","author":"Bisbee Stephen F.","year":"2010","unstructured":"Stephen F. Bisbee, Jack J. Moskowitz, Keith F. Becker, Ellis K. Peterson, and GordonWTwaddell. 2010. Systems and methods for state-less authentication. (Feb. 2 2010). US Patent 7,657,531.","journal-title":"US Patent"},{"key":"e_1_3_2_1_4_1","volume-title":"Workshop on Information Assurance and Security","volume":"1","author":"Blazek Rudolf B.","year":"2001","unstructured":"Rudolf B. Blazek, Hongjoong Kim, Boris Rozovskii, and Alexander Tartakovsky. 2001. A novel approach to detection of \"denial-of-service\" attacks via adaptive sequential and batch-sequential change-point detection methods. In Workshop on Information Assurance and Security, Vol. 1. 0930."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/CCEM.2014.7015481"},{"volume-title":"Wireless Computing and Networking (GCWCN), 2014 IEEE Global Conference on. IEEE, 203--207","author":"Bongale Anupkumar M.","key":"e_1_3_2_1_6_1","unstructured":"Anupkumar M. Bongale, N. Nithin, and C.R. Nirmala. 2014. LRXE: Lite-RSA for XML Encryption suitable for computational constraint devices. In Wireless Computing and Networking (GCWCN), 2014 IEEE Global Conference on. IEEE, 203--207."},{"key":"e_1_3_2_1_7_1","volume-title":"Risk and Trust (PASSAT) and 2011 IEEE Third Inernational Conference on Social Computing (SocialCom), 2011 IEEE Third International Conference on. IEEE, 1269--1272","author":"Chen Boyan","year":"2011","unstructured":"Boyan Chen, Pavol Zavarsky, Ron Ruhl, and Dale Lindskog. 2011. A Study of the Effectiveness of CSRF Guard. In Privacy, Security, Risk and Trust (PASSAT) and 2011 IEEE Third Inernational Conference on Social Computing (SocialCom), 2011 IEEE Third International Conference on. IEEE, 1269--1272."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2014.12.001"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.3243"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/CloudTech.2015.7337011"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/CLOUD.2015.75"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1002\/sec.1231"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1049\/iet-com.2013.0898"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/2448556.2448592"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/CCST.2010.5678682"},{"key":"e_1_3_2_1_16_1","volume-title":"Joseph and Matthew Fischer","author":"Elizabeth","year":"2017","unstructured":"Elizabeth K. Joseph and Matthew Fischer. 2017. Common Openstack deployments: real world examples for systems adminstrators and engineers. Prentice Hall."},{"key":"e_1_3_2_1_17_1","volume-title":"Communication & Automation (ICCCA), 2015 International Conference on. IEEE, 691--694","author":"Kajal Neha","year":"2015","unstructured":"Neha Kajal, Nikhat Ikram, et al. 2015. Security threats in cloud computing. In Computing, Communication & Automation (ICCCA), 2015 International Conference on. IEEE, 691--694."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICAICT.2012.6398491"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/AERO.2016.7500522"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10515-015-0178-2"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11859-015-1097-6"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2010.143"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1515\/jhsem-2014-0034"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICITEC.2014.7105617"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSC.2011.6138516"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1016\/S1353-4858(14)70104-7"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"crossref","unstructured":"Peter Mell Tim Grance et al. 2011. The NIST definition of cloud computing. (2011).","DOI":"10.6028\/NIST.SP.800-145"},{"key":"e_1_3_2_1_28_1","article-title":"Mitigating DoS to authenticated cloud REST APIs","volume":"2014","author":"Michelin Regio A.","year":"2014","unstructured":"Regio A. Michelin, Avelino F. Zorzo, and Cesar A. De Rose. 2014. Mitigating DoS to authenticated cloud REST APIs. In Internet Technology and Secured Transactions (ICITST), 2014 9th International Conference for. IEEE, 106--111.","journal-title":"Internet Technology and Secured Transactions (ICITST)"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11390-015-1550-1"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.19030\/rbis.v17i4.8238"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2016.02.027"},{"volume-title":"Deploying openstack. \"O'Reilly Media","author":"Pepple Ken","key":"e_1_3_2_1_32_1","unstructured":"Ken Pepple. 2011. Deploying openstack. \"O'Reilly Media, Inc.\"."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCRD.2011.5764279"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/HPCC.2014.183"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/2693841"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.5120\/8738-2991"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2015.04.192"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.14257\/ijgdc.2014.7.4.02"},{"volume-title":"Proceedings of the UGC Sponsored National Conference on Advanced Networking and Applications.","author":"Suresh Mrs Dhina","key":"e_1_3_2_1_39_1","unstructured":"Mrs Dhina Suresh and M. Lilly Florence. 2015. RSA Algorithm & Signature In Cloud A Review. In Proceedings of the UGC Sponsored National Conference on Advanced Networking and Applications."},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.4236\/jis.2015.62013"},{"key":"e_1_3_2_1_41_1","volume-title":"SECURWARE 2014","author":"Figueiredo Vitti Pedro Artur","year":"2014","unstructured":"Pedro Artur Figueiredo Vitti, Daniel Ricardo dos Santos, Carlos Becker Westphall, Carla Merkle Westphall, and Kleber Magno Maciel Vieira. 2014. Current issues in cloud computing security and management. SECURWARE 2014 (2014), 47."},{"key":"e_1_3_2_1_42_1","volume-title":"Cloud computing trends: 2016 state of the cloud survey. Right Scale","author":"Weins Kim","year":"2016","unstructured":"Kim Weins. 2016. Cloud computing trends: 2016 state of the cloud survey. Right Scale (2016)."},{"key":"e_1_3_2_1_43_1","first-page":"418","article-title":"Elastic Extension Tables for Multi-tenant Cloud Applications","volume":"14","author":"Yaish Haitham","year":"2016","unstructured":"Haitham Yaish, Madhu Goyal, and George Feuerlicht. 2016. Elastic Extension Tables for Multi-tenant Cloud Applications. International Journal of Computer Science and Information Security 14, 6 (2016), 418.","journal-title":"International Journal of Computer Science and Information Security"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2015.2487361"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.5555\/1964505.1964530"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2014.2366741"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2014.2363474"}],"event":{"name":"UCC '17: 10th International Conference on Utility and Cloud Computing","sponsor":["IEEE TCSC IEEE Technical Committee on Scalable Computing","SIGARCH ACM Special Interest Group on Computer Architecture"],"location":"Austin Texas USA","acronym":"UCC '17"},"container-title":["Companion Proceedings of the10th International Conference on Utility and Cloud Computing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3147234.3148098","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3147234.3148098","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T13:52:28Z","timestamp":1763473948000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3147234.3148098"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,12,5]]},"references-count":47,"alternative-id":["10.1145\/3147234.3148098","10.1145\/3147234"],"URL":"https:\/\/doi.org\/10.1145\/3147234.3148098","relation":{},"subject":[],"published":{"date-parts":[[2017,12,5]]},"assertion":[{"value":"2017-12-05","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}