{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:30:57Z","timestamp":1750221057155,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":5,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,10,11]],"date-time":"2018-10-11T00:00:00Z","timestamp":1539216000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,10,11]]},"DOI":"10.1145\/3267809.3275470","type":"proceedings-article","created":{"date-parts":[[2018,9,28]],"date-time":"2018-09-28T18:00:41Z","timestamp":1538157641000},"page":"528-528","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Drishti"],"prefix":"10.1145","author":[{"given":"Shripad","family":"Nadgowda","sequence":"first","affiliation":[{"name":"IBM T.J. Watson Research Center"}]},{"given":"Canturk","family":"Isci","sequence":"additional","affiliation":[{"name":"IBM T.J. Watson Research Center"}]}],"member":"320","published-online":{"date-parts":[[2018,10,11]]},"reference":[{"key":"e_1_3_2_1_1_1","first-page":"676","article-title":"Remote data protection in a networked storage computing environment. (March 18 2014)","volume":"8","author":"Goodman David P","year":"2014","unstructured":"David P Goodman , Sandeep Gopisetty , Shripad Nadgowda , and Ramani Ranjan Routray . 2014 . Remote data protection in a networked storage computing environment. (March 18 2014) . US Patent 8 , 676 ,763. David P Goodman, Sandeep Gopisetty, Shripad Nadgowda, and Ramani Ranjan Routray. 2014. Remote data protection in a networked storage computing environment. (March 18 2014). US Patent 8,676,763.","journal-title":"US Patent"},{"key":"e_1_3_2_1_2_1","unstructured":"IBM. 2015. Managing container and image security with Vulnerability Advisor. https:\/\/console.bluemix.net\/docs\/containers\/va\/. (2015).  IBM. 2015. Managing container and image security with Vulnerability Advisor. https:\/\/console.bluemix.net\/docs\/containers\/va\/. (2015)."},{"key":"e_1_3_2_1_3_1","unstructured":"Ricardo Koller Canturk Isci Sahil Suneja and Eyal De Lara. 2015. Unified Monitoring and Analytics in the Cloud.. In HotCloud.   Ricardo Koller Canturk Isci Sahil Suneja and Eyal De Lara. 2015. Unified Monitoring and Analytics in the Cloud.. In HotCloud."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/3154448.3154455"},{"key":"e_1_3_2_1_5_1","volume-title":"Understanding Security Implications of Using Containers in the Cloud. In 2017 USENIX Annual Technical Conference USENIX ATC 17","author":"Tak Byungchul","year":"2017","unstructured":"Byungchul Tak , Canturk Isci , Sastry Duri , Nilton Bila , Shripad Nadgowda , and James Doran . 2017 . Understanding Security Implications of Using Containers in the Cloud. In 2017 USENIX Annual Technical Conference USENIX ATC 17 . USENIX Association, 313--319. Byungchul Tak, Canturk Isci, Sastry Duri, Nilton Bila, Shripad Nadgowda, and James Doran. 2017. Understanding Security Implications of Using Containers in the Cloud. In 2017 USENIX Annual Technical Conference USENIX ATC 17. USENIX Association, 313--319."}],"event":{"name":"SoCC '18: ACM Symposium on Cloud Computing","sponsor":["SIGMOD ACM Special Interest Group on Management of Data","SIGOPS ACM Special Interest Group on Operating Systems"],"location":"Carlsbad CA USA","acronym":"SoCC '18"},"container-title":["Proceedings of the ACM Symposium on Cloud Computing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3267809.3275470","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3267809.3275470","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T00:44:31Z","timestamp":1750207471000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3267809.3275470"}},"subtitle":["Disaggregated and Interoperable Security Analytics Framework for Cloud"],"short-title":[],"issued":{"date-parts":[[2018,10,11]]},"references-count":5,"alternative-id":["10.1145\/3267809.3275470","10.1145\/3267809"],"URL":"https:\/\/doi.org\/10.1145\/3267809.3275470","relation":{},"subject":[],"published":{"date-parts":[[2018,10,11]]},"assertion":[{"value":"2018-10-11","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}