{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:27:34Z","timestamp":1750220854583,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":10,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,8,23]],"date-time":"2019-08-23T00:00:00Z","timestamp":1566518400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,8,23]]},"DOI":"10.1145\/3357419.3357420","type":"proceedings-article","created":{"date-parts":[[2019,10,11]],"date-time":"2019-10-11T15:16:45Z","timestamp":1570807005000},"page":"1-5","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Design and Application of a Service Outsourcing Cloud for the Insurance Industry"],"prefix":"10.1145","author":[{"given":"Huaihai","family":"Hui","sequence":"first","affiliation":[{"name":"School of Economics and Management, Chinese Academy of Sciences, Beijing, P.R.C."}]},{"given":"Des","family":"McLernon","sequence":"additional","affiliation":[{"name":"School of Electronic and Electrical Engineering, University of Leeds, Leeds, United Kingdom"}]}],"member":"320","published-online":{"date-parts":[[2019,8,23]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/1721654.1721672"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2018.04.057"},{"key":"e_1_3_2_1_3_1","volume-title":"China financial publishing","author":"Zhou","year":"2016","unstructured":"Zhou daoxu, Liu Li and Yang jingzhao.2016.Studies of China's insurance industry development, China financial publishing house, 2016."},{"key":"e_1_3_2_1_4_1","first-page":"13","volume-title":"lessons, trends, and enduring challenges","author":"Lacity Mary C.","unstructured":"Mary C. Lacity, Leslie P. Willcocks.2008.Global outsourcing of back office services: lessons, trends, and enduring challenges, Strategic Outsourcing: An International Journal, Vol. 1 Issue: 1, pp. 13--34."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/2792980"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2016.7437025"},{"key":"e_1_3_2_1_7_1","volume-title":"MPI-SWS. MPI-SWS. Retrieved","author":"Vahldiek Anjo","year":"2015","unstructured":"Anjo Vahldiek, Eslam Elnikety, Aastha Mehta, Deepak Garg, Peter Druschel, Ansley Post, Rodrigo Rodrigues, and Johannes Gehrke. 2015. Guardat: A Foundation for Policy-Protected Data. Technical Report 014-002, MPI-SWS. MPI-SWS. Retrieved December 24, 2015."},{"key":"e_1_3_2_1_8_1","first-page":"1","volume-title":"World Conference on Futuristic Trends in Research and Innovation for Social Welfare.","author":"Jayapandian N.","unstructured":"N.Jayapandian,A.M.J.Md.ZubairRahman,S.Radhikadevi and M.Koushikaa,2016. Enhanced cloud security framework to confirm data security on asymmetric and symmetric key encryption. 2016. World Conference on Futuristic Trends in Research and Innovation for Social Welfare. pp. 1--4."},{"key":"e_1_3_2_1_9_1","first-page":"101","article-title":"A trusted IaaS environment with hardware security module. Services Computing","author":"Seol J.","year":"2015","unstructured":"J. Seol, S. Jin, D. Lee, J. Huh, and S. Maeng. 2015. A trusted IaaS environment with hardware security module. Services Computing, IEEE Transactions on pp. 101--106.","journal-title":"IEEE Transactions on"},{"key":"e_1_3_2_1_10_1","first-page":"395","article-title":"Preventing cache-based side-channel attacks in a cloud environment. Cloud Computing","author":"Godfrey M.","year":"2014","unstructured":"M. Godfrey and M. Zulkernine. 2014. Preventing cache-based side-channel attacks in a cloud environment. Cloud Computing, IEEE Transactions on pp. 395--409.","journal-title":"IEEE Transactions on"}],"event":{"name":"ICICM 2019: The 9th International Conference on Information Communication and Management","sponsor":["Chinese Academy of Sciences"],"location":"Prague Czech Republic","acronym":"ICICM 2019"},"container-title":["Proceedings of the 9th International Conference on Information Communication and Management"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3357419.3357420","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3357419.3357420","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:23:21Z","timestamp":1750202601000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3357419.3357420"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,8,23]]},"references-count":10,"alternative-id":["10.1145\/3357419.3357420","10.1145\/3357419"],"URL":"https:\/\/doi.org\/10.1145\/3357419.3357420","relation":{},"subject":[],"published":{"date-parts":[[2019,8,23]]},"assertion":[{"value":"2019-08-23","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}