{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,2]],"date-time":"2025-08-02T04:49:56Z","timestamp":1754110196463,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":27,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,2,23]],"date-time":"2021-02-23T00:00:00Z","timestamp":1614038400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,2,23]]},"DOI":"10.1145\/3457784.3457826","type":"proceedings-article","created":{"date-parts":[[2021,7,31]],"date-time":"2021-07-31T00:42:29Z","timestamp":1627692149000},"page":"273-278","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Using Cloud Control Matrix to evaluate trust in cloud providers"],"prefix":"10.1145","author":[{"given":"Livia","family":"Maria Bruma","sequence":"first","affiliation":[{"name":"The Bucharest University of Economic Studies, Romania"}]}],"member":"320","published-online":{"date-parts":[[2021,7,30]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"CSA Security Trust Assurance and Risk (STAR) Registry Reaches Significant Milestone with 1 000 Entries. 2020. https:\/\/www.businesswire.com\/news\/home\/20200930005160\/en\/CSA-Security-Trust-Assurance-and-Risk-STAR-Registry-Reaches-Significant-Milestone-with-1000-Entries\/  CSA Security Trust Assurance and Risk (STAR) Registry Reaches Significant Milestone with 1 000 Entries. 2020. https:\/\/www.businesswire.com\/news\/home\/20200930005160\/en\/CSA-Security-Trust-Assurance-and-Risk-STAR-Registry-Reaches-Significant-Milestone-with-1000-Entries\/"},{"key":"e_1_3_2_1_2_1","unstructured":"CSA STAR Registry - Security Trust Assurance and Risk Registry. 2020. https:\/\/cloudsecurityalliance.org\/star\/registry\/  CSA STAR Registry - Security Trust Assurance and Risk Registry. 2020. https:\/\/cloudsecurityalliance.org\/star\/registry\/"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.5753\/wtf.2019.7711"},{"volume-title":"National Institute of Standards and Technology. Special Publication 800-53 r4 - Security and Privacy Controls for Federal Information Systems and Organizations","year":"2015","author":"NIST","key":"e_1_3_2_1_4_1"},{"volume":"904","volume-title":"Ambient Communications and Computer Systems","author":"Shuaib M.","key":"e_1_3_2_1_5_1"},{"volume-title":"Security vulnerabilities in Cloud based E-Learning","year":"2020","author":"Bruma Livia Maria","key":"e_1_3_2_1_6_1"},{"key":"e_1_3_2_1_7_1","unstructured":"6\n    New Privacy Laws Around the Globe You Should Pay Attention To. 2019. https:\/\/piwik.pro\/blog\/privacy-laws-around-globe\/  6 New Privacy Laws Around the Globe You Should Pay Attention To. 2019. https:\/\/piwik.pro\/blog\/privacy-laws-around-globe\/"},{"key":"e_1_3_2_1_8_1","unstructured":"Cloud Adoption and Risk Report. McAfee. 2020. https:\/\/www.mcafee.com\/enterprise\/en-us\/assets\/skyhigh\/white-papers\/cloud-adoptionrisk-report-2019.pdf  Cloud Adoption and Risk Report. McAfee. 2020. https:\/\/www.mcafee.com\/enterprise\/en-us\/assets\/skyhigh\/white-papers\/cloud-adoptionrisk-report-2019.pdf"},{"key":"e_1_3_2_1_9_1","unstructured":"Cloud Security Alliance \u2013 CSA. https:\/\/cloudsecurityalliance.org\/star\/  Cloud Security Alliance \u2013 CSA. https:\/\/cloudsecurityalliance.org\/star\/"},{"key":"e_1_3_2_1_10_1","unstructured":"The Basics of The CSA's Cloud Controls Matrix. https:\/\/www.uzado.com\/blog\/the-basics-of-the-csas-cloud-controls-matrix  The Basics of The CSA's Cloud Controls Matrix. https:\/\/www.uzado.com\/blog\/the-basics-of-the-csas-cloud-controls-matrix"},{"key":"e_1_3_2_1_11_1","unstructured":"CAIQ (Consensus Assessments Initiative Questionnaire). https:\/\/searchcloudsecurity.techtarget.com\/definition\/CAIQ-ConsensusAssessments-Initiative-Questionnaire  CAIQ (Consensus Assessments Initiative Questionnaire). https:\/\/searchcloudsecurity.techtarget.com\/definition\/CAIQ-ConsensusAssessments-Initiative-Questionnaire"},{"key":"e_1_3_2_1_12_1","unstructured":"Stfena Pechardsheck. In Cloud we trust? https:\/\/www.bearingpoint.com\/en\/our-success\/thought-leadership\/in-cloud-we-trust\/  Stfena Pechardsheck. In Cloud we trust? https:\/\/www.bearingpoint.com\/en\/our-success\/thought-leadership\/in-cloud-we-trust\/"},{"volume-title":"Sebastian Ries and Max Muhlhauser","year":"2012","author":"Habib Sheikh Mahbub","key":"e_1_3_2_1_13_1"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2019.05.030"},{"key":"e_1_3_2_1_15_1","unstructured":"AWS Compliance Programs. https:\/\/aws.amazon.com\/compliance\/programs\/  AWS Compliance Programs. https:\/\/aws.amazon.com\/compliance\/programs\/"},{"key":"e_1_3_2_1_16_1","unstructured":"Compliance resource center. https:\/\/cloud.google.com\/security\/compliance  Compliance resource center. https:\/\/cloud.google.com\/security\/compliance"},{"key":"e_1_3_2_1_17_1","unstructured":"Azure compliance. https:\/\/azure.microsoft.com\/en-us\/overview\/trusted-cloud\/compliance\/  Azure compliance. https:\/\/azure.microsoft.com\/en-us\/overview\/trusted-cloud\/compliance\/"},{"key":"e_1_3_2_1_18_1","unstructured":"Alibaba Trust Center. https:\/\/www.alibabacloud.com\/trust-center  Alibaba Trust Center. https:\/\/www.alibabacloud.com\/trust-center"},{"key":"e_1_3_2_1_19_1","unstructured":"Why Customer Feedback Is Important. Plus 20 Ways to Get It. https:\/\/www.commbox.io\/why-customer-feedback-is-important-plus20-ways-to-get-it\/  Why Customer Feedback Is Important. Plus 20 Ways to Get It. https:\/\/www.commbox.io\/why-customer-feedback-is-important-plus20-ways-to-get-it\/"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/INCoS.2014.42"},{"volume-title":"Service Oriented Electronic Commerce: Proceedings zur Konferenz im Rahmen der Multikonferenz Wirtschaftsinformatik. 20","year":"2006","author":"Paschke Adrian","key":"e_1_3_2_1_21_1"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2016.65"},{"volume-title":"The Cloud Needs a Reputation System https:\/\/arxiv.org\/abs\/1509.09057","year":"2015","author":"Kablan Murad","key":"e_1_3_2_1_23_1"},{"key":"e_1_3_2_1_24_1","unstructured":"K.Suresha P.Vijayakarthic. 2020. A Comprehensive Review on Trust Issues Security and Privacy Issues in Cloud Storage. International Journal of Innovative Science and Research Technology. https:\/\/ijisrt.com\/assets\/upload\/files\/IJISRT20SEP705.pdf  K.Suresha P.Vijayakarthic. 2020. A Comprehensive Review on Trust Issues Security and Privacy Issues in Cloud Storage. International Journal of Innovative Science and Research Technology. https:\/\/ijisrt.com\/assets\/upload\/files\/IJISRT20SEP705.pdf"},{"key":"e_1_3_2_1_25_1","unstructured":"Kelly Koeninger Robinson Bradshaw Hinson PA John Conle. 2020. International Health Data: How HIPAA Interacts with the EU GDPR. https:\/\/www.robinsonbradshaw.com\/media\/publication\/657_International%20Health%20Data.pdf  Kelly Koeninger Robinson Bradshaw Hinson PA John Conle. 2020. International Health Data: How HIPAA Interacts with the EU GDPR. https:\/\/www.robinsonbradshaw.com\/media\/publication\/657_International%20Health%20Data.pdf"},{"key":"e_1_3_2_1_26_1","first-page":"60","article-title":"Selecting a trusted cloud service provider for your SaaS program","author":"Liu C. Tang \u0219i J.","year":"2015","journal-title":"Computers & Security."},{"key":"e_1_3_2_1_27_1","unstructured":"TSP Section 100. 2017. Trust Services Criteria for Security Availability Processing Integrity Confidentiality and Privacy. https:\/\/www.aicpa.org\/content\/dam\/aicpa\/interestareas\/frc\/assuranceadvisoryservices\/downloadabledocuments\/trust-services-criteria.pdf  TSP Section 100. 2017. Trust Services Criteria for Security Availability Processing Integrity Confidentiality and Privacy. https:\/\/www.aicpa.org\/content\/dam\/aicpa\/interestareas\/frc\/assuranceadvisoryservices\/downloadabledocuments\/trust-services-criteria.pdf"}],"event":{"name":"ICSCA 2021: 2021 10th International Conference on Software and Computer Applications","acronym":"ICSCA 2021","location":"Kuala Lumpur Malaysia"},"container-title":["2021 10th International Conference on Software and Computer Applications"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3457784.3457826","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3457784.3457826","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T21:24:38Z","timestamp":1750195478000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3457784.3457826"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,2,23]]},"references-count":27,"alternative-id":["10.1145\/3457784.3457826","10.1145\/3457784"],"URL":"https:\/\/doi.org\/10.1145\/3457784.3457826","relation":{},"subject":[],"published":{"date-parts":[[2021,2,23]]},"assertion":[{"value":"2021-07-30","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}