{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,9]],"date-time":"2025-12-09T08:29:14Z","timestamp":1765268954905,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":17,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,12,4]],"date-time":"2023-12-04T00:00:00Z","timestamp":1701648000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,12,4]]},"DOI":"10.1145\/3603166.3632553","type":"proceedings-article","created":{"date-parts":[[2024,4,4]],"date-time":"2024-04-04T19:23:27Z","timestamp":1712258607000},"page":"1-6","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":5,"title":["Cloud Security Frameworks"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0009-6464-4167","authenticated-orcid":false,"given":"Taarika","family":"Hegde","sequence":"first","affiliation":[{"name":"Engineering for Professionals, Johns Hopkins University, Baltimore, MD, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0008-6006-8759","authenticated-orcid":false,"given":"Josh","family":"Gangl","sequence":"additional","affiliation":[{"name":"Engineering for Professionals, Johns Hopkins University, Baltimore, MD, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0000-5998-871X","authenticated-orcid":false,"given":"Stanislav","family":"Babenko","sequence":"additional","affiliation":[{"name":"Engineering for Professionals, Johns Hopkins University, Baltimore, MD, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5500-4450","authenticated-orcid":false,"given":"Joel","family":"Coffman","sequence":"additional","affiliation":[{"name":"Engineering for Professionals, Johns Hopkins University, Baltimore, MD, United States"},{"name":"Department of Computer and Cyber Sciences, United States Air Force Academy, USAF Academy, CO, USA"}]}],"member":"320","published-online":{"date-parts":[[2024,4,4]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"The Treacherous Twelve' Cloud Computing Top Threats","author":"Alliance Cloud Security","year":"2016","unstructured":"Cloud Security Alliance. 2016. 'The Treacherous Twelve' Cloud Computing Top Threats in 2016. https:\/\/cloudsecurityalliance.org\/artifacts\/the-treacherous-twelve-cloud-computing-top-threats-in-2016\/"},{"key":"e_1_3_2_1_2_1","unstructured":"Cloud Security Alliance. 2022. Top threats to cloud Computing: Pandemic Eleven. https:\/\/cloudsecurityalliance.org\/artifacts\/top-threats-to-cloud-computing-pandemic-eleven\/"},{"key":"e_1_3_2_1_3_1","unstructured":"Jeff Bardin. 2009. A Standard a Framework or a Standard Framework? https:\/\/www.csoonline.com\/article\/543353\/identity-management-a-standard-a-framework-or-a-standard-framework.html"},{"key":"e_1_3_2_1_5_1","unstructured":"Cloud Security Alliance. [n. d.]. Security Trust Assurance and Risk (STAR). https:\/\/cloudsecurityalliance.org\/star\/"},{"key":"e_1_3_2_1_6_1","unstructured":"European Commission. 2012. Unleashing the Potential of Cloud Computing in Europe. https:\/\/eur-lex.europa.eu\/LexUriServ\/LexUriServ.do?uri=COM:2012:0529:FIN:en:PDF"},{"key":"e_1_3_2_1_7_1","unstructured":"The IASME Consortium. 2023. Cyber Essentials Plus. https:\/\/iasme.co.uk\/cyber-essentials\/cyber-essentials-plus-find-out-more\/"},{"key":"e_1_3_2_1_8_1","unstructured":"Chief Information Officers Council. 2019. From Cloud First to Cloud Smart. https:\/\/cloud.cio.gov\/strategy\/"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/3018896.3025169"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/CLOUD.2017.16"},{"key":"e_1_3_2_1_11_1","unstructured":"Center for Internet Security. 2020. CIS Controls v8 Mappings to AICPA Trust Services Criteria (SOC 2). https:\/\/www.cisecurity.org\/insights\/white-papers\/cis-controls-v8-mapping-to-aicpa-trust-services-criteria-soc2"},{"key":"e_1_3_2_1_12_1","volume-title":"The digital forecast: 40-plus cloud computing stats and trends to know","author":"Franklin Blair","year":"2023","unstructured":"Blair Franklin. 2023. The digital forecast: 40-plus cloud computing stats and trends to know in 2023. Google Cloud Blog. https:\/\/cloud.google.com\/blog\/transform\/top-cloud-computing-trends-facts-statistics-2023"},{"key":"e_1_3_2_1_13_1","unstructured":"Stan Gibson. 2022. Cloud-first strategy forces big shift on IT infrastructure skills. https:\/\/www.techtarget.com\/searchcio\/feature\/Cloud-first-strategy-forces-big-shift-on-IT-infrastructure-skills"},{"key":"e_1_3_2_1_14_1","unstructured":"Luke Irwin. 2023. ISO 27001 vs SOC 2 Certification: What's the Difference? https:\/\/www.itgovernance.eu\/blog\/en\/iso-27001-vs-soc-2-certification-whats-the-difference"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/3368235.3368875"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","unstructured":"NIST. 2018. Framework for Improving Critical Infrastructure Cybersecurity. NIST. 10.6028\/NIST.CSWP.04162018","DOI":"10.6028\/NIST.CSWP.04162018"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.5220\/0005496205650572"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1186\/s13677-015-0037-5"}],"event":{"name":"UCC '23: IEEE\/ACM 16th International Conference on Utility and Cloud Computing","sponsor":["SIGARCH ACM Special Interest Group on Computer Architecture","IEEE TCSC"],"location":"Taormina (Messina) Italy","acronym":"UCC '23"},"container-title":["Proceedings of the IEEE\/ACM 16th International Conference on Utility and Cloud Computing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3603166.3632553","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3603166.3632553","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T22:49:09Z","timestamp":1750286949000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3603166.3632553"}},"subtitle":["A Comparison to Evaluate Cloud Control Standards"],"short-title":[],"issued":{"date-parts":[[2023,12,4]]},"references-count":17,"alternative-id":["10.1145\/3603166.3632553","10.1145\/3603166"],"URL":"https:\/\/doi.org\/10.1145\/3603166.3632553","relation":{},"subject":[],"published":{"date-parts":[[2023,12,4]]},"assertion":[{"value":"2024-04-04","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}