{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,3]],"date-time":"2025-06-03T08:29:35Z","timestamp":1748939375822},"reference-count":35,"publisher":"IBM","issue":"2-3","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IBM J. Res. &amp; Dev."],"published-print":{"date-parts":[[2016,3]]},"DOI":"10.1147\/jrd.2015.2513720","type":"journal-article","created":{"date-parts":[[2016,3,28]],"date-time":"2016-03-28T14:23:36Z","timestamp":1459175016000},"page":"4:1-4:13","source":"Crossref","is-referenced-by-count":4,"title":["Managing sensitive applications in the public cloud"],"prefix":"10.1147","volume":"60","author":[{"given":"K. A.","family":"Beaty","sequence":"first","affiliation":[]},{"given":"J. M.","family":"Chow","sequence":"additional","affiliation":[]},{"given":"R. L. F.","family":"Cunha","sequence":"additional","affiliation":[]},{"given":"K. K.","family":"Das","sequence":"additional","affiliation":[]},{"given":"M. F.","family":"Hulber","sequence":"additional","affiliation":[]},{"given":"A.","family":"Kundu","sequence":"additional","affiliation":[]},{"given":"V.","family":"Michelini","sequence":"additional","affiliation":[]},{"given":"E. R.","family":"Palmer","sequence":"additional","affiliation":[]}],"member":"3082","reference":[{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/iNCoS.2012.65"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/JBHI.2013.2257821"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-013-0208-7"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2012.14"},{"key":"ref35","doi-asserted-by":"crossref","first-page":"62","DOI":"10.1109\/MNET.2013.6616117","article-title":"An auto-scaling mechanism for virtual resources to support mobile, pervasive, real-time healthcare applications in cloud computing","volume":"27","author":"cheng","year":"2013","journal-title":"IEEE Netw"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/CLOUD.2009.5071532"},{"key":"ref10","year":"0","journal-title":"Family Educational Rights and Privacy Act"},{"key":"ref11","year":"0","journal-title":"Payment card industry data security standard v3 0"},{"key":"ref12","author":"holtzman","year":"2013","journal-title":"HITECH and The Cloud Control and Accessibility of Data Downstream"},{"key":"ref13","year":"0","journal-title":"Office of Civil Rights Summary of the HIPAA Privacy Rule"},{"key":"ref14","year":"0","journal-title":"IBM BlueMix"},{"key":"ref15","author":"vogel","year":"0","journal-title":"Top 10 HIPAA Data Breaches of 2014"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.6028\/NIST.SP.800-88r1"},{"key":"ref17","author":"kobus","year":"0","journal-title":"2015 International Compendium of Data Privacy Laws"},{"key":"ref18","year":"2012","journal-title":"Payment Card Industry (PCI) Pin Transaction Security (PTS) hardware security module security requirements v2 0"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.17487\/rfc7348"},{"key":"ref28","year":"0","journal-title":"IBM Security Services Client Ref Guide"},{"key":"ref4","author":"humer","year":"0","journal-title":"Anthem Says at Least 8 8 Million Non-Customers Could be Victims in Data Hack"},{"key":"ref27","author":"ayad","year":"0","journal-title":"Addressing HIPAA Security and Privacy Requirements in the Microsoft cloud"},{"key":"ref3","author":"petri","year":"0","journal-title":"Three factors will significantly impact enterprise cloud use in the near to midterm future"},{"key":"ref6","first-page":"67","article-title":"Review of current methods, applications, and data management for the bioinformatics analysis of whole exome sequencing","volume":"13","author":"bao","year":"2014","journal-title":"Cancer Informat"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1016\/j.jbi.2009.08.014"},{"key":"ref5","author":"sachin","year":"0","journal-title":"Target Nears $20 Million MasterCard Data Breach Settlement WSJ"},{"key":"ref8","author":"tiwari","year":"2011","journal-title":"Professional NoSQL"},{"key":"ref7","author":"faroult","year":"2006","journal-title":"The Art of SQL"},{"key":"ref2","author":"gens","year":"0","journal-title":"Worldwide and regional public IT cloud services 2014-2018 forecast"},{"key":"ref9","year":"0","journal-title":"Health Insurance Portability and Accountability Act of 1996"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/1721654.1721672"},{"key":"ref20","year":"0"},{"key":"ref22","doi-asserted-by":"crossref","first-page":"523","DOI":"10.1109\/JLT.2012.2213796","article-title":"Network virtualization: Technologies, perspectives, and frontiers","volume":"31","author":"iyer","year":"2013","journal-title":"J Lightw Technol"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/MSECP.2004.1264860"},{"key":"ref24","first-page":"1","article-title":"Web site delays: How tolerant are users?","volume":"5","author":"galletta","year":"2004","journal-title":"J Assoc Inf Syst"},{"key":"ref23","year":"0"},{"key":"ref26","year":"0","journal-title":"Creating HIPAA-Compliant Medical Data Applications With AWS"},{"key":"ref25","author":"lafortune","year":"0","journal-title":"ProGuard Java Class File Shrinker Optimizer Obfuscator and Preverifier"}],"container-title":["IBM Journal of Research and Development"],"original-title":[],"deposited":{"date-parts":[[2017,6,24]],"date-time":"2017-06-24T05:25:41Z","timestamp":1498281941000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/lpdocs\/epic03\/wrapper.htm?arnumber=7442613"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,3]]},"references-count":35,"journal-issue":{"issue":"2-3"},"URL":"https:\/\/doi.org\/10.1147\/jrd.2015.2513720","relation":{},"ISSN":["0018-8646","0018-8646"],"issn-type":[{"value":"0018-8646","type":"print"},{"value":"0018-8646","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,3]]}}}