{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T21:45:24Z","timestamp":1762033524628},"reference-count":18,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,12]]},"DOI":"10.23919\/icitst.2017.8356438","type":"proceedings-article","created":{"date-parts":[[2018,5,10]],"date-time":"2018-05-10T23:01:01Z","timestamp":1525993261000},"page":"427-432","source":"Crossref","is-referenced-by-count":3,"title":["Towards a security baseline for IaaS-cloud back-ends in Industry 4.0"],"prefix":"10.23919","author":[{"given":"Elisabeth","family":"Bauer","sequence":"first","affiliation":[]},{"given":"Oliver","family":"Schluga","sequence":"additional","affiliation":[]},{"given":"Silia","family":"Maksuti","sequence":"additional","affiliation":[]},{"given":"Ani","family":"Bicaku","sequence":"additional","affiliation":[]},{"given":"David","family":"Hofbauer","sequence":"additional","affiliation":[]},{"given":"Igor","family":"Ivkic","sequence":"additional","affiliation":[]},{"given":"Markus G.","family":"Tauber","sequence":"additional","affiliation":[]},{"given":"Alexander","family":"Wohrer","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","article-title":"Procure Secure: A guide to monitoring of security service levels in cloud contracts","author":"hogben","year":"2012","journal-title":"ENISA"},{"year":"2017","journal-title":"VMWare VCloud Suite","key":"ref11"},{"key":"ref12","article-title":"ISO\/IEC27001 information systems security management standard: Exploring the reasons for low adoption","author":"fomin","year":"2013","journal-title":"proceedings of the third European conference on Management of Technology (EuroMOT)"},{"key":"ref13","first-page":"800","author":"nist","year":"2003","journal-title":"Recommended security controls for federal information systems"},{"key":"ref14","first-page":"800","author":"jansen","year":"2011","journal-title":"Guidelines on Security and Privacy in Public Cloud Computing"},{"year":"2014","journal-title":"Cloud Service Level Agreement Standardization Guidelines","key":"ref15"},{"year":"2014","journal-title":"Software Defined Data Center (SDDC) Definition A White Paper from the OSDDC Incubator","key":"ref16"},{"year":"2015","author":"bittman","journal-title":"Gartner report - Magic Quadrant for x86 Server Virtualization Infrastructure","key":"ref17"},{"key":"ref18","article-title":"ISO\/IEC27002","author":"standard","year":"2015","journal-title":"Informationtechnology-security techniques-code of practice for information security controls (AS ISO\/IEC 27002 2015)"},{"doi-asserted-by":"publisher","key":"ref4","DOI":"10.1186\/2192-113X-1-11"},{"key":"ref3","article-title":"Cost and Benefit of the SLA Mapping Approach for Defining Standardized Goods in Cloud Computing Markets","author":"maurer","year":"2010","journal-title":"International Conference on Advance Computing (ICoAC-2010)"},{"year":"2015","author":"hoehl","journal-title":"Proposal for standard Cloud Computin Security SLAs-Key Metrics for Safeguarding Confidential Data in the Cloud","key":"ref6"},{"year":"2015","journal-title":"Practical Guide to Cloud Service Agreements V 2 0","key":"ref5"},{"year":"2009","journal-title":"Gathering Security Metrics and Reaping the Rewards","key":"ref8"},{"year":"2012","journal-title":"FG Cloud TR","key":"ref7"},{"key":"ref2","article-title":"OpenStack Cloud Security Vulnerabilities from Inside and Outside","author":"ristov","year":"2013","journal-title":"CLOUD COMPUTING 2013 the Fourth International Conference on Cloud Computing GRIDs and Virtualization"},{"doi-asserted-by":"publisher","key":"ref1","DOI":"10.6028\/NIST.SP.800-145"},{"year":"2016","journal-title":"Cloud Control Matrix v3 0","key":"ref9"}],"event":{"name":"2017 12th International Conference for Internet Technology and Secured Transactions (ICITST)","start":{"date-parts":[[2017,12,11]]},"location":"Cambridge","end":{"date-parts":[[2017,12,14]]}},"container-title":["2017 12th International Conference for Internet Technology and Secured Transactions (ICITST)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8354335\/8356324\/08356438.pdf?arnumber=8356438","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,5,29]],"date-time":"2018-05-29T00:24:01Z","timestamp":1527553441000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8356438\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,12]]},"references-count":18,"URL":"https:\/\/doi.org\/10.23919\/icitst.2017.8356438","relation":{},"subject":[],"published":{"date-parts":[[2017,12]]}}}