{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,20]],"date-time":"2025-02-20T05:19:59Z","timestamp":1740028799318,"version":"3.37.3"},"reference-count":0,"publisher":"IOS Press","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"abstract":"<jats:p>A new method is developed for securing data exchange processes. A compute module is used to secure data transferred from different devices to the cloud environment. Encryption is done through a symmetric algorithm, which is adapted to the compute module in order to provide a high level of speed and security. A corresponding software solution for managing the encryption and decryption process is also described.<\/jats:p>","DOI":"10.3233\/978-1-61499-716-0-271","type":"book-chapter","created":{"date-parts":[[2025,2,19]],"date-time":"2025-02-19T19:11:46Z","timestamp":1739992306000},"source":"Crossref","is-referenced-by-count":0,"title":["Secure Real-Time Data Transfer in the Cloud"],"prefix":"10.3233","author":[{"family":"Hovsepyan Vladimir","sequence":"additional","affiliation":[]}],"member":"7437","container-title":["NATO Science for Peace and Security Series - D: Information and Communication Security","Meeting Security Challenges Through Data Analytics and Decision Support"],"original-title":[],"deposited":{"date-parts":[[2025,2,19]],"date-time":"2025-02-19T19:14:57Z","timestamp":1739992497000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.medra.org\/servlet\/aliasResolver?alias=iospressISBN&isbn=978-1-61499-715-3&spage=271&doi=10.3233\/978-1-61499-716-0-271"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"references-count":0,"URL":"https:\/\/doi.org\/10.3233\/978-1-61499-716-0-271","relation":{},"ISSN":["1874-6268"],"issn-type":[{"value":"1874-6268","type":"print"}],"subject":[],"published":{"date-parts":[[2016]]}}}