{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,13]],"date-time":"2025-06-13T15:26:58Z","timestamp":1749828418520},"reference-count":0,"publisher":"IGI Global","issue":"3","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,7,1]]},"abstract":"<p>Cloud computing technology is a relatively new concept of providing scalable and virtualized resources, software and hardware on demand to consumers. It presents a new technology to deliver computing resources as a service. It offers a variety of benefits like services on demand and provisioning and suffers from several weaknesses. In fact, security presents a major obstacle in cloud computing adoption. In this paper, the authors will deal with security problems in cloud computing systems and show how to solve these problems using a quantitative security risk assessment model named Multi-dimensional Mean Failure Cost (M2FC). In fact, they summarize first security issues related to cloud computing environments and then propose a generic framework that analysis and evaluate cloud security problems and then propose appropriate countermeasures to solve these problems.<\/p>","DOI":"10.4018\/ijcac.2016070103","type":"journal-article","created":{"date-parts":[[2016,7,18]],"date-time":"2016-07-18T17:28:52Z","timestamp":1468862932000},"page":"32-44","source":"Crossref","is-referenced-by-count":46,"title":["A Security Framework for Secure Cloud Computing Environments"],"prefix":"10.4018","volume":"6","author":[{"given":"Mouna","family":"Jouini","sequence":"first","affiliation":[{"name":"Department of Computer Science, Institut Sup\u00e9rieur De Gestion De Tunis, Tunis, Tunisia"}]},{"given":"Latifa Ben Arfa","family":"Rabai","sequence":"additional","affiliation":[{"name":"Department of Computer Science, Institut Sup\u00e9rieur De Gestion De Tunis, Tunis, Tunisia"}]}],"member":"2432","container-title":["International Journal of Cloud Applications and Computing"],"original-title":[],"language":"ng","link":[{"URL":"https:\/\/www.igi-global.com\/viewtitle.aspx?TitleId=159836","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,2]],"date-time":"2022-06-02T00:54:58Z","timestamp":1654131298000},"score":1,"resource":{"primary":{"URL":"https:\/\/services.igi-global.com\/resolvedoi\/resolve.aspx?doi=10.4018\/IJCAC.2016070103"}},"subtitle":[""],"short-title":[],"issued":{"date-parts":[[2016,7,1]]},"references-count":0,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2016,7]]}},"URL":"https:\/\/doi.org\/10.4018\/ijcac.2016070103","relation":{},"ISSN":["2156-1834","2156-1826"],"issn-type":[{"value":"2156-1834","type":"print"},{"value":"2156-1826","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,7,1]]}}}