{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,3]],"date-time":"2024-09-03T22:24:55Z","timestamp":1725402295957},"reference-count":0,"publisher":"SCITEPRESS - Science and and Technology Publications","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.5220\/0004666005710578","type":"proceedings-article","created":{"date-parts":[[2014,1,20]],"date-time":"2014-01-20T06:15:13Z","timestamp":1390198513000},"page":"571-578","source":"Crossref","is-referenced-by-count":0,"title":["Enterprise to Cloud Security Assessment - A Method using OSSTMM 3.0 Concepts"],"prefix":"10.5220","member":"3171","event":{"name":"Special Session on Information Security Intelligence for Business Decision Makers","start":{"date-parts":[[2013,9,19]]},"location":"Vilamoura, Algarve, Portugal","end":{"date-parts":[[2013,9,22]]}},"container-title":["Proceedings of the International Conference on Knowledge Discovery and Information Retrieval and the International Conference on Knowledge Management and Information Sharing"],"original-title":["english"],"deposited":{"date-parts":[[2014,1,20]],"date-time":"2014-01-20T06:15:13Z","timestamp":1390198513000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.scitepress.org\/DigitalLibrary\/Link.aspx?doi=10.5220\/0004666005710578"}},"subtitle":[""],"short-title":[],"issued":{"date-parts":[[2013]]},"references-count":0,"URL":"https:\/\/doi.org\/10.5220\/0004666005710578","relation":{},"subject":[],"published":{"date-parts":[[2013]]}}}