{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T14:35:50Z","timestamp":1725806150030},"publisher-location":"Cham","reference-count":18,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319117096"},{"type":"electronic","value":"9783319117102"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-11710-2_1","type":"book-chapter","created":{"date-parts":[[2014,10,6]],"date-time":"2014-10-06T06:16:50Z","timestamp":1412576210000},"page":"3-10","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Ensuring Cloud Security: Current Concerns and Research Challenges"],"prefix":"10.1007","author":[{"given":"Nikos","family":"Vesyropoulos","sequence":"first","affiliation":[]},{"given":"Christos K.","family":"Georgiadis","sequence":"additional","affiliation":[]},{"given":"Elias","family":"Pimenidis","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,10,7]]},"reference":[{"key":"1_CR1","doi-asserted-by":"crossref","unstructured":"Aguiar, E., Zhang, Y., Blanton, M.: An overview of issues and recent developments in cloud computing and storage security. In: High Performance Cloud Auditing and Applications, pp. 1\u201331. Springer, New York (2013)","DOI":"10.1007\/978-1-4614-3296-8_1"},{"issue":"2","key":"1_CR2","first-page":"66","volume":"1","author":"SP Ahuja","year":"2012","unstructured":"Ahuja, S.P., Komathukattil, D.: A survey of the state of cloud security. Netw. Commun. Technol. 1(2), 66\u201375 (2012)","journal-title":"Netw. Commun. Technol."},{"key":"1_CR3","doi-asserted-by":"crossref","unstructured":"Behl, A.: Emerging security challenges in cloud computing: an insight to cloud security challenges and their mitigation. In: World Congr. on Information and Communication Technologies, pp. 217\u2013222. IEEE (2011)","DOI":"10.1109\/WICT.2011.6141247"},{"key":"1_CR4","doi-asserted-by":"crossref","unstructured":"Behl, A., Behl, K.: Security paradigms for cloud computing. In: 4th International Conference on Computational Intelligence, Communication Systems and Networks, pp. 200\u2013205. IEEE (2012)","DOI":"10.1109\/CICSyN.2012.45"},{"issue":"1","key":"1_CR5","doi-asserted-by":"publisher","first-page":"38","DOI":"10.4018\/jaci.2011010102","volume":"3","author":"S Carlin","year":"2011","unstructured":"Carlin, S., Curran, K.: Cloud computing security. Int. J. Ambient Comput. Intell. 3(1), 38\u201346 (2011)","journal-title":"Int. J. Ambient Comput. Intell."},{"key":"1_CR6","doi-asserted-by":"crossref","unstructured":"Chen, D., Zhao, H.: Data security and privacy protection issues in cloud computing. In: International Conference on Computer Science and Electronics Engineering, vol. 1, pp. 647\u2013651. IEEE (2012)","DOI":"10.1109\/ICCSEE.2012.193"},{"key":"1_CR7","doi-asserted-by":"crossref","unstructured":"Fugini, M.: Security and trust in Cloud scenarios. In: 1st International Workshop on Securing Services on the Cloud (IWSSC), pp. 22\u201329, September 2011","DOI":"10.1109\/IWSSCloud.2011.6049021"},{"key":"1_CR8","unstructured":"Gul, I., Rehman, A., Islam, M.: Cloud computing security auditing. In: The 2nd International Conference on Next Generation Information Technology, pp. 143\u2013148. IEEE (2011)"},{"key":"1_CR9","doi-asserted-by":"crossref","unstructured":"Meetei, Z.M., Goel, A.: Security issues in cloud computing. In: 2012 5th International Conference on Biomedical Engineering and Informatics (BMEI), pp. 1321\u20131325 (2012)","DOI":"10.1109\/BMEI.2012.6513028"},{"issue":"3","key":"1_CR10","doi-asserted-by":"publisher","first-page":"245","DOI":"10.1016\/j.giq.2010.01.002","volume":"27","author":"S Paquette","year":"2010","unstructured":"Paquette, S., Jaeger, T.P., Wilson, C.S.: Identifying the security risks associated with governmental use of cloud computing. Gov. Inf. Quart. 27(3), 245\u2013253 (2010)","journal-title":"Gov. Inf. Quart."},{"key":"1_CR11","unstructured":"Plummer, C.D., Smith, M.D., Bittman, J.T., Cearley, W.D., Cappuccio, J.D., Scott, D., Kumar, R., Robertson, B.: Five refining attributes of public and private cloud computing, May 2009"},{"key":"1_CR12","unstructured":"Popovic, K., Hocenski, Z.: Cloud computing security issues and challenges. In: 2010 Proceedings of the 33rd International Convention, MIPRO, pp. 344\u2013349 (2010)"},{"key":"1_CR13","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1016\/j.compeleceng.2012.04.015","volume":"39","author":"C Rong","year":"2012","unstructured":"Rong, C., Nguyen, S.T., Jaatun, M.G.: Beyond lightning: a survey on security challenges in cloud computing. Comput. Electr. Eng. 39, 47\u201354 (2012)","journal-title":"Comput. Electr. Eng."},{"issue":"1","key":"1_CR14","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.jnca.2010.07.006","volume":"34","author":"S Subashini","year":"2011","unstructured":"Subashini, S., Kavitha, V.: A survey on security issues in service delivery models of cloud computing. J. Netw. Comput. Appl. 34(1), 1\u201311 (2011)","journal-title":"J. Netw. Comput. Appl."},{"key":"1_CR15","doi-asserted-by":"crossref","unstructured":"Sun, D., Chang, G., Sun, L., Wang, X.: Surveying and analyzing security, privacy and trust issues in cloud computing environments. Science Direct, 2852\u20132856 (2011). Published by Elsevier Ltd","DOI":"10.1016\/j.proeng.2011.08.537"},{"key":"1_CR16","doi-asserted-by":"crossref","unstructured":"Tianfield, H.: Security issues in cloud computing. In: 2012 IEEE International Conference on Systems, Man, and Cybernetics (SMC) (2012)","DOI":"10.1109\/ICSMC.2012.6377874"},{"issue":"1","key":"1_CR17","doi-asserted-by":"publisher","first-page":"32","DOI":"10.1109\/MITP.2011.117","volume":"14","author":"H Tsai","year":"2012","unstructured":"Tsai, H., Siebenhaar, M., Miede, A., Huang, Y., Steinmetz, R.: Threat as a service? virtualization\u2019s impact on cloud security. IT Prof. 14(1), 32\u201337 (2012)","journal-title":"IT Prof."},{"key":"1_CR18","doi-asserted-by":"publisher","first-page":"583","DOI":"10.1016\/j.future.2010.12.006","volume":"28","author":"D Zissis","year":"2012","unstructured":"Zissis, D., Lekkas, D.: Addressing cloud computing security issues. Future Gener. Comput. Syst. 28, 583\u2013592 (2012). Science Direct 2012","journal-title":"Future Gener. Comput. Syst."}],"container-title":["Communications in Computer and Information Science","E-Democracy, Security, Privacy and Trust in a Digital World"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-11710-2_1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,4,2]],"date-time":"2024-04-02T16:27:19Z","timestamp":1712075239000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-11710-2_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319117096","9783319117102"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-11710-2_1","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2014]]},"assertion":[{"value":"7 October 2014","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}