{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T15:22:41Z","timestamp":1730215361647,"version":"3.28.0"},"reference-count":39,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,6]]},"DOI":"10.1109\/dsn.2018.00060","type":"proceedings-article","created":{"date-parts":[[2018,7,23]],"date-time":"2018-07-23T19:02:56Z","timestamp":1532372576000},"page":"526-533","source":"Crossref","is-referenced-by-count":2,"title":["Generating Cloud Monitors from Models to Secure Clouds"],"prefix":"10.1109","author":[{"given":"Elena","family":"Troubitsyna","sequence":"first","affiliation":[]},{"given":"Irum","family":"Rauf","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"REST in Practice Hypermedia and Systems Architecture O'Reilly Media Inc","year":"2010","author":"webber","key":"ref39"},{"journal-title":"Technical Report OMG","article-title":"OMG UML. 2.4. 1 superstructure specification. Technical report, document formal\/2011-08-06","year":"2011","key":"ref38"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/ICST.2010.62"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/SecDev.2016.025"},{"journal-title":"OMG OCL OMG Available Specification","year":"0","key":"ref31"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2015.08.006"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.5120\/8738-2991"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/TIM.2007.915139"},{"key":"ref35","article-title":"Designing Level3 behavioral REST web service interfaces","volume":"11","author":"rauf","year":"2011","journal-title":"ACM Applied Computing Review"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4419-8303-9_5"},{"journal-title":"urllib2 - extensible library for opening URLs Python Documentation","year":"0","key":"ref10"},{"journal-title":"Windows Azure","year":"0","key":"ref11"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/INMIC.2004.1492930"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/s10515-013-0133-z"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/2593929.2593945"},{"journal-title":"Hypertext Transfer protocol-HTTP\/1 0","year":"1996","author":"berners-lee","key":"ref15"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TIM.2011.2179330"},{"key":"ref17","first-page":"241","article-title":"Role-based access control (rbac): Features and motivations","author":"ferraiolo","year":"1995","journal-title":"Proceedings of 11 th annual computer security application conference"},{"journal-title":"Django Software Foundation Django Documentation Online Documentation of Django 2 0","year":"2017","key":"ref18"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-00382-0_37"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/2.161279"},{"journal-title":"Curl","year":"0","key":"ref4"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2010.12.006"},{"journal-title":"Cloud Computing Trends 2017 State of the Cloud Survey","year":"0","key":"ref3"},{"journal-title":"Keystone Security and Architecture Review Online at","year":"0","key":"ref6"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2011.44"},{"journal-title":"Extensible Markup Language (XML)","year":"0","key":"ref5"},{"journal-title":"OpenStack Block Storage Cinder","year":"0","key":"ref8"},{"journal-title":"NoMagic MagicDraw","year":"0","key":"ref7"},{"journal-title":"Block Storage API V3","year":"0","key":"ref2"},{"journal-title":"OpenStack Newton -Installation Guide","year":"0","key":"ref9"},{"journal-title":"Amazon Web Services","year":"0","key":"ref1"},{"key":"ref20","first-page":"23","volume":"11","author":"grossman","year":"2009","journal-title":"The Case for Cloud Computing IT Professional"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4302-1937-8"},{"journal-title":"The Django Book Online version of The Django Book","year":"2010","author":"holovaty","key":"ref21"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/IEEE.EDGE.2017.20"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45314-8_14"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-72912-9_7"},{"journal-title":"Cloud Security A Comprehensive Guide to Secure Cloud Computing","year":"2010","author":"krutz","key":"ref25"}],"event":{"name":"2018 48th Annual IEEE\/IFIP International Conference on Dependable Systems and Networks (DSN)","start":{"date-parts":[[2018,6,25]]},"location":"Luxembourg City","end":{"date-parts":[[2018,6,28]]}},"container-title":["2018 48th Annual IEEE\/IFIP International Conference on Dependable Systems and Networks (DSN)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8415926\/8415932\/08416512.pdf?arnumber=8416512","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,8,20]],"date-time":"2018-08-20T18:48:44Z","timestamp":1534790924000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8416512\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,6]]},"references-count":39,"URL":"https:\/\/doi.org\/10.1109\/dsn.2018.00060","relation":{},"subject":[],"published":{"date-parts":[[2018,6]]}}}