{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T15:04:47Z","timestamp":1729609487465,"version":"3.28.0"},"reference-count":34,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,7]]},"DOI":"10.1109\/trustcom.2013.193","type":"proceedings-article","created":{"date-parts":[[2013,12,17]],"date-time":"2013-12-17T19:46:29Z","timestamp":1387309589000},"page":"1573-1580","source":"Crossref","is-referenced-by-count":1,"title":["On Subjective Trust for Privacy Policy Enforcement in Cloud Computing"],"prefix":"10.1109","author":[{"given":"Karthick","family":"Ramachandran","sequence":"first","affiliation":[]},{"given":"Hanan","family":"Lutfiyya","sequence":"additional","affiliation":[]},{"given":"Mark","family":"Perry","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","first-page":"131","article-title":"Sirius: Securing remote untrusted storage","author":"goh","year":"2003","journal-title":"Proc Network and Distributed Systems Security (NDSS) Symposium 2003"},{"journal-title":"The Design of RIJNDAEL AES-The Advanced Encryption Standard","year":"2002","author":"daemen","key":"17"},{"journal-title":"A Fully Homomorphic Encryption Scheme","year":"2009","author":"gentry","key":"18"},{"journal-title":"Trusted Computing Group","article-title":"Tcg. Trusted computing group (tcg) and the tpm 1.2 specification","year":"2005","key":"33"},{"key":"15","doi-asserted-by":"crossref","first-page":"171","DOI":"10.1007\/978-3-540-74835-9_12","article-title":"Fragmentation and encryption to enforce privacy in data storage","author":"ciriani","year":"2007","journal-title":"Computer Security-ESORICS 2007"},{"journal-title":"Architecture Supporting Computational Trust Formation","year":"0","author":"yew","key":"34"},{"key":"16","first-page":"440","article-title":"Keep a few: Outsourcing data while maintaining confidentiality","author":"ciriani","year":"2009","journal-title":"Springerlink com"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.4304\/jsw.7.1.55-60"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1145\/1866919.1866935"},{"key":"11","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-35576-9_12","article-title":"Exo-geni: A multi-domain infrastructure-as-a-service testbed","author":"baldine","year":"2012","journal-title":"TridentCom International Conference on Testbeds and Research Infrastructures for the Development of Networks and Communities"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/CLOUD.2011.71"},{"key":"21","first-page":"15","article-title":"Hacking linux exposed: Linux security secrets & solutions","volume":"41","author":"hatch","year":"2008","journal-title":"Computer"},{"journal-title":"An Comparison with Property Based Resource Attestation to Secure Cloud Environment","year":"2012","author":"gupta","key":"20"},{"key":"22","doi-asserted-by":"crossref","first-page":"136","DOI":"10.1007\/978-3-642-14992-4_13","article-title":"Cryptographic cloud storage","author":"kamara","year":"2010","journal-title":"Lecture Notes in Computer Science"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1109\/CSE.2009.66"},{"key":"24","article-title":"Dark clouds on the horizon: Using cloud storage as attack vector and online slack space","author":"mulazzani","year":"2011","journal-title":"Usenix Security"},{"key":"25","first-page":"524","article-title":"Implementing trust in cloud infrastructures","author":"neisse","year":"0","journal-title":"2011 11th IEEE\/ACM International Symposium on Cluster Cloud and Grid Computing (CCGrid)"},{"key":"26","doi-asserted-by":"crossref","first-page":"24","DOI":"10.1145\/1805974.1805980","article-title":"Privacy-aware rolebased access control","volume":"13","author":"ni","year":"2010","journal-title":"ACM Transactions on Information and System Security (TISSEC)"},{"key":"27","doi-asserted-by":"publisher","DOI":"10.1109\/CLOUD.2009.5071532"},{"key":"28","doi-asserted-by":"crossref","first-page":"90","DOI":"10.1007\/978-3-642-10665-1_9","article-title":"A privacy manager for cloud computing","author":"pearson","year":"2009","journal-title":"Proceedings of the 1st International Conference on Cloud Computing"},{"key":"29","first-page":"31","article-title":"Enabling security in cloud storage slas with cloudproof","author":"popa","year":"2010","journal-title":"Proceedings of the 2011 USENIX Conference on USENIX Annual Technical Conference"},{"journal-title":"DropBox","year":"0","key":"3"},{"journal-title":"Boxcryptor","year":"0","key":"2"},{"journal-title":"Amazon S3","year":"0","key":"1"},{"journal-title":"Method for Extending the CRTM in A Trusted Platform","year":"2012","author":"bade","key":"10"},{"journal-title":"Wuala Secuirty","year":"0","key":"7"},{"key":"30","first-page":"133","article-title":"Chaavi: A privacy preserving architecture for webmail systems","author":"ramachandran","year":"2011","journal-title":"Cloud Computing 2011 The Second International Conference on Cloud Computing GRIDs and Virtualization"},{"journal-title":"TrueCrypt","year":"0","key":"6"},{"journal-title":"TrouSerS","year":"0","key":"5"},{"key":"32","doi-asserted-by":"publisher","DOI":"10.1109\/IRI.2012.6303013"},{"journal-title":"OwnCloud org","year":"0","key":"4"},{"key":"31","article-title":"Policysealed data: A new abstraction for building trusted cloud services","author":"santos","year":"2012","journal-title":"Usenix Security"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2007.06.013"},{"key":"8","article-title":"Two can keep a secret: A distributed architecture for secure database services","author":"aggarwal","year":"2005","journal-title":"Proc CIDR"}],"event":{"name":"2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)","start":{"date-parts":[[2013,7,16]]},"location":"Melbourne, Australia","end":{"date-parts":[[2013,7,18]]}},"container-title":["2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6679587\/6680793\/06681018.pdf?arnumber=6681018","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,22]],"date-time":"2017-06-22T00:26:49Z","timestamp":1498091209000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6681018\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,7]]},"references-count":34,"URL":"https:\/\/doi.org\/10.1109\/trustcom.2013.193","relation":{},"subject":[],"published":{"date-parts":[[2013,7]]}}}