{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T17:52:12Z","timestamp":1729619532949,"version":"3.28.0"},"reference-count":28,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,7]]},"DOI":"10.1109\/trustcom.2013.64","type":"proceedings-article","created":{"date-parts":[[2013,12,17]],"date-time":"2013-12-17T19:46:29Z","timestamp":1387309589000},"page":"1-8","source":"Crossref","is-referenced-by-count":5,"title":["A Privacy-Leakage-Tolerance Based Noise Enhancing Strategy for Privacy Protection in Cloud Computing"],"prefix":"10.1109","author":[{"given":"Gaofeng","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Yun","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Jinjun","family":"Chen","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","first-page":"303","article-title":"Tor: The second-generation onion router","author":"rogerm","year":"2004","journal-title":"13th USENIX Security Symposium"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1145\/2020408.2020598"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1145\/293411.293443"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1145\/293347.293350"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046784"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1145\/1929934.1929935"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1145\/2339530.2339696"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/CCGrid.2012.92"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1145\/335191.335438"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2012.2197392"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2009.22"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2009.25"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.36"},{"key":"24","doi-asserted-by":"crossref","first-page":"524","DOI":"10.1109\/CCGrid.2011.35","article-title":"Implementing trust in cloud infrastructures","author":"neisse","year":"2011","journal-title":"11th IEEE\/ACM International Symposium on Cluster Cloud and Grid Computing (CCGrid 2011)"},{"key":"25","doi-asserted-by":"crossref","first-page":"69","DOI":"10.1007\/978-3-642-10665-1_7","article-title":"Trust model to enhance security and interoperability of cloud environment","author":"li","year":"2009","journal-title":"1st International Conference on Cloud Computing"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1109\/SERVICES.2011.91"},{"key":"27","doi-asserted-by":"publisher","DOI":"10.1002\/spe.1052"},{"journal-title":"The Design of Cloud Workflow Systems Architecture Functionality and Quality of Service SpringerBriefs","year":"2011","author":"liu","key":"28"},{"key":"3","first-page":"90","article-title":"A privacy manager for cloud computing","author":"pearson","year":"2009","journal-title":"1st International Conference on Cloud Computing (CloudCom 2009)"},{"key":"2","doi-asserted-by":"crossref","first-page":"50","DOI":"10.1145\/1721654.1721672","article-title":"Above the clouds: A berkeley view of cloud computing","volume":"53","author":"armbrust","year":"2010","journal-title":"Communications of the ACM"},{"key":"10","doi-asserted-by":"crossref","first-page":"167","DOI":"10.1007\/978-3-642-10665-1_15","article-title":"Strengthen cloud computing security with federal identity management using hierarchical identity-based cryptography","author":"yan","year":"2009","journal-title":"1st International Conference on Cloud Computing (CloudCom' 09)"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2008.12.001"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/CSE.2009.77"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2004.97"},{"journal-title":"Guidelines on Security and Privacy in Public Cloud Computing","year":"2011","author":"jansen","key":"5"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1145\/1866739.1866751"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/CCGrid.2012.82"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1016\/j.jcss.2011.12.020"}],"event":{"name":"2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)","start":{"date-parts":[[2013,7,16]]},"location":"Melbourne, Australia","end":{"date-parts":[[2013,7,18]]}},"container-title":["2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6679587\/6680793\/06680816.pdf?arnumber=6680816","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,7,8]],"date-time":"2023-07-08T23:42:25Z","timestamp":1688859745000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6680816\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,7]]},"references-count":28,"URL":"https:\/\/doi.org\/10.1109\/trustcom.2013.64","relation":{},"subject":[],"published":{"date-parts":[[2013,7]]}}}