{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,8,9]],"date-time":"2024-08-09T08:28:25Z","timestamp":1723192105791},"reference-count":48,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"4","license":[{"start":{"date-parts":[[2011,10,1]],"date-time":"2011-10-01T00:00:00Z","timestamp":1317427200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Serv. Comput."],"published-print":{"date-parts":[[2011,10]]},"DOI":"10.1109\/tsc.2010.53","type":"journal-article","created":{"date-parts":[[2010,12,23]],"date-time":"2010-12-23T20:11:08Z","timestamp":1293135068000},"page":"340-354","source":"Crossref","is-referenced-by-count":15,"title":["GEODAC: A Data Assurance Policy Specification and Enforcement Framework for Outsourced Services"],"prefix":"10.1109","volume":"4","author":[{"given":"Jun","family":"Li","sequence":"first","affiliation":[]},{"given":"Bryan","family":"Stephenson","sequence":"additional","affiliation":[]},{"given":"Hamid Reza","family":"Motahari-Nezhad","sequence":"additional","affiliation":[]},{"given":"Sharad","family":"Singhal","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"bibtsc201104034019","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2008.77"},{"key":"bibtsc201104034017","doi-asserted-by":"publisher","DOI":"10.1109\/ECBS.2009.14"},{"key":"bibtsc201104034018","year":"2011"},{"key":"bibtsc201104034039","author":"shukla","year":"2006","journal-title":"Essential Windows Workflow Foundation"},{"key":"bibtsc201104034037","author":"roth","year":"2011","journal-title":"Creating On-Demand Applications An Introduction to the Apex Platform"},{"key":"bibtsc201104034038","year":"2011"},{"key":"bibtsc201104034035","year":"2011"},{"key":"bibtsc201104034036","doi-asserted-by":"publisher","DOI":"10.1145\/355112.355122"},{"key":"bibtsc201104034033","doi-asserted-by":"publisher","DOI":"10.1145\/1151030.1151053"},{"key":"bibtsc20110403401","year":"2008","journal-title":"Amazon Web Services Overview of Security Processes"},{"key":"bibtsc201104034034","year":"2011"},{"key":"bibtsc201104034031","year":"2008"},{"key":"bibtsc201104034032","article-title":"Quality-Driven Business Policy Specification and Refinement for Service-Oriented Systems","author":"phan","year":"2008","journal-title":"Proc Int'l Conf Service-Oriented Computing (ICSOC '08)"},{"key":"bibtsc201104034012","article-title":"A Survey of Web Services Security","volume":"1","author":"gutirrez","year":"2004","journal-title":"Proc Int'l Conf Computational Science and Its Applications (ICCSA '04)"},{"key":"bibtsc20110403405","article-title":"Rule-Based Policy Specification: State of the Art and Future Work","author":"bonatti","year":"2004"},{"key":"bibtsc201104034030","doi-asserted-by":"publisher","DOI":"10.1145\/984334.984339"},{"key":"bibtsc201104034011","article-title":"Internet Evolution - Cloud Control","author":"fratto","year":"2009","journal-title":"Information Week"},{"key":"bibtsc20110403404","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-004-0061-9"},{"key":"bibtsc201104034010","article-title":"Directive 95\/46\/EC of the European Parliament and of the Council of 24 October 1995 on the Protection of Individuals with Regard to the Processing of Personal Data and on the Free Movement of Such Data","year":"2011"},{"key":"bibtsc20110403403","article-title":"Web Services Policy 1.2 - Framework (WS-Policy)","author":"bajaj","year":"2006"},{"key":"bibtsc20110403402","doi-asserted-by":"publisher","DOI":"10.1109\/ARES.2009.152"},{"key":"bibtsc201104034016","article-title":"Health Information Privacy","year":"2011"},{"key":"bibtsc20110403409","article-title":"A Survey of Policy Specification Approaches","author":"damianou","year":"2002"},{"key":"bibtsc201104034015","year":"2011"},{"key":"bibtsc20110403408","doi-asserted-by":"crossref","first-page":"16","DOI":"10.1007\/11552338_2","article-title":"Metadata Management in Outsourced Encrypted Databases","author":"damiani","year":"2005","journal-title":"Proc Second VLDB Workshop Secure Data Management"},{"key":"bibtsc201104034014","doi-asserted-by":"publisher","DOI":"10.1016\/0167-6423(87)90035-9"},{"key":"bibtsc20110403407","doi-asserted-by":"publisher","DOI":"10.1016\/j.entcs.2006.11.003"},{"key":"bibtsc201104034013","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-72988-4_17"},{"key":"bibtsc20110403406","doi-asserted-by":"publisher","DOI":"10.1109\/POLICY.2007.30"},{"key":"bibtsc201104034029","year":"2006"},{"key":"bibtsc201104034028","year":"2007"},{"key":"bibtsc201104034042","doi-asserted-by":"publisher","DOI":"10.1145\/988672.988680"},{"key":"bibtsc201104034024","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-74835-9_17"},{"key":"bibtsc201104034043","year":"2011"},{"key":"bibtsc201104034025","year":"2009"},{"key":"bibtsc201104034026","year":"2007"},{"key":"bibtsc201104034044","year":"2011"},{"key":"bibtsc201104034027","year":"2005"},{"key":"bibtsc201104034045","year":"2009"},{"key":"bibtsc201104034020","article-title":"A Data Assurance Policy Specification and Enforcement Framework for Outsourced Services","author":"li","year":"2009"},{"key":"bibtsc201104034046","first-page":"168","article-title":"Security of Relational Databases in Business Outsourcing","author":"uzun","year":"2008"},{"key":"bibtsc201104034021","doi-asserted-by":"publisher","DOI":"10.1109\/ARES.2009.79"},{"key":"bibtsc201104034047","year":"2011"},{"key":"bibtsc201104034022","doi-asserted-by":"publisher","DOI":"10.1109\/MSPEC.2009.4907382"},{"key":"bibtsc201104034048","first-page":"782","article-title":"Integrity Auditing of Outsourced Data","author":"xie","year":"2007","journal-title":"Proc Int'l Conf Very Large Data Bases (VLDB '07)"},{"key":"bibtsc201104034023","doi-asserted-by":"publisher","DOI":"10.1109\/ARES.2009.90"},{"key":"bibtsc201104034040","article-title":"Gartner Finds SaaS Market to Hit $19.3 Billion by 2011","author":"sims","year":"2011"},{"key":"bibtsc201104034041","first-page":"800","article-title":"Guide to Secure Web Services: Recommendations of the National Institute of Standards and Technology","author":"singhal","year":"2007"}],"container-title":["IEEE Transactions on Services Computing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4629386\/6077878\/05674011.pdf?arnumber=5674011","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,11,29]],"date-time":"2021-11-29T20:54:09Z","timestamp":1638219249000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5674011\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,10]]},"references-count":48,"journal-issue":{"issue":"4"},"URL":"https:\/\/doi.org\/10.1109\/tsc.2010.53","relation":{},"ISSN":["1939-1374"],"issn-type":[{"value":"1939-1374","type":"print"}],"subject":[],"published":{"date-parts":[[2011,10]]}}}