{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,1]],"date-time":"2022-04-01T12:21:18Z","timestamp":1648815678670},"reference-count":0,"publisher":"Inderscience Publishers","issue":"3\/4","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IJICT"],"published-print":{"date-parts":[[2013]]},"DOI":"10.1504\/ijict.2013.054938","type":"journal-article","created":{"date-parts":[[2013,6,24]],"date-time":"2013-06-24T11:30:54Z","timestamp":1372073454000},"page":"272","source":"Crossref","is-referenced-by-count":1,"title":["The technical security issues in cloud computing"],"prefix":"10.1504","volume":"5","author":[{"given":"Jun","family":"Shi","sequence":"first","affiliation":[]},{"given":"Hui","family":"Li","sequence":"additional","affiliation":[]},{"given":"Lidong","family":"Zhou","sequence":"additional","affiliation":[]}],"member":"378","container-title":["International Journal of Information and Communication Technology"],"original-title":[],"language":"en","deposited":{"date-parts":[[2013,6,24]],"date-time":"2013-06-24T11:31:07Z","timestamp":1372073467000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.inderscience.com\/link.php?id=54938"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"references-count":0,"journal-issue":{"issue":"3\/4","published-print":{"date-parts":[[2013]]}},"URL":"https:\/\/doi.org\/10.1504\/ijict.2013.054938","relation":{},"ISSN":["1466-6642","1741-8070"],"issn-type":[{"value":"1466-6642","type":"print"},{"value":"1741-8070","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013]]}}}