{"id":"https://openalex.org/W2041696954","doi":"https://doi.org/10.1109/trustcom.2013.195","title":"Towards Building an Automated Security Compliance Tool for the Cloud","display_name":"Towards Building an Automated Security Compliance Tool for the Cloud","publication_year":2013,"publication_date":"2013-07-01","ids":{"openalex":"https://openalex.org/W2041696954","doi":"https://doi.org/10.1109/trustcom.2013.195","mag":"2041696954"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/trustcom.2013.195","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},"type":"article","type_crossref":"proceedings-article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5012020692","display_name":"Kazi Wali Ullah","orcid":null},"institutions":[{"id":"https://openalex.org/I4210163994","display_name":"Ericsson (Finland)","ror":"https://ror.org/04vv43q89","country_code":"FI","type":"company","lineage":["https://openalex.org/I1306339040","https://openalex.org/I4210163994"]}],"countries":["FI"],"is_corresponding":false,"raw_author_name":"Kazi Wali Ullah","raw_affiliation_strings":["[Ericsson Research, Finland]"],"affiliations":[{"raw_affiliation_string":"[Ericsson Research, Finland]","institution_ids":["https://openalex.org/I4210163994"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5027420021","display_name":"Abu Shohel Ahmed","orcid":"https://orcid.org/0000-0002-8016-5731"},"institutions":[{"id":"https://openalex.org/I4210163994","display_name":"Ericsson (Finland)","ror":"https://ror.org/04vv43q89","country_code":"FI","type":"company","lineage":["https://openalex.org/I1306339040","https://openalex.org/I4210163994"]}],"countries":["FI"],"is_corresponding":false,"raw_author_name":"Abu Shohel Ahmed","raw_affiliation_strings":["[Ericsson Research, Finland]"],"affiliations":[{"raw_affiliation_string":"[Ericsson Research, Finland]","institution_ids":["https://openalex.org/I4210163994"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5039484686","display_name":"Jukka Ylitalo","orcid":null},"institutions":[{"id":"https://openalex.org/I4210163994","display_name":"Ericsson (Finland)","ror":"https://ror.org/04vv43q89","country_code":"FI","type":"company","lineage":["https://openalex.org/I1306339040","https://openalex.org/I4210163994"]}],"countries":["FI"],"is_corresponding":false,"raw_author_name":"Jukka Ylitalo","raw_affiliation_strings":["[Ericsson Research, Finland]"],"affiliations":[{"raw_affiliation_string":"[Ericsson Research, Finland]","institution_ids":["https://openalex.org/I4210163994"]}]}],"institution_assertions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":2.327,"has_fulltext":true,"fulltext_origin":"ngrams","cited_by_count":49,"citation_normalized_percentile":{"value":0.914767,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":95,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"1587","last_page":"1593"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9999,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9999,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.999,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10101","display_name":"Cloud Computing and Resource Management","score":0.9975,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[],"concepts":[{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.8626514},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7231705},{"id":"https://openalex.org/C184842701","wikidata":"https://www.wikidata.org/wiki/Q370563","display_name":"Cloud computing security","level":3,"score":0.61674196},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.57783365},{"id":"https://openalex.org/C199521495","wikidata":"https://www.wikidata.org/wiki/Q181487","display_name":"Audit","level":2,"score":0.53690577},{"id":"https://openalex.org/C2780233690","wikidata":"https://www.wikidata.org/wiki/Q535347","display_name":"Transparency (behavior)","level":2,"score":0.48707917},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.15330899},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.098724276},{"id":"https://openalex.org/C121955636","wikidata":"https://www.wikidata.org/wiki/Q4116214","display_name":"Accounting","level":1,"score":0.09152755}],"mesh":[],"locations_count":1,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/trustcom.2013.195","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false}],"best_oa_location":null,"sustainable_development_goals":[],"grants":[],"datasets":[],"versions":[],"referenced_works_count":9,"referenced_works":["https://openalex.org/W1505781329","https://openalex.org/W1577231857","https://openalex.org/W1993957541","https://openalex.org/W1995761541","https://openalex.org/W2098329135","https://openalex.org/W2100121730","https://openalex.org/W2125776062","https://openalex.org/W2356256467","https://openalex.org/W4285719527"],"related_works":["https://openalex.org/W4205923274","https://openalex.org/W4205234238","https://openalex.org/W3167767780","https://openalex.org/W3148880067","https://openalex.org/W3142266060","https://openalex.org/W3043682580","https://openalex.org/W2941559775","https://openalex.org/W2931996793","https://openalex.org/W2788934790","https://openalex.org/W2593645431"],"abstract_inverted_index":{"Security,":[0],"especially":[1],"security":[2,38,45,55,77],"compliance,":[3],"is":[4,9,65,71,210],"a":[5,72,92,150,197],"major":[6],"concern":[7],"that":[8],"slowing":[10],"down":[11],"large":[12],"scale":[13],"adoption":[14],"of":[15,37,87,117,200],"cloud":[16,41,89,119,133,151,180,214],"computing":[17,152],"in":[18,125,138],"the":[19,30,85,96,102,108,112,118,122,132,179,205,217,222],"enterprise":[20],"environment.":[21],"Governmental":[22],"regulations,":[23],"business":[24],"requirements":[25],"and":[26,62,67,83,99,104,182,190,216],"trust":[27],"are":[28,219],"among":[29],"reasons":[31],"why":[32],"enterprises":[33],"require":[34],"certain":[35],"levels":[36],"compliance":[39,46,78,86,109],"from":[40,178],"providers.":[42,90],"So":[43],"far,":[44],"or":[47],"auditing":[48],"information":[49],"has":[50],"been":[51],"generated":[52],"manually":[53],"by":[54,106],"specialists.":[56],"This":[57],"involves":[58],"manual":[59,191],"data":[60,172,177],"collection":[61,173],"assessment,":[63],"which":[64,124],"slow":[66],"expensive.":[68],"Thus,":[69],"there":[70],"need":[73],"for":[74,149],"an":[75,143,147],"automated":[76],"tool":[79,93,113],"(ASCT)":[80],"to":[81,121,145,161,170,175],"verify":[82],"express":[84],"various":[88],"Such":[91],"can":[94],"reduce":[95,101],"human":[97],"intervention":[98],"eventually":[100],"cost":[103],"time":[105],"verifying":[107],"automatically.":[110],"Also,":[111],"will":[114,127],"enable":[115],"transparency":[116],"vendors":[120],"customers":[123],"turn":[126],"help":[128],"grow":[129],"confidence":[130],"on":[131,204],"vendors.":[134],"Having":[135],"these":[136,183],"goals":[137],"mind,":[139],"we":[140,194],"have":[141,155,195],"developed":[142],"architecture":[144],"build":[146],"ASCT":[148,202],"platform.":[153],"We":[154],"also":[156],"outlined":[157],"four":[158,167,171],"possible":[159,166],"approaches":[160,168],"achieve":[162],"this":[163,201],"automation.":[164],"These":[165],"refer":[169],"mechanisms":[174],"collect":[176],"systems":[181],"are:":[184],"API,":[185],"vulnerability":[186],"scanning,":[187],"log":[188],"analysis":[189],"entry.":[192],"Finally,":[193],"implemented":[196],"proof-of-concept":[198],"prototype":[199,209],"based":[203],"proposed":[206],"architecture.":[207],"The":[208],"integrated":[211],"with":[212],"OpenStack":[213],"platform":[215],"results":[218],"exposed":[220],"using":[221],"CloudAudit":[223],"API.":[224]},"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W2041696954","counts_by_year":[{"year":2024,"cited_by_count":4},{"year":2022,"cited_by_count":5},{"year":2021,"cited_by_count":5},{"year":2020,"cited_by_count":4},{"year":2019,"cited_by_count":7},{"year":2018,"cited_by_count":4},{"year":2017,"cited_by_count":7},{"year":2016,"cited_by_count":4},{"year":2015,"cited_by_count":5},{"year":2014,"cited_by_count":4}],"updated_date":"2024-12-10T21:28:35.542871","created_date":"2016-06-24"}