{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T05:50:16Z","timestamp":1730267416791,"version":"3.28.0"},"reference-count":23,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,9]]},"DOI":"10.1109\/incos.2015.79","type":"proceedings-article","created":{"date-parts":[[2015,11,2]],"date-time":"2015-11-02T18:14:49Z","timestamp":1446488089000},"page":"423-428","source":"Crossref","is-referenced-by-count":5,"title":["An Analysis of the Security Threats and Vulnerabilities of Cloud Computing in Oman"],"prefix":"10.1109","author":[{"given":"Amira M.","family":"AlZadjali","sequence":"first","affiliation":[]},{"given":"Ali H.","family":"Al-Badi","sequence":"additional","affiliation":[]},{"given":"Saqib","family":"Ali","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","article-title":"A Survey on Cloud Computing Security Threats and Vulnerabilities","volume":"2","author":"venkata","year":"2004","journal-title":"International Journal of Innovative Research in Electrical Electronics Instrumentation and Control Engineering"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-22726-4_46"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-22577-2_5"},{"key":"ref13","article-title":"NIST Guidelines on Security and Privacy in Public Cloud Computing","author":"wayne jansen","year":"2011","journal-title":"Draft Special Publication 800&#x2013;144"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2010.12.006"},{"year":"2010","author":"zhang","key":"ref15"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2010.5462173"},{"key":"ref17","article-title":"Data Security in the World of Cloud Computing","author":"harauz","year":"2011","journal-title":"IEEE Security & Privacy"},{"article-title":"Cloud security and privacy: an enterprise perspective on risks and compliance","year":"2009","author":"mather","key":"ref18"},{"journal-title":"Connecting Data Centres over Public Networks","year":"2011","author":"jessica","key":"ref19"},{"key":"ref4","first-page":"3","article-title":"Towards trusted cloud computing","author":"santos","year":"2009","journal-title":"proceeding of Proceedings of the 2009 conference on Hot topics in cloud computing"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ISSA.2010.5588290"},{"journal-title":"Security Threats in Cloud Computing 6th International conference on internet technology and secured transaction","year":"2011","author":"shaikh","key":"ref6"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1186\/1869-0238-4-5"},{"journal-title":"A Survey on Security Issues in Cloud Computing","year":"2011","author":"bhadauria","key":"ref8"},{"key":"ref7","article-title":"A Survey on Security Issues and Vulnerabilities on Cloud Computing","volume":"4","author":"neela","year":"2013","journal-title":"International Journal of Computer Science & Engineering Technology (IJCSET)"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2010.07.006"},{"journal-title":"Survey on Security Issues in Cloud Computing and Associated Mitigation Techniques","year":"2013","author":"bhadauria","key":"ref1"},{"journal-title":"A review on cloud computing security issues & challanges","year":"2013","author":"alvi","key":"ref9"},{"journal-title":"TimeTec Cloud Security Facing Security Challenges Head-On Academia FingerTec","year":"2013","author":"choo","key":"ref20"},{"key":"ref22","first-page":"1","volume":"3","author":"khalil","year":"2014","journal-title":"Cloud computing security a survey Computers"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.5121\/acij.2013.4102"},{"journal-title":"Vulnerabilities in Cloud Computing","year":"2013","author":"hussain","key":"ref23"}],"event":{"name":"2015 International Conference on Intelligent Networking and Collaborative Systems (INCOS)","start":{"date-parts":[[2015,9,2]]},"location":"Taipei, Taiwan","end":{"date-parts":[[2015,9,4]]}},"container-title":["2015 International Conference on Intelligent Networking and Collaborative Systems"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7308340\/7312007\/07312110.pdf?arnumber=7312110","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,25]],"date-time":"2017-03-25T00:26:08Z","timestamp":1490401568000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7312110\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,9]]},"references-count":23,"URL":"https:\/\/doi.org\/10.1109\/incos.2015.79","relation":{},"subject":[],"published":{"date-parts":[[2015,9]]}}}