{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,19]],"date-time":"2025-09-19T10:51:54Z","timestamp":1758279114679,"version":"3.28.0"},"reference-count":38,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,11]]},"DOI":"10.1109\/smartcloud.2016.19","type":"proceedings-article","created":{"date-parts":[[2016,12,26]],"date-time":"2016-12-26T16:49:47Z","timestamp":1482770987000},"page":"35-40","source":"Crossref","is-referenced-by-count":6,"title":["A Framework to Secure the Virtual Machine Image in Cloud Computing"],"prefix":"10.1109","author":[{"given":"Raid Khalid","family":"Hussein","sequence":"first","affiliation":[]},{"given":"Ahmed","family":"Alenezi","sequence":"additional","affiliation":[]},{"given":"Gary B.","family":"Wills","sequence":"additional","affiliation":[]},{"given":"Robert J.","family":"Walters","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1145\/2046660.2046666"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/CloudCom.2010.66"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1016\/0167-4048(91)90068-O"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/SKG.2010.19"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.2307\/249477"},{"key":"ref37","first-page":"344","article-title":"Cloud computing security issues and challenges","author":"popovi?","year":"2010"},{"key":"ref36","first-page":"253","article-title":"Functional Encryption: Definitions and Challenges Introdu. cao","volume":"2","author":"ortiz","year":"2014"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2010.12.006"},{"key":"ref34","first-page":"338","article-title":"User Authentication in Cloud Computing\\nUbiquitous Computing and Multimedia Applications","volume":"151","author":"chang","year":"2011"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.telpol.2012.04.011"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1186\/1869-0238-4-5"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ICCSN.2011.6014716"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.4018\/jaci.2011010102"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2008.12.001"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2014.10.034"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2011.10.013"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/SOSE.2013.50"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.4108\/icst.trustcol.2010.1"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2015.01.025"},{"journal-title":"Cloud Security Alliance","article-title":"Cloud Controls Matrix Working Group","year":"2014","key":"ref28"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2010.5462173"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/SCC.2013.57"},{"key":"ref3","first-page":"5490","article-title":"Cloud computing security: From single to multi-clouds","author":"alzain","year":"2011","journal-title":"Proc Hawaii Int Conf Syst Sci"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-012-0831-5"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/344287.344301"},{"key":"ref5","first-page":"540","article-title":"Virtualization in Cloud Computing","volume":"35","author":"swathi","year":"2014","journal-title":"Int J Comput Sci Mob Comput"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TENCON.2015.7373063"},{"key":"ref7","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.jnca.2010.07.006","article-title":"A survey on security issues in service delivery models of cloud computing","volume":"34","author":"subashini","year":"2011","journal-title":"J Netw Comput Appl"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.4018\/978-1-4666-0026-3.ch008"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/SOSE.2014.50"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-10665-1_15"},{"key":"ref20","first-page":"562","article-title":"Security-Preserving Live Migration of Virtual Machines in the Cloud","author":"zhang","year":"2012","journal-title":"J Netw Syst Manag"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2014.09.009"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2011.103"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/2523514.2523576"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/1655008.1655021"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2013.33"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1186\/2192-113X-1-12"}],"event":{"name":"2016 IEEE International Conference on Smart Cloud (SmartCloud)","start":{"date-parts":[[2016,11,18]]},"location":"New York, NY, USA","end":{"date-parts":[[2016,11,20]]}},"container-title":["2016 IEEE International Conference on Smart Cloud (SmartCloud)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7795279\/7796135\/07796151.pdf?arnumber=7796151","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,16]],"date-time":"2019-09-16T19:52:45Z","timestamp":1568663565000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7796151\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,11]]},"references-count":38,"URL":"https:\/\/doi.org\/10.1109\/smartcloud.2016.19","relation":{},"subject":[],"published":{"date-parts":[[2016,11]]}}}