iBet uBet web content aggregator. Adding the entire web to your favor.
iBet uBet web content aggregator. Adding the entire web to your favor.



Link to original content: https://api.crossref.org/works/10.1109/DSNW.2012.6264664
{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T10:49:38Z","timestamp":1725792578941},"reference-count":19,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012,6]]},"DOI":"10.1109\/dsnw.2012.6264664","type":"proceedings-article","created":{"date-parts":[[2012,8,17]],"date-time":"2012-08-17T15:49:12Z","timestamp":1345218552000},"page":"1-6","source":"Crossref","is-referenced-by-count":4,"title":["Physical attack protection with human-secure virtualization in data centers"],"prefix":"10.1109","author":[{"given":"Jakub","family":"Szefer","sequence":"first","affiliation":[]},{"given":"Pramod","family":"Jamkhedkar","sequence":"additional","affiliation":[]},{"family":"Yu-Yuan Chen","sequence":"additional","affiliation":[]},{"given":"Ruby B.","family":"Lee","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1109\/2.955100"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1109\/ISCA.2005.14"},{"journal-title":"Proc of the Conf on Computer and Communications Security Ser CCS","article-title":"Hardware-rooted trust for secure key management and transient trust","year":"2007","author":"dwoskin","key":"18"},{"journal-title":"Effective Physical Security","year":"2003","author":"fennelly","key":"15"},{"journal-title":"Principles of Information Security","year":"2011","author":"whitman","key":"16"},{"journal-title":"Motion Sensing as a Proxy for Data Center \"freshness \"","year":"0","key":"13"},{"journal-title":"Sensaphone Remote Monitoring Solutions","year":"0","key":"14"},{"journal-title":"CSO Security and Risk","article-title":"19 ways to build physical security into a data center","year":"0","author":"scalet","key":"11"},{"journal-title":"A White Paper from Accenture and Microsoft","article-title":"A practical guide to cloud computing security","year":"2009","author":"almond","key":"12"},{"journal-title":"New York Post","article-title":"NYPD civilian worker busted in mass cop-ID theft","year":"2009","author":"blau","key":"3"},{"journal-title":"SANS Institute Tech Rep","article-title":"Data center physical security checklist","year":"2001","author":"heare","key":"2"},{"journal-title":"The 10 Most Overlooked Aspects of Security","year":"2006","author":"higgins","key":"1"},{"journal-title":"Proceedings of the International Conference on Informatics and Systems ser INFOS","article-title":"Infrastructure as a service security: Challenges and solutions","year":"2010","author":"dawoud","key":"10"},{"journal-title":"On the Security of Virtual Machine Migration and Related Topics","year":"2010","author":"masti","key":"7"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/CCGRID.2009.97"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA.2010.5416657"},{"journal-title":"Trusted Strategies LLC","article-title":"Stolen drives and servers, dont think it cant happen in your data center","year":"2007","author":"muir","key":"4"},{"journal-title":"OpenStack Compute An Overview","year":"0","key":"9"},{"journal-title":"Moving Target Defense Creating Asymmetric Uncertainty for Cyber Threats","year":"2011","author":"jajodia","key":"8","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4614-0977-9"}],"event":{"name":"2012 IEEE\/IFIP 42nd International Conference on Dependable Systems and Networks Workshops (DSN-W)","start":{"date-parts":[[2012,6,25]]},"location":"Boston, MA, USA","end":{"date-parts":[[2012,6,28]]}},"container-title":["IEEE\/IFIP International Conference on Dependable Systems and Networks Workshops (DSN 2012)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6255871\/6264647\/06264664.pdf?arnumber=6264664","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,20]],"date-time":"2017-06-20T18:59:24Z","timestamp":1497985164000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6264664\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,6]]},"references-count":19,"URL":"http:\/\/dx.doi.org\/10.1109\/dsnw.2012.6264664","relation":{},"subject":[],"published":{"date-parts":[[2012,6]]}}}