{"id":"https://openalex.org/W2101490713","doi":"https://doi.org/10.1145/1774088.1774176","title":"Transparent security for cloud","display_name":"Transparent security for cloud","publication_year":2010,"publication_date":"2010-03-22","ids":{"openalex":"https://openalex.org/W2101490713","doi":"https://doi.org/10.1145/1774088.1774176","mag":"2101490713"},"language":"en","primary_location":{"id":"doi:10.1145/1774088.1774176","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1774088.1774176","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2010 ACM Symposium on Applied Computing","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5053363798","display_name":"Flavio Lombardi","orcid":"https://orcid.org/0000-0003-0723-7847"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Flavio Lombardi","raw_affiliation_strings":["Sistemi Informativi, Rome, Italy"],"affiliations":[{"raw_affiliation_string":"Sistemi Informativi, Rome, Italy","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5065932621","display_name":"Roberto Di Pietro","orcid":"https://orcid.org/0000-0003-1909-0336"},"institutions":[{"id":"https://openalex.org/I55952717","display_name":"Universidad Rovira i Virgili","ror":"https://ror.org/00g5sqv46","country_code":"ES","type":"education","lineage":["https://openalex.org/I55952717"]}],"countries":["ES"],"is_corresponding":false,"raw_author_name":"Roberto Di Pietro","raw_affiliation_strings":["Universitat Rovira i Virgili, Tarragona, Spain"],"affiliations":[{"raw_affiliation_string":"Universitat Rovira i Virgili, Tarragona, Spain","institution_ids":["https://openalex.org/I55952717"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5053363798"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":13.0336,"has_fulltext":false,"cited_by_count":50,"citation_normalized_percentile":{"value":0.98738348,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"414","last_page":"415"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9976000189781189,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.8508983850479126},{"id":"https://openalex.org/keywords/virtualization","display_name":"Virtualization","score":0.7180874943733215},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7040351629257202},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6268907189369202},{"id":"https://openalex.org/keywords/cloud-computing-security","display_name":"Cloud computing security","score":0.6080023050308228},{"id":"https://openalex.org/keywords/virtual-machine","display_name":"Virtual machine","score":0.47880086302757263},{"id":"https://openalex.org/keywords/data-integrity","display_name":"Data integrity","score":0.43184155225753784},{"id":"https://openalex.org/keywords/enterprise-information-security-architecture","display_name":"Enterprise information security architecture","score":0.4103124737739563},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.2179102599620819}],"concepts":[{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.8508983850479126},{"id":"https://openalex.org/C513985346","wikidata":"https://www.wikidata.org/wiki/Q270471","display_name":"Virtualization","level":3,"score":0.7180874943733215},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7040351629257202},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6268907189369202},{"id":"https://openalex.org/C184842701","wikidata":"https://www.wikidata.org/wiki/Q370563","display_name":"Cloud computing security","level":3,"score":0.6080023050308228},{"id":"https://openalex.org/C25344961","wikidata":"https://www.wikidata.org/wiki/Q192726","display_name":"Virtual machine","level":2,"score":0.47880086302757263},{"id":"https://openalex.org/C33762810","wikidata":"https://www.wikidata.org/wiki/Q461671","display_name":"Data integrity","level":2,"score":0.43184155225753784},{"id":"https://openalex.org/C31139447","wikidata":"https://www.wikidata.org/wiki/Q5380386","display_name":"Enterprise information security architecture","level":2,"score":0.4103124737739563},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.2179102599620819}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1145/1774088.1774176","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1774088.1774176","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2010 ACM Symposium on Applied Computing","raw_type":"proceedings-article"},{"id":"pmh:oai:CiteSeerX.psu:10.1.1.715.3541","is_oa":false,"landing_page_url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.715.3541","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"http://ricerca.mat.uniroma3.it/users/dipietro/publications/p414-lombardi.pdf","raw_type":"text"},{"id":"pmh:oai:iris.uniroma3.it:11590/175968","is_oa":false,"landing_page_url":"http://hdl.handle.net/11590/175968","pdf_url":null,"source":{"id":"https://openalex.org/S4377196120","display_name":"Iris (Roma Tre University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I119003972","host_organization_name":"Roma Tre University","host_organization_lineage":["https://openalex.org/I119003972"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"info:eu-repo/semantics/conferenceObject"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/9","score":0.6499999761581421,"display_name":"Industry, innovation and infrastructure"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":4,"referenced_works":["https://openalex.org/W2037061317","https://openalex.org/W2119028650","https://openalex.org/W2162444489","https://openalex.org/W2168869093"],"related_works":["https://openalex.org/W2088620127","https://openalex.org/W2743348030","https://openalex.org/W1963799338","https://openalex.org/W2900408237","https://openalex.org/W2036412865","https://openalex.org/W2542775576","https://openalex.org/W2947629119","https://openalex.org/W2545334782","https://openalex.org/W2346893066","https://openalex.org/W2160597328"],"abstract_inverted_index":{"Large":[0],"distributed":[1],"systems":[2,22],"such":[3,21],"as":[4],"clouds":[5,39],"are":[6],"increasingly":[7],"be-coming":[8],"targets":[9],"of":[10,20,27,53,68],"attacks.":[11],"Virtualization":[12],"can":[13,57],"be":[14,58],"leveraged":[15],"to":[16,60,64,76],"increase":[17],"the":[18,25,33,38,66],"security":[19,52],"by":[23],"protecting":[24],"integrity":[26,67],"guest":[28],"components.":[29],"This":[30],"paper":[31],"discusses":[32],"in-tegrity":[34],"protection":[35],"problem":[36],"in":[37],"and":[40,70,80,88],"sketches":[41],"a":[42],"novel":[43],"architecture,":[44],"Transparent":[45],"Cloud":[46],"Protection":[47],"System":[48],"(TCPS)":[49],"for":[50],"increased":[51],"cloud":[54,62],"resources.":[55],"TCPS":[56],"tai-lored":[59],"different":[61],"flavors":[63],"monitor":[65],"guests":[69],"infrastructure":[71],"components":[72],"while":[73],"remaining":[74],"trans-parent":[75],"virtual":[77],"machines.":[78],"Categories":[79],"Subject":[81],"Descriptors":[82],"D.4.6":[83],"[Software]:":[84],"Operating":[85],"Systems":[86],"\u2014Security":[87],"Pro-":[89]},"counts_by_year":[{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":2},{"year":2019,"cited_by_count":2},{"year":2018,"cited_by_count":1},{"year":2017,"cited_by_count":4},{"year":2016,"cited_by_count":5},{"year":2015,"cited_by_count":5},{"year":2014,"cited_by_count":2},{"year":2013,"cited_by_count":11},{"year":2012,"cited_by_count":10}],"updated_date":"2026-04-05T17:49:38.594831","created_date":"2025-10-10T00:00:00"}
