{"id":"https://openalex.org/W4239598197","doi":"https://doi.org/10.1145/2808425","title":"Proceedings of the 2015 ACM Workshop on Cloud Computing Security Workshop","display_name":"Proceedings of the 2015 ACM Workshop on Cloud Computing Security Workshop","publication_year":2015,"publication_date":"2015-10-06","ids":{"openalex":"https://openalex.org/W4239598197","doi":"https://doi.org/10.1145/2808425"},"language":"en","primary_location":{"id":"doi:10.1145/2808425","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2808425","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":null,"raw_type":"proceedings"},"type":"paratext","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":0,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":null,"has_fulltext":false,"cited_by_count":6,"citation_normalized_percentile":null,"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":true,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9832000136375427,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9832000136375427,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10101","display_name":"Cloud Computing and Resource Management","score":0.9261000156402588,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.9018217325210571},{"id":"https://openalex.org/keywords/cloud-computing-security","display_name":"Cloud computing security","score":0.7656497955322266},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7259348630905151},{"id":"https://openalex.org/keywords/virtualization","display_name":"Virtualization","score":0.5971826314926147},{"id":"https://openalex.org/keywords/scalability","display_name":"Scalability","score":0.5270576477050781},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5013468265533447},{"id":"https://openalex.org/keywords/data-security","display_name":"Data security","score":0.44792744517326355},{"id":"https://openalex.org/keywords/cloud-testing","display_name":"Cloud testing","score":0.413382351398468},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.3438164293766022},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.11304154992103577},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.09116488695144653}],"concepts":[{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.9018217325210571},{"id":"https://openalex.org/C184842701","wikidata":"https://www.wikidata.org/wiki/Q370563","display_name":"Cloud computing security","level":3,"score":0.7656497955322266},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7259348630905151},{"id":"https://openalex.org/C513985346","wikidata":"https://www.wikidata.org/wiki/Q270471","display_name":"Virtualization","level":3,"score":0.5971826314926147},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.5270576477050781},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5013468265533447},{"id":"https://openalex.org/C10511746","wikidata":"https://www.wikidata.org/wiki/Q899388","display_name":"Data security","level":3,"score":0.44792744517326355},{"id":"https://openalex.org/C120115606","wikidata":"https://www.wikidata.org/wiki/Q5135723","display_name":"Cloud testing","level":4,"score":0.413382351398468},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.3438164293766022},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.11304154992103577},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.09116488695144653},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/2808425","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2808425","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":null,"raw_type":"proceedings"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W2992874102","https://openalex.org/W2219779451","https://openalex.org/W4362605970","https://openalex.org/W2289599439","https://openalex.org/W2097475980","https://openalex.org/W2063754319","https://openalex.org/W2267258267","https://openalex.org/W2080464316","https://openalex.org/W2913402989","https://openalex.org/W2936848215"],"abstract_inverted_index":{"It":[0],"is":[1,44,55,153],"our":[2],"great":[3],"pleasure":[4],"to":[5,7,154,211,225,230],"welcome":[6],"you":[8],"2015":[9,182],"edition":[10],"of":[11,41,75,86,109,117,126,150,170,188,194,236,244,260],"the":[12,26,83,106,118,134,142,151,156,200,226,240],"ACM":[13,28],"Cloud":[14,61],"Computing":[15],"Security":[16,32],"Workshop":[17],"(CCSW)":[18],"held":[19],"October":[20],"16,":[21],"2015,":[22],"in":[23,35,145,239,249],"conjunction":[24],"with":[25],"22nd":[27],"Computer":[29],"and":[30,51,59,78,98,115,122,137,158,167,173,220,234,246],"Communication":[31],"(CCS)":[33],"conference":[34],"Denver,":[36],"Colorado,":[37],"USA.":[38],"The":[39,129,148,181,252],"paradigm":[40],"cloud":[42,87,110,146,165,250],"computing":[43,88,94,111],"revolutionizing":[45],"today's":[46],"information":[47],"communication":[48],"technologies,":[49],"impacting":[50],"redefining":[52],"how":[53],"data":[54,237],"stored,":[56],"retrieved,":[57],"processed":[58],"shared.":[60],"services":[62],"provide":[63],"an":[64],"elastic,":[65],"scalable,":[66],"large-scale":[67],"environment":[68],"typically":[69],"marked":[70],"by":[71,141,164,199],"a":[72,186,204],"high":[73,190],"degree":[74],"resource":[76],"virtualization":[77],"sharing":[79],"among":[80],"tenants.":[81],"While":[82],"economic":[84,242],"benefits":[85],"are":[89,124,162,209],"widely":[90],"recognized,":[91],"this":[92],"new":[93,171,218],"model":[95],"creates":[96],"security":[97,135,157,233],"privacy":[99,159,235],"requirements":[100],"different":[101],"from":[102,223],"traditional":[103],"environments.":[104],"With":[105],"wide":[107],"adoption":[108],"paradigm,":[112],"security,":[113,245],"privacy,":[114],"availability":[116],"involved":[119],"operations,":[120],"components,":[121],"systems":[123],"becoming":[125],"increasing":[127],"importance.":[128],"CCSW":[130],"workshop":[131,152,184],"focuses":[132],"on":[133],"challenges":[136,160],"research":[138,227],"opportunities":[139],"raised":[140,163],"recent":[143],"developments":[144],"computing.":[147],"goal":[149],"explore":[155],"that":[161,175,216],"computing,":[166],"foster":[168],"development":[169],"ideas":[172],"solutions":[174],"can":[176],"be":[177],"transitioned":[178],"into":[179],"practice.":[180],"CSW":[183],"received":[185],"total":[187],"twenty-one":[189],"quality":[191],"submissions,":[192],"out":[193],"which":[195],"six":[196],"were":[197],"selected":[198],"program":[201],"committee":[202],"through":[203],"rigorous":[205],"reviewing":[206],"process.":[207],"We":[208],"delighted":[210],"have":[212],"three":[213,253],"keynote":[214],"talks":[215],"bring":[217],"perspectives":[219],"practical":[221],"problems":[222],"industry":[224],"community":[228],"related":[229],"issues":[231],"like":[232],"stored":[238],"cloud,":[241],"impact":[243],"risk":[247],"management":[248],"settings.":[251],"invited":[254],"speakers":[255],"are:":[256],"Mike":[257],"Reiter":[258],"(University":[259],"North":[261],"Carolina,":[262],"USA)Chenxi":[263],"Wang":[264],"(Ciphercloud,":[265],"USA)Bruce":[266],"Grenfell":[267],"(Concur":[268],"/":[269],"SAP,":[270],"USA)":[271]},"counts_by_year":[{"year":2023,"cited_by_count":1},{"year":2021,"cited_by_count":2},{"year":2019,"cited_by_count":1},{"year":2015,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
