{"id":"https://openalex.org/W2001672163","doi":"https://doi.org/10.5539/cis.v3n4p175","title":"Security Framework of Cloud Data Storage Based on Multi Agent System Architecture: Semantic Literature Review","display_name":"Security Framework of Cloud Data Storage Based on Multi Agent System Architecture: Semantic Literature Review","publication_year":2010,"publication_date":"2010-10-20","ids":{"openalex":"https://openalex.org/W2001672163","doi":"https://doi.org/10.5539/cis.v3n4p175","mag":"2001672163"},"language":"en","primary_location":{"id":"doi:10.5539/cis.v3n4p175","is_oa":true,"landing_page_url":"https://doi.org/10.5539/cis.v3n4p175","pdf_url":"https://ccsenet.org/journal/index.php/cis/article/download/7133/6130","source":{"id":"https://openalex.org/S2764452479","display_name":"Computer and Information Science","issn_l":"1913-8989","issn":["1913-8989","1913-8997"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310322531","host_organization_name":"Canadian Center of Science and Education","host_organization_lineage":["https://openalex.org/P4310322531"],"host_organization_lineage_names":["Canadian Center of Science and Education"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computer and Information Science","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://ccsenet.org/journal/index.php/cis/article/download/7133/6130","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5014676842","display_name":"Amir Mohamed Talib","orcid":"https://orcid.org/0000-0002-1060-6642"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Amir Mohamed Talib","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5078506222","display_name":"Rodziah Atan","orcid":"https://orcid.org/0000-0003-2655-7280"},"institutions":[{"id":"https://openalex.org/I130343225","display_name":"Universiti Putra Malaysia","ror":"https://ror.org/02e91jd64","country_code":"MY","type":"education","lineage":["https://openalex.org/I130343225"]}],"countries":["MY"],"is_corresponding":true,"raw_author_name":"Rodziah Atan","raw_affiliation_strings":["Faculty of Computer Science & IT, Information System Department University Putra Malaysia, 43400 UPM, Serdang, Selangor, Malaysia"],"affiliations":[{"raw_affiliation_string":"Faculty of Computer Science & IT, Information System Department University Putra Malaysia, 43400 UPM, Serdang, Selangor, Malaysia","institution_ids":["https://openalex.org/I130343225"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5070358977","display_name":"Rusli Abdullah","orcid":"https://orcid.org/0000-0002-3044-2614"},"institutions":[{"id":"https://openalex.org/I130343225","display_name":"Universiti Putra Malaysia","ror":"https://ror.org/02e91jd64","country_code":"MY","type":"education","lineage":["https://openalex.org/I130343225"]}],"countries":["MY"],"is_corresponding":false,"raw_author_name":"Rusli Abdullah","raw_affiliation_strings":["Faculty of Computer Science & IT, Information System Department University Putra Malaysia, 43400 UPM, Serdang, Selangor, Malaysia"],"affiliations":[{"raw_affiliation_string":"Faculty of Computer Science & IT, Information System Department University Putra Malaysia, 43400 UPM, Serdang, Selangor, Malaysia","institution_ids":["https://openalex.org/I130343225"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5022825282","display_name":"Masrah Azrifah Azmi Murad","orcid":"https://orcid.org/0000-0002-0335-5873"},"institutions":[{"id":"https://openalex.org/I130343225","display_name":"Universiti Putra Malaysia","ror":"https://ror.org/02e91jd64","country_code":"MY","type":"education","lineage":["https://openalex.org/I130343225"]}],"countries":["MY"],"is_corresponding":false,"raw_author_name":"Masrah Azrifah Azmi Murad","raw_affiliation_strings":["Faculty of Computer Science & IT, Information System Department University Putra Malaysia, 43400 UPM, Serdang, Selangor, Malaysia"],"affiliations":[{"raw_affiliation_string":"Faculty of Computer Science & IT, Information System Department University Putra Malaysia, 43400 UPM, Serdang, Selangor, Malaysia","institution_ids":["https://openalex.org/I130343225"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5078506222"],"corresponding_institution_ids":["https://openalex.org/I130343225"],"apc_list":null,"apc_paid":null,"fwci":7.6308,"has_fulltext":true,"cited_by_count":26,"citation_normalized_percentile":{"value":0.97007415,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":"3","issue":"4","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10101","display_name":"Cloud Computing and Resource Management","score":0.9965000152587891,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9959999918937683,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8687587380409241},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.7521363496780396},{"id":"https://openalex.org/keywords/cloud-computing-security","display_name":"Cloud computing security","score":0.6634873151779175},{"id":"https://openalex.org/keywords/correctness","display_name":"Correctness","score":0.6003073453903198},{"id":"https://openalex.org/keywords/sherwood-applied-business-security-architecture","display_name":"Sherwood Applied Business Security Architecture","score":0.5488215684890747},{"id":"https://openalex.org/keywords/architecture","display_name":"Architecture","score":0.487502783536911},{"id":"https://openalex.org/keywords/enterprise-information-security-architecture","display_name":"Enterprise information security architecture","score":0.4849567413330078},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.47859689593315125},{"id":"https://openalex.org/keywords/distributed-system-security-architecture","display_name":"Distributed System Security Architecture","score":0.43120312690734863},{"id":"https://openalex.org/keywords/computer-security-model","display_name":"Computer security model","score":0.42056751251220703},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.3518126308917999},{"id":"https://openalex.org/keywords/security-information-and-event-management","display_name":"Security information and event management","score":0.341630756855011},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.17629474401474}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8687587380409241},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.7521363496780396},{"id":"https://openalex.org/C184842701","wikidata":"https://www.wikidata.org/wiki/Q370563","display_name":"Cloud computing security","level":3,"score":0.6634873151779175},{"id":"https://openalex.org/C55439883","wikidata":"https://www.wikidata.org/wiki/Q360812","display_name":"Correctness","level":2,"score":0.6003073453903198},{"id":"https://openalex.org/C60172848","wikidata":"https://www.wikidata.org/wiki/Q7495506","display_name":"Sherwood Applied Business Security Architecture","level":5,"score":0.5488215684890747},{"id":"https://openalex.org/C123657996","wikidata":"https://www.wikidata.org/wiki/Q12271","display_name":"Architecture","level":2,"score":0.487502783536911},{"id":"https://openalex.org/C31139447","wikidata":"https://www.wikidata.org/wiki/Q5380386","display_name":"Enterprise information security architecture","level":2,"score":0.4849567413330078},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.47859689593315125},{"id":"https://openalex.org/C77290126","wikidata":"https://www.wikidata.org/wiki/Q5283128","display_name":"Distributed System Security Architecture","level":5,"score":0.43120312690734863},{"id":"https://openalex.org/C121822524","wikidata":"https://www.wikidata.org/wiki/Q5157582","display_name":"Computer security model","level":2,"score":0.42056751251220703},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.3518126308917999},{"id":"https://openalex.org/C103377522","wikidata":"https://www.wikidata.org/wiki/Q3493999","display_name":"Security information and event management","level":4,"score":0.341630756855011},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.17629474401474},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C153349607","wikidata":"https://www.wikidata.org/wiki/Q36649","display_name":"Visual arts","level":1,"score":0.0},{"id":"https://openalex.org/C142362112","wikidata":"https://www.wikidata.org/wiki/Q735","display_name":"Art","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.5539/cis.v3n4p175","is_oa":true,"landing_page_url":"https://doi.org/10.5539/cis.v3n4p175","pdf_url":"https://ccsenet.org/journal/index.php/cis/article/download/7133/6130","source":{"id":"https://openalex.org/S2764452479","display_name":"Computer and Information Science","issn_l":"1913-8989","issn":["1913-8989","1913-8997"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310322531","host_organization_name":"Canadian Center of Science and Education","host_organization_lineage":["https://openalex.org/P4310322531"],"host_organization_lineage_names":["Canadian Center of Science and Education"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computer and Information Science","raw_type":"journal-article"}],"best_oa_location":{"id":"doi:10.5539/cis.v3n4p175","is_oa":true,"landing_page_url":"https://doi.org/10.5539/cis.v3n4p175","pdf_url":"https://ccsenet.org/journal/index.php/cis/article/download/7133/6130","source":{"id":"https://openalex.org/S2764452479","display_name":"Computer and Information Science","issn_l":"1913-8989","issn":["1913-8989","1913-8997"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310322531","host_organization_name":"Canadian Center of Science and Education","host_organization_lineage":["https://openalex.org/P4310322531"],"host_organization_lineage_names":["Canadian Center of Science and Education"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computer and Information Science","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2001672163.pdf","grobid_xml":"https://content.openalex.org/works/W2001672163.grobid-xml"},"referenced_works_count":51,"referenced_works":["https://openalex.org/W89553247","https://openalex.org/W95915321","https://openalex.org/W154742640","https://openalex.org/W1262401806","https://openalex.org/W1480157704","https://openalex.org/W1495815054","https://openalex.org/W1511577910","https://openalex.org/W1512037836","https://openalex.org/W1559498407","https://openalex.org/W1566711011","https://openalex.org/W1589210756","https://openalex.org/W2003505783","https://openalex.org/W2040193872","https://openalex.org/W2040875549","https://openalex.org/W2043127279","https://openalex.org/W2057901549","https://openalex.org/W2079493184","https://openalex.org/W2091257550","https://openalex.org/W2102881299","https://openalex.org/W2104759537","https://openalex.org/W2107511818","https://openalex.org/W2120811645","https://openalex.org/W2127714911","https://openalex.org/W2132027883","https://openalex.org/W2132421927","https://openalex.org/W2146949683","https://openalex.org/W2147312273","https://openalex.org/W2163488242","https://openalex.org/W2167015470","https://openalex.org/W2171142237","https://openalex.org/W2171872029","https://openalex.org/W2606387571","https://openalex.org/W2949150991","https://openalex.org/W2951280401","https://openalex.org/W3030964839","https://openalex.org/W4210847658","https://openalex.org/W4236045730","https://openalex.org/W4237419292","https://openalex.org/W4285719527","https://openalex.org/W6603635020","https://openalex.org/W6606295097","https://openalex.org/W6633935343","https://openalex.org/W6660379386","https://openalex.org/W6660731112","https://openalex.org/W6665003196","https://openalex.org/W6675339306","https://openalex.org/W6675769264","https://openalex.org/W6679732041","https://openalex.org/W6684904360","https://openalex.org/W6763421864","https://openalex.org/W6778619023"],"related_works":["https://openalex.org/W2008985775","https://openalex.org/W2126467281","https://openalex.org/W422595749","https://openalex.org/W198076453","https://openalex.org/W2765960653","https://openalex.org/W2911124144","https://openalex.org/W2051046095","https://openalex.org/W2784006287","https://openalex.org/W2367773288","https://openalex.org/W2085142160"],"abstract_inverted_index":{"The":[0,59],"purpose":[1],"of":[2,15,31,61,69,74,84,106,132,144,159,165,173,213],"this":[3,193],"literature":[4,75,174],"review":[5,76,175],"is":[6,64,125],"to":[7,28,103,139,183,196,208,210],"provide":[8],"the":[9,13,62,79,110,122,141,169],"information":[10],"about":[11],"illustrating":[12],"usage":[14],"Multi-Agent":[16],"System":[17],"(MAS)":[18],"techniques":[19],"that":[20,94,124,180],"can":[21],"be":[22,96,114],"beneficial":[23],"in":[24,98,101,116,168],"cloud":[25,32,54,99,118,187],"computing":[26],"platform":[27,100,119,188],"facilitate":[29,104,140,211],"security":[30,57,86,105,123,151,157,186,203,212],"data":[33,55,167],"storage":[34,56],"(CDS)":[35],"among":[36],"it.":[37],"MAS":[38,92,111,147,190],"are":[39,50],"often":[40],"distributed":[41],"and":[42,46,82,163,192,205],"agents":[43,200,207],"have":[44],"proactive":[45],"reactive":[47],"features":[48],"which":[49],"very":[51],"useful":[52],"for":[53,120,201],"(CDSS).":[58],"architecture":[60,93,148,191,194],"system":[63],"formed":[65],"from":[66,154],"a":[67,85,91,117,129,185],"set":[68],"agent\u2019s":[70],"communities.":[71],"This":[72,171],"paper":[73,172],"described":[77],"on":[78,108],"theoretical":[80],"concept":[81],"approach":[83,179],"framework":[87],"as":[88,90],"well":[89],"could":[95,113],"implemented":[97],"order":[102,138],"CDS,":[107],"how":[109],"technology":[112],"utilized":[115],"serving":[121],"developed":[126],"by":[127],"using":[128,189],"collaborative":[130],"environment":[131],"Java":[133],"Agent":[134],"DEvelopment":[135],"(JADE).":[136],"In":[137],"huge":[142],"amount":[143],"security,":[145],"our":[146],"offered":[149],"eleven":[150],"attributes":[152],"generated":[153],"four":[155],"main":[156],"policies":[158],"correctness,":[160],"integrity,":[161],"confidentially":[162],"availability":[164],"users\u2019":[166],"cloud.":[170],"also":[176],"describes":[177],"an":[178],"allows":[181,206],"us":[182],"build":[184],"tends":[195],"use":[197],"specialized":[198],"autonomous":[199],"specific":[202],"services":[204],"interact":[209],"CDS.":[214]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2024,"cited_by_count":2},{"year":2021,"cited_by_count":2},{"year":2020,"cited_by_count":1},{"year":2017,"cited_by_count":1},{"year":2016,"cited_by_count":3},{"year":2015,"cited_by_count":2},{"year":2014,"cited_by_count":3},{"year":2013,"cited_by_count":2},{"year":2012,"cited_by_count":8}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
