{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,31]],"date-time":"2025-03-31T21:04:10Z","timestamp":1743455050532,"version":"3.28.0"},"reference-count":19,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,12]]},"DOI":"10.1109\/apsec.2015.52","type":"proceedings-article","created":{"date-parts":[[2016,5,12]],"date-time":"2016-05-12T20:20:28Z","timestamp":1463084428000},"page":"377-384","source":"Crossref","is-referenced-by-count":2,"title":["Application Layer Encryption for Cloud"],"prefix":"10.1109","author":[{"given":"Amitabh","family":"Saxena","sequence":"first","affiliation":[]},{"given":"Vikrant","family":"Kaulgud","sequence":"additional","affiliation":[]},{"given":"Vibhu","family":"Sharma","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-05445-7_19"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/191177.191183"},{"article-title":"Uefi secure boot in modern computer security solutions","year":"2013","author":"wilkins","key":"ref12"},{"key":"ref13","first-page":"111","article-title":"A formal analysis of authentication in the TPM","volume":"6561","author":"delaune","year":"2010","journal-title":"Revised Selected Papers of the 7th International Workshop on Formal Aspects in Security and Trust (FAST'10)"},{"key":"ref14","first-page":"8:1","article-title":"Analysis and design of a hardware\/software trusted platform module for embedded systems","volume":"8","author":"aaraj","year":"2009","journal-title":"ACM Trans Embed Comput Syst"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-33338-5_1"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/11605805_1"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/RELDIS.2003.1238076"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-01001-9_13"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-22792-9_33"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/1007568.1007632"},{"key":"ref3","doi-asserted-by":"crossref","first-page":"307","DOI":"10.1007\/978-1-4419-5906-5_677","article-title":"Database encryption","author":"bouganim","year":"2011","journal-title":"Encyclopedia of Cryptography and Security"},{"journal-title":"Cipher","article-title":"Ciphercloud for salesforce","year":"2013","key":"ref6"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2014.03.011"},{"journal-title":"Oracle","article-title":"Transparent Data Encryption (TDE) frequently asked questions","year":"2015","key":"ref8"},{"journal-title":"Crypteron","article-title":"Cipherdb developer's guide","year":"2014","key":"ref7"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.5120\/7242-0218"},{"journal-title":"10 worst data breaches of all time","year":"2015","author":"palermo","key":"ref1"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2009.01.001"}],"event":{"name":"2015 Asia-Pacific Software Engineering Conference (APSEC)","start":{"date-parts":[[2015,12,1]]},"location":"New Delhi","end":{"date-parts":[[2015,12,4]]}},"container-title":["2015 Asia-Pacific Software Engineering Conference (APSEC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7467057\/7467261\/07467324.pdf?arnumber=7467324","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,9,19]],"date-time":"2020-09-19T19:33:50Z","timestamp":1600544030000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7467324\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,12]]},"references-count":19,"URL":"https:\/\/doi.org\/10.1109\/apsec.2015.52","relation":{},"subject":[],"published":{"date-parts":[[2015,12]]}}}