<?xml version="1.0" encoding="UTF-8" standalone="yes"?>
<OAI-PMH xmlns="http://www.openarchives.org/OAI/2.0/" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:dim="http://www.dspace.org/xmlns/dspace/dim" xsi:schemaLocation="http://www.openarchives.org/OAI/2.0/ http://www.openarchives.org/OAI/2.0/OAI-PMH.xsd">
    <responseDate>2026-05-22T16:38:40.029Z</responseDate>
    <request verb="GetRecord" identifier="ezaposleni.singidunum.ac.rs/rest/sciNaucniRezultati/oai:1:1971" metadataPrefix="dim">http://ezaposleni.singidunum.ac.rs/rest/sciNaucniRezultati/oai</request>
    <GetRecord>
        <record>
            <header>
                <identifier>ezaposleni.singidunum.ac.rs/rest/sciNaucniRezultati/oai:1:1971</identifier>
                <datestamp>2014-03-04T19:46:04Z</datestamp>
                <setSpec>1</setSpec>
            </header>
            <metadata>
                <dim:dim>
                    <dim:field mdschema="dc" element="title" lang="en">Paradigma zaštite distribuiranog računarstva</dim:field>
                    <dim:field mdschema="dc" element="date" qualifier="issued">2010</dim:field>
                    <dim:field mdschema="dc" element="identifier" qualifier="uri">http://ezaposleni.singidunum.ac.rs/rest/sciNaucniRezultati/oai/record/1/1971</dim:field>
                    <dim:field mdschema="dc" element="identifier" qualifier="uri">http://www.singipedia.com/content/315-Paradigma-za%EF%BF%BDtite-distribuiranog-racunarstva</dim:field>
                    <dim:field mdschema="dc" element="contributor" qualifier="author" authority="etfid:182" confidence="-1">G. Grubor</dim:field>
                    <dim:field mdschema="dc" element="contributor" qualifier="author" authority="orcid::0000-0001-8682-7014" confidence="-1">A. NJeguš</dim:field>
                    <dim:field mdschema="dc" element="contributor" qualifier="author" authority="id:6062" confidence="-1">N. Ristić</dim:field>
                    <dim:field mdschema="dc" element="description" qualifier="abstract">New sofisticated treats to web 2.0 i web 3.0 applications need a new security 
information paradigm. Some new type of worms (Yamanner, Samy and Spaceflash) have already exploited AJAX client frame voulnarability and providied new types of atacks and compromised certain confidential information. Computing development trend includes server and client virtuelization, more data trafic, use of social networks in organizations, unified 
communications, chip or free mobile and wireless applications and cloud computing. Curent comuting development trend requests a new security information paradigm. Traditional security controls do not suficient and often inadequate. The two new cloud computing security models are presented in this piece of paper.</dim:field>
                    <dim:field mdschema="dc" element="type">conferenceObject</dim:field>
                    <dim:field mdschema="dc" element="source">Научни скуп са међународним учешћем Синергија</dim:field>
                </dim:dim>
            </metadata>
        </record>
    </GetRecord>
</OAI-PMH>
