{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,11]],"date-time":"2024-09-11T05:59:12Z","timestamp":1726034352137},"publisher-location":"Cham","reference-count":30,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030243043"},{"type":"electronic","value":"9783030243050"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-24305-0_30","type":"book-chapter","created":{"date-parts":[[2019,6,28]],"date-time":"2019-06-28T12:02:51Z","timestamp":1561723371000},"page":"403-417","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Virtualization, Containerization, Composition, and Orchestration of Cloud Computing Services"],"prefix":"10.1007","author":[{"given":"Isaac","family":"Odun-Ayo","sequence":"first","affiliation":[]},{"given":"Victor","family":"Geteloma","sequence":"additional","affiliation":[]},{"given":"Ibukun","family":"Eweoya","sequence":"additional","affiliation":[]},{"given":"Ravin","family":"Ahuja","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,6,29]]},"reference":[{"key":"30_CR1","doi-asserted-by":"publisher","first-page":"4","DOI":"10.1002\/9780470940105","volume-title":"Cloud Computing; Principles and Paradigms","author":"J Buyya","year":"2011","unstructured":"Buyya, J., Goscinski, A.: Cloud Computing; Principles and Paradigms, pp. 4\u201311. Wiley, Hoboken (2011)"},{"issue":"11","key":"30_CR2","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1109\/MCOM.2013.6658648","volume":"51","author":"R Jain","year":"2013","unstructured":"Jain, R., Paul, S.: Network virtualization and software defined networking for cloud computing: a survey. IEEE Commun. Mag. 51(11), 24\u201331 (2013). https:\/\/doi.org\/10.1109\/MCOM.2013.6658648","journal-title":"IEEE Commun. Mag."},{"key":"30_CR3","doi-asserted-by":"crossref","unstructured":"Odun-Ayo, I., Misra, S., Abayomi-Alli, O., Ajayi, O.: Cloud multi-tenancy: issues and developments. In: Companion Proceedings of the 10th International Conference on Utility and Cloud Computing, pp. 209\u2013214 (2017)","DOI":"10.1145\/3147234.3148095"},{"key":"30_CR4","first-page":"96","volume":"295","author":"I Odun-Ayo","year":"2017","unstructured":"Odun-Ayo, I., Misra, S., Omoregbe, N., Onibere, E., Bulama, Y., Damasevi\u010dius, R.: Cloud-based security driven human resource management system. Front. Artif. Intell. Appl. 295, 96\u2013106 (2017)","journal-title":"Front. Artif. Intell. Appl."},{"key":"30_CR5","doi-asserted-by":"publisher","unstructured":"Odun-Ayo, I., Ananya, M., Agono, F., Goddy-Worlu, R.: Cloud computing architecture: a critical analysis. In: IEEE Proceedings of the 2018 18th International Conference on Computational Science and Its Applications (ICCSA 2018), pp. 1\u20137 (2018). https:\/\/doi.org\/10.1109\/iccsa.2018.8439638","DOI":"10.1109\/iccsa.2018.8439638"},{"key":"30_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"683","DOI":"10.1007\/978-3-319-95171-3_54","volume-title":"Computational Science and Its Applications \u2013 ICCSA 2018","author":"I Odun-Ayo","year":"2018","unstructured":"Odun-Ayo, I., Odede, B., Ahuja, R.: Cloud applications management \u2013 issues and developments. In: Gervasi, O., et al. (eds.) ICCSA 2018. LNCS, vol. 10963, pp. 683\u2013694. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-95171-3_54"},{"key":"30_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"231","DOI":"10.1007\/978-3-319-72395-2_22","volume-title":"Security, Privacy, and Anonymity in Computation, Communication, and Storage","author":"I Odun-Ayo","year":"2017","unstructured":"Odun-Ayo, I., Omoregbe, N., Odusami, M., Ajayi, O.: Cloud ownership and reliability \u2013 issues and developments. In: Wang, G., Atiquzzaman, M., Yan, Z., Choo, K.-K.R. (eds.) SpaCCS 2017. LNCS, vol. 10658, pp. 231\u2013240. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-72395-2_22"},{"key":"30_CR8","series-title":"Advances in Intelligent Systems and Computing","doi-asserted-by":"publisher","first-page":"954","DOI":"10.1007\/978-3-319-61566-0_90","volume-title":"Complex, Intelligent, and Software Intensive Systems","author":"W Liu","year":"2018","unstructured":"Liu, W., Fan, W., Li, P., Li, L.: Survey of big data platform based on cloud computing container technology. In: Barolli, L., Terzo, O. (eds.) CISIS 2017. AISC, vol. 611, pp. 954\u2013963. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-61566-0_90"},{"key":"30_CR9","unstructured":"Pahl, C.: Container and clusters for edge cloud architecture \u2013 a technology review. Irish centre for cloud computing and commerce, Dublin City University, Ireland (2014)"},{"key":"30_CR10","doi-asserted-by":"crossref","unstructured":"Li, Z., Kihl, M., Lu, Q., Andersson, J.A.: Performance overhead comparison between hypervisor and container-based virtualization. arXiv:11708.01388v1 (cs.dc) (2017)","DOI":"10.1109\/AINA.2017.79"},{"key":"30_CR11","unstructured":"Josyula, V., Oir, M., Page, G.: Cloud computing; Automating the virtualized data centers. CISCO System Inc., Indianapolis (2011)"},{"issue":"11","key":"30_CR12","doi-asserted-by":"publisher","first-page":"1978","DOI":"10.1587\/transcom.2016NNI0001","volume":"E100B","author":"M Veeraraghavan","year":"2017","unstructured":"Veeraraghavan, M., Sato, T., Buchanan, M., Rahimi, R., Okamoto, S., Yamanaka, N.: Network function virtualization: a survey. IEICE Trans. Commun. E100B(11), 1978\u20131991 (2017). https:\/\/doi.org\/10.1587\/transcom.2016NNI0001","journal-title":"IEICE Trans. Commun."},{"key":"30_CR13","series-title":"Lecture Notes in Electrical Engineering","doi-asserted-by":"publisher","first-page":"461","DOI":"10.1007\/978-81-322-1524-0_54","volume-title":"Proceedings of International Conference on VLSI, Communication, Advanced Devices, Signals & Systems and Networking (VCASAN-2013)","author":"N Manohar","year":"2013","unstructured":"Manohar, N.: A survey of virtualization techniques in cloud computing. In: Chakravarthi, V., Shirur, Y., Prasad, R. (eds.) Proceedings of International Conference on VLSI, Communication, Advanced Devices, Signals & Systems and Networking (VCASAN-2013). LNEE, vol. 258, pp. 461\u2013470. Springer, India (2013). https:\/\/doi.org\/10.1007\/978-81-322-1524-0_54"},{"issue":"5","key":"30_CR14","doi-asserted-by":"publisher","first-page":"81","DOI":"10.1109\/MCC.2016.112","volume":"3","author":"M Fazio","year":"2016","unstructured":"Fazio, M., Clesti, A., Ranjan, R., Chen, L., Liu, C., Villari, M.: Open issues in scheduling microservices in the cloud. IEEE Cloud Comput. 3(5), 81\u201388 (2016). https:\/\/doi.org\/10.1109\/MCC.2016.112","journal-title":"IEEE Cloud Comput."},{"key":"30_CR15","doi-asserted-by":"publisher","unstructured":"Brakensick, J., Droge, A., Botteck, M., Hartig, H., Lackorznski, A.: Virtualization as an enabler for security in mobile devices. In: 1st Workshop on Isolation and Integration in Embedded Systems, Glasgow, Scotland, pp. 17\u201322 (2008) https:\/\/doi.org\/10.1145\/1435458.1435462","DOI":"10.1145\/1435458.1435462"},{"issue":"2","key":"30_CR16","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3054177","volume":"50","author":"Denis Weerasiri","year":"2017","unstructured":"Weerasiri, D., Barukh, M.C., Benatallah, B., Sheng, Q.Z., Ranjan, R.: A taxonomy and survey of cloud resource orchestration techniques. ACM Comput. Surv. 50(2) (2017). https:\/\/doi.org\/10.1145\/3054177","journal-title":"ACM Computing Surveys"},{"issue":"2","key":"30_CR17","doi-asserted-by":"publisher","first-page":"151","DOI":"10.3923\/ajsr.2019.151.166","volume":"12","author":"I Odun-Ayo","year":"2019","unstructured":"Odun-Ayo, I., Ajayi, O., Goddy-Worlu, R., Yahaya, J.: A systematic mapping study of cloud resources management and scalability in brokering, scheduling, capacity planning and elasticity. Asian J. Sci. Res. 12(2), 151\u2013166 (2019). https:\/\/doi.org\/10.3923\/ajsr.2019.151.166","journal-title":"Asian J. Sci. Res."},{"key":"30_CR18","doi-asserted-by":"crossref","unstructured":"Petersen, K., Feldt, R., Mujtaba, S., Mattsson, M.: Systematic mapping studies in software engineering. In: Proceedings of the 12th International Conference on Evaluation and Assessment in Software Engineering, EASE 2008, Italy, pp. 68\u201377 (2008)","DOI":"10.14236\/ewic\/EASE2008.8"},{"key":"30_CR19","doi-asserted-by":"crossref","unstructured":"Barros-Justo, J.L., Cravero-Leal, A.L., Benitti, F.B., Capilla-Sevilla, R.: Systematic mapping protocol: the impact of using software patterns during requirements engineering activities in real-world settings. Cornell University Library, arXiv:1701.05747v1 [cs.SE] (2017)","DOI":"10.1016\/j.csi.2017.12.001"},{"issue":"C","key":"30_CR20","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1016\/j.infsof.2015.11.001","volume":"21","author":"T Kosar","year":"2016","unstructured":"Kosar, T., Bohra, S., Mernik, M.A.: Protocol of a systematic mapping study for domain-specific languages. J. Inf. Softw. Technol. 21(C), 77\u201391 (2016)","journal-title":"J. Inf. Softw. Technol."},{"issue":"2","key":"30_CR21","doi-asserted-by":"publisher","first-page":"257","DOI":"10.15388\/infedu.2017.13","volume":"16","author":"V Santos","year":"2017","unstructured":"Santos, V., Souza, E.F., Felizardo, K.R., Vijaykumar, N.L.: Analyzing the use of concept maps in computer science: a systematic mapping study. Inform. Educ. 16(2), 257\u2013288 (2017). https:\/\/doi.org\/10.15388\/infedu.2017.13","journal-title":"Inform. Educ."},{"key":"30_CR22","doi-asserted-by":"publisher","first-page":"201","DOI":"10.1016\/j.infsof.2017.09.014","volume":"95","author":"M Souza","year":"2018","unstructured":"Souza, M., Veado, L., Moreira, R.T., Figueiredo, E., Costa, H.: A systematic mapping study on game-related methods for software engineering education. Inf. Softw. Technol. 95, 201\u2013218 (2018)","journal-title":"Inf. Softw. Technol."},{"key":"30_CR23","doi-asserted-by":"publisher","unstructured":"Fernandez-Blanco, C.R., Careri, F., Kavvadias, K., Hidalgo Gonzalez, I., Zucker, A., Peteves, E.: Systematic mapping of power system models: expert survey, EUR 28875 EN. Publications Office of the European Union, Luxembourg (2017). ISBN 978-92-79-76462-2. https:\/\/doi.org\/10.2760\/422399 , JRC10912","DOI":"10.2760\/422399"},{"key":"30_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"464","DOI":"10.1007\/978-3-319-51963-0_36","volume-title":"SOFSEM 2017: Theory and Practice of Computer Science","author":"M Mernik","year":"2017","unstructured":"Mernik, M.: Domain-specific languages: a systematic mapping study. In: Steffen, B., Baier, C., van den Brand, M., Eder, J., Hinchey, M., Margaria, T. (eds.) SOFSEM 2017. LNCS, vol. 10139, pp. 464\u2013472. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-51963-0_36"},{"key":"30_CR25","unstructured":"Griffo, C., Almeida, J.P.A., Guizzardi, G.: A systematic mapping of the literature on legal core ontologies. In: Brazilian Conference on Ontologies, ONTOBRAS 15, CEUR Workshop Proceedings, p. 1442 (2015)"},{"key":"30_CR26","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.infsof.2015.03.007","volume":"64","author":"K Petersen","year":"2015","unstructured":"Petersen, K., Vakkalanka, S., Kuzniarz, L.: Guidelines for conducting systematic mapping studies in software engineering: an update. Inf. Softw. Technol. 64, 1\u201318 (2015)","journal-title":"Inf. Softw. Technol."},{"key":"30_CR27","doi-asserted-by":"crossref","unstructured":"Ahmad, A., Brereton, P., Andras, P.: A systematic mapping study of empirical studies on software Cloud testing methods. In: IEEE International Conference on Software Quality, Reliability and Security Companion, pp. 555\u2013562 (2017)","DOI":"10.1109\/QRS-C.2017.94"},{"key":"30_CR28","unstructured":"Kitchenham, B., Charters, S.: Guidelines for performing systematic literature Reviews in Software Engineering, vol. 2(2) (2007)"},{"key":"30_CR29","unstructured":"Muhammad, A.C., Muhammad, A.B.: A systematic mapping study of software architectures for cloud based system. Software System Section, IT University of Copenhagen (2014)"},{"issue":"1","key":"30_CR30","doi-asserted-by":"publisher","first-page":"102","DOI":"10.1007\/s00766-005-0021-6","volume":"11","author":"R Wieringa","year":"2006","unstructured":"Wieringa, R., Maiden, N.A.M., Mead, N.R., Rolland, C.: Requirement engineering paper classification and evaluation criteria: a proposal and a discussion. Requirement Eng. 11(1), 102\u2013107 (2006)","journal-title":"Requirement Eng."}],"container-title":["Lecture Notes in Computer Science","Computational Science and Its Applications \u2013 ICCSA 2019"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-24305-0_30","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,12,1]],"date-time":"2019-12-01T10:53:29Z","timestamp":1575197609000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-24305-0_30"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030243043","9783030243050"],"references-count":30,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-24305-0_30","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"29 June 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICCSA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Computational Science and Its Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Saint Petersburg","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Russia","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"1 July 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4 July 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"iccsa2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.iccsa.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}