{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,17]],"date-time":"2026-02-17T14:37:35Z","timestamp":1771339055118,"version":"3.50.1"},"publisher-location":"Cham","reference-count":26,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783031375859","type":"print"},{"value":"9783031375866","type":"electronic"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-3-031-37586-6_22","type":"book-chapter","created":{"date-parts":[[2023,7,11]],"date-time":"2023-07-11T23:02:16Z","timestamp":1689116536000},"page":"369-385","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["AMOE: A Tool to\u00a0Automatically Extract and\u00a0Assess Organizational Evidence for\u00a0Continuous Cloud Audit"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0009-0006-6285-9373","authenticated-orcid":false,"given":"Franz","family":"Deimling","sequence":"first","affiliation":[]},{"given":"Michela","family":"Fazzolari","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,7,12]]},"reference":[{"key":"22_CR1","doi-asserted-by":"publisher","unstructured":"Anisetti, M., Ardagna, C., Gaudenzi, F., Damiani, E.: A certification framework for cloud-based services. In: Proceedings of the 31st Annual ACM Symposium on Applied Computing, pp. 440\u2013447. Association for Computing Machinery, New York, NY, USA (04 2016). https:\/\/doi.org\/10.1145\/2851613.2851628","DOI":"10.1145\/2851613.2851628"},{"key":"22_CR2","doi-asserted-by":"publisher","unstructured":"Anisetti, M., Ardagna, C.A., Damiani, E., Gaudenzi, F., Veca, R.: Toward security and performance certification of open stack. In: 2015 IEEE 8th International Conference on Cloud Computing, pp. 564\u2013571 (2015). https:\/\/doi.org\/10.1109\/CLOUD.2015.81","DOI":"10.1109\/CLOUD.2015.81"},{"issue":"3","key":"22_CR3","doi-asserted-by":"publisher","first-page":"262","DOI":"10.7763\/LNSE.2014.V2.134","volume":"2","author":"V Balakrishnan","year":"2014","unstructured":"Balakrishnan, V., Lloyd-Yemoh, E.: Stemming and lemmatization: a comparison of retrieval performances. Lect. Notes Softw. Eng. 2(3), 262\u2013267 (2014)","journal-title":"Lect. Notes Softw. Eng."},{"key":"22_CR4","doi-asserted-by":"publisher","unstructured":"Banse, C., Kunz, I., Schneider, A., Weiss, K.: Cloud property graph: connecting cloud security assessments with static code analysis. In: Ardagna, C.A., et al. (eds.) 14th IEEE International Conference on Cloud Computing, CLOUD 2021, Chicago, IL, USA, 5\u201310 September 2021, pp. 13\u201319. IEEE (2021). https:\/\/doi.org\/10.1109\/CLOUD53861.2021.00014","DOI":"10.1109\/CLOUD53861.2021.00014"},{"key":"22_CR5","doi-asserted-by":"crossref","unstructured":"\u00c7abuk, A., Ayta\u00e7, A.: The transformation of auditing from traditional to continuous auditing in the era of big data. In: Organizational Auditing and Assurance in the Digital Age, pp. 137\u2013152. IGI Global (2019)","DOI":"10.4018\/978-1-5225-7356-2.ch007"},{"key":"22_CR6","doi-asserted-by":"publisher","unstructured":"Cimato, S., Damiani, E., Zavatarelli, F., Menicocci, R.: Towards the certification of cloud services. In: 2013 IEEE Ninth World Congress on Services, pp. 92\u201397 (2013). https:\/\/doi.org\/10.1109\/SERVICES.2013.16","DOI":"10.1109\/SERVICES.2013.16"},{"key":"22_CR7","unstructured":"Devlin, J., Chang, M., Lee, K., Toutanova, K.: BERT: pre-training of deep bidirectional transformers for language understanding. CoRR abs\/1810.04805 (2018). https:\/\/arxiv.org\/abs\/1810.04805"},{"key":"22_CR8","doi-asserted-by":"crossref","unstructured":"Esteva, A., et al.: Co-search: COVID-19 information retrieval with semantic search, question answering, and abstractive summarization. CoRR abs\/2006.09595 (2020). https:\/\/arxiv.org\/abs\/2006.09595","DOI":"10.1038\/s41746-021-00437-0"},{"key":"22_CR9","unstructured":"Grave, E., Bojanowski, P., Gupta, P., Joulin, A., Mikolov, T.: Learning word vectors for 157 languages. CoRR abs\/1802.06893 (2018). https:\/\/arxiv.org\/abs\/1802.06893"},{"key":"22_CR10","unstructured":"Joulin, A., Grave, E., Bojanowski, P., Douze, M., J\u00e9gou, H., Mikolov, T.: Fasttext.zip: compressing text classification models. CoRR abs\/1612.03651 (2016). https:\/\/arxiv.org\/abs\/1612.03651"},{"key":"22_CR11","unstructured":"Klie, J.C., Bugert, M., Boullosa, B., de Castilho, R.E., Gurevych, I.: The inception platform: machine-assisted and knowledge-oriented interactive annotation. In: Proceedings of the 27th International Conference on Computational Linguistics: System Demonstrations, pp. 5\u20139. Association for Computational Linguistics, June 2018. https:\/\/tubiblio.ulb.tu-darmstadt.de\/106270\/, event Title: The 27th International Conference on Computational Linguistics (COLING 2018)"},{"key":"22_CR12","doi-asserted-by":"publisher","unstructured":"Knoblauch, D., Banse, C.: Reducing implementation efforts in continuous auditing certification via an audit API. In: 2019 IEEE 28th International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE), pp. 88\u201392 (2019). https:\/\/doi.org\/10.1109\/WETICE.2019.00025","DOI":"10.1109\/WETICE.2019.00025"},{"key":"22_CR13","doi-asserted-by":"publisher","unstructured":"Kunz, I., Stephanow, P.: A process model to support continuous certification of cloud services. In: 2017 IEEE 31st International Conference on Advanced Information Networking and Applications (AINA), pp. 986\u2013993 (2017). https:\/\/doi.org\/10.1109\/AINA.2017.106","DOI":"10.1109\/AINA.2017.106"},{"key":"22_CR14","doi-asserted-by":"crossref","unstructured":"Lee, J., Yun, S., Kim, H., Ko, M., Kang, J.: Ranking paragraphs for improving answer recall in open-domain question answering. CoRR abs\/1810.00494 (2018). https:\/\/arxiv.org\/abs\/1810.00494","DOI":"10.18653\/v1\/D18-1053"},{"key":"22_CR15","doi-asserted-by":"publisher","unstructured":"Lins, S., Schneider, S., Sunyaev, A.: Trust is good, control is better: creating secure clouds by continuous auditing. IEEE Trans. Cloud Comput. 6(3), 890\u2013903 (2016). https:\/\/doi.org\/10.1109\/TCC.2016.2522411","DOI":"10.1109\/TCC.2016.2522411"},{"key":"22_CR16","doi-asserted-by":"publisher","unstructured":"Lins, S., Thiebes, S., Schneider, S., Sunyaev, A.: What is really going on at your cloud service provider? Creating trustworthy certifications by continuous auditing. In: 2015 48th Hawaii International Conference on System Sciences, pp. 5352\u20135361 (2015). https:\/\/doi.org\/10.1109\/HICSS.2015.629","DOI":"10.1109\/HICSS.2015.629"},{"key":"22_CR17","unstructured":"Liu, Y., et al.: Roberta: a robustly optimized BERT pretraining approach. CoRR abs\/1907.11692 (2019). https:\/\/arxiv.org\/abs\/1907.11692"},{"key":"22_CR18","unstructured":"Orue-Echevarria, L., Garcia, J.L., Banse, C., Alonso, J., et al.: Medina: improving cloud services trustworthiness through continuous audit-based certification. In: CEUR Workshop Proceedings. CEUR-WS (2021)"},{"key":"22_CR19","doi-asserted-by":"crossref","unstructured":"Rajpurkar, P., Zhang, J., Lopyrev, K., Liang, P.: Squad: 100, 000+ questions for machine comprehension of text. CoRR abs\/1606.05250 (2016), https:\/\/arxiv.org\/abs\/1606.05250","DOI":"10.18653\/v1\/D16-1264"},{"key":"22_CR20","doi-asserted-by":"crossref","unstructured":"Sch\u00fctze, H., Manning, C.D., Raghavan, P.: Introduction to Information Retrieval, vol. 39. Cambridge University Press, Cambridge (2008)","DOI":"10.1017\/CBO9780511809071"},{"key":"22_CR21","doi-asserted-by":"publisher","unstructured":"Stephanow, P., Fallenbeck, N.: Towards continuous certification of infrastructure-as-a-service using low-level metrics. In: 2015 IEEE 12th International Conference on Ubiquitous Intelligence and Computing and 2015 IEEE 12th International Conference on Autonomic and Trusted Computing and 2015 IEEE 15th International Conference on Scalable Computing and Communications and Its Associated Workshops (UIC-ATC-ScalCom), pp. 1485\u20131492 (2015). https:\/\/doi.org\/10.1109\/UIC-ATC-ScalCom-CBDCom-IoP.2015.268","DOI":"10.1109\/UIC-ATC-ScalCom-CBDCom-IoP.2015.268"},{"key":"22_CR22","doi-asserted-by":"publisher","unstructured":"Stephanow, P., Khajehmoogahi, K.: Towards continuous security certification of software-as-a-service applications using web application testing techniques. In: 2017 IEEE 31st International Conference on Advanced Information Networking and Applications (AINA), pp. 931\u2013938 (2017). https:\/\/doi.org\/10.1109\/AINA.2017.107","DOI":"10.1109\/AINA.2017.107"},{"key":"22_CR23","doi-asserted-by":"publisher","unstructured":"Torkura, K., Sukmana, M.I., Cheng, F., Meinel, C.: Continuous auditing and threat detection in multi-cloud infrastructure. Comput. Secur. 102, 102124 (2021). https:\/\/doi.org\/10.1016\/j.cose.2020.102124, https:\/\/www.sciencedirect.com\/science\/article\/pii\/S0167404820303977","DOI":"10.1016\/j.cose.2020.102124"},{"key":"22_CR24","doi-asserted-by":"crossref","unstructured":"Webster, J.J., Kit, C.: Tokenization as the initial phase in NLP. In: COLING 1992: The 14th International Conference on Computational Linguistics, vol. 4 (1992)","DOI":"10.3115\/992424.992434"},{"issue":"1","key":"22_CR25","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1177\/016555159201800106","volume":"18","author":"WJ Wilbur","year":"1992","unstructured":"Wilbur, W.J., Sirotkin, K.: The automatic identification of stop words. J. Inf. Sci. 18(1), 45\u201355 (1992)","journal-title":"J. Inf. Sci."},{"key":"22_CR26","doi-asserted-by":"publisher","unstructured":"Windhorst, I., Sunyaev, A.: Dynamic certification of cloud services. In: 2013 International Conference on Availability, Reliability and Security, pp. 412\u2013417 (2013). https:\/\/doi.org\/10.1109\/ARES.2013.55","DOI":"10.1109\/ARES.2013.55"}],"container-title":["Lecture Notes in Computer Science","Data and Applications Security and Privacy XXXVII"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-37586-6_22","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,7,11]],"date-time":"2023-07-11T23:05:25Z","timestamp":1689116725000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-37586-6_22"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9783031375859","9783031375866"],"references-count":26,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-37586-6_22","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"12 July 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"DBSec","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"IFIP Annual Conference on Data and Applications Security and Privacy","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Sophia-Antipolis","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"France","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19 July 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21 July 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"37","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"dbsec2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.dbsec2023.unimol.it\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Easychair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"56","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"19","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"5","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"34% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}