{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,30]],"date-time":"2025-04-30T04:19:24Z","timestamp":1745986764527,"version":"3.40.4"},"publisher-location":"Cham","reference-count":36,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783031877742","type":"print"},{"value":"9783031877759","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-3-031-87775-9_10","type":"book-chapter","created":{"date-parts":[[2025,4,29]],"date-time":"2025-04-29T16:24:57Z","timestamp":1745943897000},"page":"112-125","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["A Weighted Framework for\u00a0Security Patterns Selection Used for\u00a0Hosting on the Cloud"],"prefix":"10.1007","author":[{"given":"Asma","family":"Salem","sequence":"first","affiliation":[]},{"given":"Amjad","family":"Hudaib","sequence":"additional","affiliation":[]},{"given":"Nadia","family":"Salem","sequence":"additional","affiliation":[]},{"given":"Khawla M.","family":"Al-tarawneh","sequence":"additional","affiliation":[]},{"given":"Hamza","family":"Salem","sequence":"additional","affiliation":[]},{"given":"Manuel","family":"Mazzara","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,4,30]]},"reference":[{"issue":"1","key":"10_CR1","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.jnca.2010.07.006","volume":"34","author":"S Subashini","year":"2011","unstructured":"Subashini, S., Kavitha, V.: A survey on security issues in service delivery models of cloud computing. J. Netw. Comput. Appl. 34(1), 1\u201311 (2011)","journal-title":"J. Netw. Comput. Appl."},{"key":"10_CR2","doi-asserted-by":"publisher","first-page":"357","DOI":"10.1016\/j.ins.2015.01.025","volume":"305","author":"M Ali","year":"2015","unstructured":"Ali, M., Khan, S.U., Vasilakos, A.V.: Security in cloud computing: opportunities and challenges. Inf. Sci. 305, 357\u2013383 (2015)","journal-title":"Inf. Sci."},{"key":"10_CR3","doi-asserted-by":"crossref","unstructured":"Mell, P., Grance, T.: The NIST definition of cloud computing (2011)","DOI":"10.6028\/NIST.SP.800-145"},{"key":"10_CR4","doi-asserted-by":"crossref","unstructured":"Jansen, W., Grance, T.: Guidelines on security and privacy in public cloud computing. NIST Special Publication 800 (2011)","DOI":"10.6028\/NIST.SP.800-144"},{"issue":"3","key":"10_CR5","doi-asserted-by":"publisher","first-page":"583","DOI":"10.1016\/j.future.2010.12.006","volume":"28","author":"D Zissis","year":"2012","unstructured":"Zissis, D., Lekkas, D.: Addressing cloud computing security issues. Futur. Gener. Comput. Syst. 28(3), 583\u2013592 (2012)","journal-title":"Futur. Gener. Comput. Syst."},{"key":"10_CR6","doi-asserted-by":"publisher","first-page":"335","DOI":"10.1007\/978-1-4419-6524-0_14","volume-title":"Handbook of Cloud Computing","author":"H Jin","year":"2010","unstructured":"Jin, H., Ibrahim, S., Bell, T., Gao, W., Huang, D., Wu, S.: Cloud types and services. In: Furht, B., Escalante, A. (eds.) Handbook of Cloud Computing, pp. 335\u2013355. Springer, Boston (2010). https:\/\/doi.org\/10.1007\/978-1-4419-6524-0_14"},{"key":"10_CR7","doi-asserted-by":"crossref","unstructured":"Banerjee, A., Sharma, M., Banerjee, C., Pandey, S.K.: Research on security requirements engineering: problems and prospects. MATRIX Acad. Int. Online J. Eng. Technol. 3(1), 32\u201335 (2015)","DOI":"10.1145\/1838687.1838701"},{"issue":"1","key":"10_CR8","doi-asserted-by":"publisher","first-page":"7","DOI":"10.1007\/s13174-010-0007-6","volume":"1","author":"Q Zhang","year":"2010","unstructured":"Zhang, Q., Cheng, L., Boutaba, R.: Cloud computing: state-of-the-art and research challenges. J. Internet Serv. Appl. 1(1), 7\u201318 (2010)","journal-title":"J. Internet Serv. Appl."},{"issue":"6","key":"10_CR9","doi-asserted-by":"publisher","first-page":"599","DOI":"10.1016\/j.future.2008.12.001","volume":"25","author":"R Buyya","year":"2009","unstructured":"Buyya, R., Yeo, C.S., Venugopal, S., Broberg, J., Brandic, I.: Cloud computing and emerging IT platforms: vision, hype, and reality for delivering computing as the 5th utility. Futur. Gener. Comput. Syst. 25(6), 599\u2013616 (2009)","journal-title":"Futur. Gener. Comput. Syst."},{"key":"10_CR10","doi-asserted-by":"crossref","unstructured":"Berger, S., et al.: TVDc: managing security in the trusted virtual datacenter. ACM SIGOPS Oper. Syst. Rev. 42(1), 40\u201347 (2008)","DOI":"10.1145\/1341312.1341321"},{"issue":"1","key":"10_CR11","doi-asserted-by":"publisher","first-page":"176","DOI":"10.1016\/j.dss.2010.12.006","volume":"51","author":"S Marston","year":"2011","unstructured":"Marston, S., Li, Z., Bandyopadhyay, S., Zhang, J., Ghalsasi, A.: Cloud computing-the business perspective. Decis. Support Syst. 51(1), 176\u2013189 (2011)","journal-title":"Decis. Support Syst."},{"key":"10_CR12","doi-asserted-by":"crossref","unstructured":"Buyya, R., Yeo, C. S., Venugopal, S.: Market-oriented cloud computing: Vision, hype, and reality for delivering IT services as computing utilities. In: 2008 10th IEEE International Conference on High Performance Computing and Communications, HPCC 2008, pp. 5\u201313. IEEE (2008)","DOI":"10.1109\/HPCC.2008.172"},{"issue":"9","key":"10_CR13","doi-asserted-by":"publisher","first-page":"2093","DOI":"10.1016\/j.comnet.2013.04.001","volume":"57","author":"G Aceto","year":"2013","unstructured":"Aceto, G., Botta, A., De Donato, W., Pescap\u00e8, A.: Cloud monitoring: a survey. Comput. Netw. 57(9), 2093\u20132115 (2013)","journal-title":"Comput. Netw."},{"key":"10_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1007\/978-3-642-13119-6_2","volume-title":"Algorithms and Architectures for Parallel Processing","author":"R Buyya","year":"2010","unstructured":"Buyya, R., Ranjan, R., Calheiros, R.N.: InterCloud: utility-oriented federation of cloud computing environments for scaling of application services. In: Hsu, C.-H., Yang, L.T., Park, J.H., Yeo, S.-S. (eds.) ICA3PP 2010. LNCS, vol. 6081, pp. 13\u201331. Springer, Heidelberg (2010). https:\/\/doi.org\/10.1007\/978-3-642-13119-6_2"},{"issue":"5","key":"10_CR15","first-page":"247","volume":"3","author":"K So","year":"2011","unstructured":"So, K.: Cloud computing security issues and challenges. Int. J. Comput. Netw. 3(5), 247\u201355 (2011)","journal-title":"Int. J. Comput. Netw."},{"key":"10_CR16","unstructured":"Molnar, D., Schechter, S.E.: Self Hosting vs. cloud hosting: accounting for the security impact of hosting in the cloud. In: WEIS (2010)"},{"issue":"1","key":"10_CR17","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.jnca.2010.07.006","volume":"34","author":"S Subashini","year":"2011","unstructured":"Subashini, S., Kavitha, V.: A survey on security issues in service delivery models of cloud computing. J. Netw. Comput. Appl. 34(1), 1\u201311 (2011)","journal-title":"J. Netw. Comput. Appl."},{"key":"10_CR18","doi-asserted-by":"crossref","unstructured":"Sengupta, S., Kaulgud, V., Sharma, V.S.: Cloud computing security\u2013trends and research directions. In: 2011 IEEE World Congress on Services (SERVICES), pp. 524\u2013531. IEEE (2011)","DOI":"10.1109\/SERVICES.2011.20"},{"issue":"1","key":"10_CR19","doi-asserted-by":"publisher","first-page":"68","DOI":"10.1145\/1496091.1496103","volume":"39","author":"A Greenberg","year":"2008","unstructured":"Greenberg, A., Hamilton, J., Maltz, D.A., Patel, P.: The cost of a cloud: research problems in data center networks. ACM SIGCOMM Comput. Commun. Rev. 39(1), 68\u201373 (2008)","journal-title":"ACM SIGCOMM Comput. Commun. Rev."},{"key":"10_CR20","doi-asserted-by":"crossref","unstructured":"Strauch, S., Kopp, O., Leymann, F., Unger, T.: A taxonomy for cloud data hosting solutions. In: 2011 IEEE Ninth International Conference on Dependable, Autonomic and Secure Computing (DASC), pp. 577\u2013584. IEEE (2011)","DOI":"10.1109\/DASC.2011.106"},{"key":"10_CR21","unstructured":"Nazir, M., Bhardwaj, N., Chawda, R.K., Mishra, R.G.: Cloud computing: current research challenges. Book chapter of Cloud Computing: Reviews, Surveys, Tools, Techniques and Applications-An Open-Access eBook Published by HCTL Open (2015)"},{"key":"10_CR22","unstructured":"Reznor, T.: A Guide to Web Hosting Security Issues and Prevention (2018). http:\/\/www.instantshift.com\/2011\/02\/11\/a-guide-to-web-hosting-security-issues-and-prevention\/"},{"key":"10_CR23","unstructured":"India\u2019s Leading Domain Registration Web Hosting Company (2018). Features \/ Security. https:\/\/www.bigrock.in\/web-hosting\/hosting-security.php"},{"key":"10_CR24","unstructured":"National Information Technology Center (2018). http:\/\/nitc.gov.jo\/WebHosting_ServiceView.aspx"},{"key":"10_CR25","unstructured":"Schouten, E.: Design patterns for the cloud (2018). https:\/\/www.ibm.com\/blogs\/cloud-computing\/2012\/11\/26\/design-patterns-for-the-cloud\/"},{"key":"10_CR26","doi-asserted-by":"crossref","unstructured":"Fehling, C.: Cloud Computing Patterns: Identification, Design, and Application (2015)","DOI":"10.1007\/978-3-7091-1568-8"},{"key":"10_CR27","unstructured":"M\u00fcller, S.: Security trade-offs in cloud storage systems (2017)"},{"key":"10_CR28","unstructured":"VMware: Virtual Appliances: A New Paradigm for Software Delivery (2018). https:\/\/www.vmware.com\/content\/dam\/digitalmarketing\/vmware\/en\/pdf\/products\/vam\/vmware-virtual-appliance-solutions-white-paper.pdf"},{"key":"10_CR29","doi-asserted-by":"crossref","unstructured":"Ibrahim, A.S., Hamlyn-Harris, J., Grundy, J., Almorsy, M.: CloudSec: a security monitoring appliance for virtual machines in the IaaS cloud model. In: 2011 5th International Conference on Network and System Security (NSS), pp. 113\u2013120. IEEE (2011)","DOI":"10.1109\/ICNSS.2011.6059967"},{"key":"10_CR30","unstructured":"VMware: VMware Virtual Appliance Solutions (2018). https:\/\/www.vmware.com\/content\/dam\/digitalmarketing\/vmware\/en\/pdf\/products\/vam\/vmware-virtual-appliance-solutions-datasheet.pdf"},{"key":"10_CR31","doi-asserted-by":"publisher","unstructured":"Furht, B.: Cloud computing fundamentals. In: Handbook of Cloud Computing, pp. 3\u201319. Springer, Boston (2010). https:\/\/doi.org\/10.1007\/978-3-031-32044-6_2","DOI":"10.1007\/978-3-031-32044-6_2"},{"key":"10_CR32","unstructured":"VMware: VMware\u00aeAlwaysOn Desktop$$^{{\\rm TM}}$$ Validated Design Guide (2018). http:\/\/citeseerx.ist.psu.edu\/viewdoc\/download?doi=10.1.1.269.2530&rep=rep1 &type=pdf"},{"key":"10_CR33","unstructured":"Ibrahim, A.S., Hamlyn-Harris, J., Grundy, J.: Emerging security challenges of cloud virtual infrastructure. arXiv preprint arXiv:1612.09059 (2016)"},{"key":"10_CR34","doi-asserted-by":"crossref","unstructured":"Dastjerdi, A.V., Tabatabaei, S.G.H., Buyya, R.: An effective architecture for automated appliance management system applying ontology-based cloud discovery. In: Proceedings of the 2010 10th IEEE\/ACM International Conference on Cluster, Cloud and Grid Computing, pp. 104\u2013112. IEEE Computer Society (2010)","DOI":"10.1109\/CCGRID.2010.87"},{"issue":"8","key":"10_CR35","doi-asserted-by":"publisher","first-page":"1226","DOI":"10.1016\/j.future.2010.02.013","volume":"26","author":"L Rodero-Merino","year":"2010","unstructured":"Rodero-Merino, L., et al.: From infrastructure delivery to service management in clouds. Futur. Gener. Comput. Syst. 26(8), 1226\u20131240 (2010)","journal-title":"Futur. Gener. Comput. Syst."},{"key":"10_CR36","unstructured":"Microsoft: Application Patterns and Development Strategies for SQL Server in Azure Virtual Machines (2018). https:\/\/docs.microsoft.com\/en-us\/azure\/virtual-machines\/windows\/sql\/virtual-machines-windows-sql-server-app-patterns-dev-strategies"}],"container-title":["Lecture Notes on Data Engineering and Communications Technologies","Advanced Information Networking and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-87775-9_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,29]],"date-time":"2025-04-29T16:25:11Z","timestamp":1745943911000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-87775-9_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9783031877742","9783031877759"],"references-count":36,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-87775-9_10","relation":{},"ISSN":["2367-4512","2367-4520"],"issn-type":[{"value":"2367-4512","type":"print"},{"value":"2367-4520","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"30 April 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"AINA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Advanced Information Networking and Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Barcelona","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Spain","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"9 April 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"11 April 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"39","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"aina0","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/voyager.ce.fit.ac.jp\/conf\/aina\/2025\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}