{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,3]],"date-time":"2025-05-03T04:03:22Z","timestamp":1746245002694,"version":"3.40.4"},"publisher-location":"Cham","reference-count":15,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319066769"},{"type":"electronic","value":"9783319066776"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-06677-6_4","type":"book-chapter","created":{"date-parts":[[2014,4,7]],"date-time":"2014-04-07T03:39:36Z","timestamp":1396841976000},"page":"35-48","source":"Crossref","is-referenced-by-count":1,"title":["Active and Personalized Services in an Information Security Engineering Cloud Based on ISO\/IEC 15408"],"prefix":"10.1007","author":[{"given":"Liqing","family":"Xu","sequence":"first","affiliation":[]},{"given":"Yuichi","family":"Goto","sequence":"additional","affiliation":[]},{"given":"Ahmad Iqbal Hakim","family":"Suhaimi","sequence":"additional","affiliation":[]},{"given":"Ning","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Jingde","family":"Cheng","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"4_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1007\/978-3-642-10665-1_4","volume-title":"Cloud Computing","author":"R. Buyya","year":"2009","unstructured":"Buyya, R., Pandey, S., Vecchiola, C.: Cloudbus Toolkit for Market-Oriented Cloud Computing. In: Jaatun, M.G., Zhao, G., Rong, C. (eds.) CloudCom. LNCS, vol.\u00a05931, pp. 24\u201344. Springer, Heidelberg (2009)"},{"issue":"4","key":"4_CR2","first-page":"80","volume":"11","author":"M. Cavage","year":"2013","unstructured":"Cavage, M.: There\u2019s Just No Getting around It: You\u2019re Building a Distributed System. Int. J. ACM Queue\u00a011(4), 80\u201389 (2013)","journal-title":"Int. J. ACM Queue"},{"key":"4_CR3","doi-asserted-by":"crossref","unstructured":"Cheng, J., Goto, Y., Morimoto, S., Horie, D.: A Security Engineering Environment Based on ISO\/IEC Standards: Providing Standard, Formal, and Consistent Supports for Design, Development, Operation, and Maintenance of Secure Information Systems. In: Proceedings of the 2nd International Conference on Information Security and Assurance (ISA 2008), pp. 350\u2013354. IEEE Computer Society Press (2008)","DOI":"10.1109\/ISA.2008.106"},{"key":"4_CR4","doi-asserted-by":"crossref","unstructured":"Cheng, J., Goto, Y., Horie, D.: ISEE: An Information Security Engineering Environment. In: Proceedings of the International Conference on Security and Cryptography (SECRYPT 2009), pp. 395\u2013400. INSTICC Press (2009)","DOI":"10.1109\/ISPA.2009.107"},{"key":"4_CR5","doi-asserted-by":"crossref","unstructured":"Cheng, J., Goto, Y., Horie, D., Miura, J., Kasahara, T., Iqbal, A.: Development of ISEE: An Information Security Engineering Environment. In: Proceedings of the 7th IEEE International Symposium on Parallel and Distributed Processing with Applications (ISPA 2009), pp. 505\u2013510. IEEE Computer Society Press (2009)","DOI":"10.1109\/ISPA.2009.107"},{"key":"4_CR6","unstructured":"Classmethod: List of Services Provided by the Amazon Cloud, http:\/\/classmethod.jp\/solutions\/aws\/tech\/ (accessed June 20, 2013)"},{"key":"4_CR7","unstructured":"Common Criteria Project: Common Criteria Portal, http:\/\/www.commoncriteriaportal.org\/ (accessed June 20, 2013)"},{"issue":"5","key":"4_CR8","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1145\/1551644.1554608","volume":"7","author":"M. Creeger","year":"2009","unstructured":"Creeger, M.: Cloud Computing: An Overview. Int. J. ACM Queue\u00a07(5), 3\u20134 (2009)","journal-title":"Int. J. ACM Queue"},{"key":"4_CR9","doi-asserted-by":"crossref","unstructured":"Horie, D., Morimoto, S., Azimah, N., Goto, Y., Cheng, J.: ISEDS: An Information Security Engineering Database System Based on ISO Standards. In: Proceedings of the 3rd International Conference on Availability, Reliability and Security (ARES 2008), pp. 1219\u20131225. IEEE Press (2008)","DOI":"10.1109\/ARES.2008.76"},{"key":"4_CR10","unstructured":"International Organization for Standardization: ISO\/IEC 15408:2009, Information Technology - Security Techniques - Evaluation Criteria for IT Security (2009)"},{"issue":"8","key":"4_CR11","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1109\/MC.2009.263","volume":"42","author":"Y. Koren","year":"2009","unstructured":"Koren, Y., Bell, R., Volinsky, C.: Matrix Factorization Techniques for Recommendersystems. IEEE Computer\u00a042(8), 30\u201337 (2009)","journal-title":"IEEE Computer"},{"issue":"1","key":"4_CR12","doi-asserted-by":"publisher","first-page":"75","DOI":"10.1016\/S1389-1286(01)00156-6","volume":"36","author":"I. Marshall","year":"2001","unstructured":"Marshall, I., Roadknight, C.: Provision of Quality of Service for Active Services. Computer Networks\u00a036(1), 75\u201385 (2001)","journal-title":"Computer Networks"},{"key":"4_CR13","doi-asserted-by":"crossref","unstructured":"Xu, L., Shi, K., Goto, Y., Cheng, J.: ISEC: An Information Security Engineering Cloud. In: Proceedings of the 3rd IEEE International Conference on Software Engineering and Service Science (ICSESS 2012), pp. 750\u2013753. IEEE Press (2012)","DOI":"10.1109\/ICSESS.2012.6269575"},{"key":"4_CR14","doi-asserted-by":"crossref","unstructured":"Xu, L., Wang, B., Goto, Y., Cheng, J.: Providing Users with Suitable Services of Information Security Engineering Cloud Based on ISO\/IEC 15408. In: Proceedings of the 4th IEEE International Conference on Software Engineering and Service Science (ICSESS 2013), pp. 321\u2013325. IEEE Press (2013)","DOI":"10.1109\/ICSESS.2013.6615315"},{"key":"4_CR15","doi-asserted-by":"crossref","unstructured":"Zhang, N., Iqbal, A., Goto, Y., Cheng, J.: An Analysis of Software Supportable Tasks related with ISO\/IEC 15408. In: Proceedings of 9th International Conference on Computational Intelligence and Security (CIS 2013), pp. 601\u2013606. IEEE Computer Society Press (2013)","DOI":"10.1109\/CIS.2013.132"}],"container-title":["Lecture Notes in Computer Science","Intelligence and Security Informatics"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-06677-6_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,2]],"date-time":"2025-05-02T08:52:51Z","timestamp":1746175971000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-06677-6_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319066769","9783319066776"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-06677-6_4","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]}}}