{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,9]],"date-time":"2026-03-09T06:11:56Z","timestamp":1773036716818,"version":"3.50.1"},"publisher-location":"Cham","reference-count":23,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319093383","type":"print"},{"value":"9783319093390","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-09339-0_44","type":"book-chapter","created":{"date-parts":[[2014,7,5]],"date-time":"2014-07-05T00:59:30Z","timestamp":1404521970000},"page":"434-443","source":"Crossref","is-referenced-by-count":6,"title":["Dynamically Changing Service Level Agreements (SLAs) Management in Cloud Computing"],"prefix":"10.1007","author":[{"given":"Waleed","family":"Halboob","sequence":"first","affiliation":[]},{"given":"Haider","family":"Abbas","sequence":"additional","affiliation":[]},{"given":"Kamel","family":"Haouam","sequence":"additional","affiliation":[]},{"given":"Asif","family":"Yaseen","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"5","key":"44_CR1","doi-asserted-by":"publisher","first-page":"96","DOI":"10.1109\/MIC.2008.107","volume":"12","author":"C. Hewitt","year":"2008","unstructured":"Hewitt, C.: ORGs for Scalable, Robust, Privacy-Friendly Client Cloud Computing. IEEE Internet Computing\u00a012(5), 96\u201399 (2008)","journal-title":"IEEE Internet Computing"},{"issue":"7","key":"44_CR2","doi-asserted-by":"publisher","first-page":"620","DOI":"10.3923\/jas.2014.620.630","volume":"14","author":"W. Halboob","year":"2014","unstructured":"Halboob, W., Mahmod, R., Alghathbar, K., Mamat, A.: TC-enabled and Distributed Cloud Computing Access Control. Journal of Applied Science\u00a014(7), 620\u2013630 (2014)","journal-title":"Journal of Applied Science"},{"key":"44_CR3","unstructured":"Patel, P., Ranabahu, A., Sheth, A.: Service Level Agreement in Cloud Computing: Knoesis Center. Wright State University (2009)"},{"issue":"2009","key":"44_CR4","doi-asserted-by":"publisher","first-page":"2591","DOI":"10.1016\/j.ins.2009.01.037","volume":"17","author":"Q. He","year":"2009","unstructured":"He, Q., Yan, J., Kowalczyk, R., Jin, H., Yang, Y.: Lifetime service level agreement management with autonomous agents for services provision. Information Sciences\u00a017(2009), 2591\u20132605 (2009)","journal-title":"Information Sciences"},{"key":"44_CR5","doi-asserted-by":"crossref","unstructured":"Brandic, I., Music, D., Dustdar, S., Venugopal, S., Buyya, R.: Advanced QoS Methods for Grid Workflows Based on Meta-Negotiations and SLA-Mappings. In: 3rd Workshop on Workflows in Support of Large-Scale Science (2008)","DOI":"10.1109\/WORKS.2008.4723960"},{"key":"44_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"238","DOI":"10.1007\/978-3-642-16132-2_23","volume-title":"Service-Oriented Computing. ICSOC\/ServiceWave 2009 Workshops","author":"M. Risch","year":"2010","unstructured":"Risch, M., Brandic, I., Altmann, J.: Using SLA mapping to increase market liquidity. In: Dan, A., Gittler, F., Toumani, F. (eds.) ICSOC\/ServiceWave 2009. LNCS, vol.\u00a06275, pp. 238\u2013247. Springer, Heidelberg (2010)"},{"key":"44_CR7","doi-asserted-by":"crossref","unstructured":"Brandic, I., Music, D., Dustdar, S.: Service Mediation and Negotiation Bootstrapping as First Achievements Towards Self-adaptable Grid and Cloud Services. Paper Presented at the 6th International Conference Industry Session on Grids Meets Autonomic Computing (GMAC), Barcelona, Spain (2009)","DOI":"10.1145\/1555301.1555302"},{"issue":"1","key":"44_CR8","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1016\/j.future.2011.05.023","volume":"28","author":"M. Maurera","year":"2011","unstructured":"Maurera, M., Emeakarohaa, V.C., Brandica, I., Altmannb, J.: Cost\u2013benefit analysis of an SLA mapping approach for defining standardized Cloud computing goods. Future Generation Computer Systems\u00a028(1), 39\u201347 (2011)","journal-title":"Future Generation Computer Systems"},{"issue":"1","key":"44_CR9","first-page":"481","volume":"3","author":"R.P. Padhy","year":"2012","unstructured":"Padhy, R.P., Patra, M.R., Satapathy, S.C.: SLAs in Cloud Systems: The Business Perspective. International Journal of Computer Science and Telecommunications\u00a03(1), 481\u2013488 (2012)","journal-title":"International Journal of Computer Science and Telecommunications"},{"issue":"1","key":"44_CR10","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1108\/09685221111115836","volume":"19","author":"H. Abbas","year":"2011","unstructured":"Abbas, H., Magnusson, C., Yngstrom, L., Hemani, A.: Addressing dynamic issues in information security management. Information Security Management\u00a019(1), 5\u201324 (2011)","journal-title":"Information Security Management"},{"key":"44_CR11","doi-asserted-by":"crossref","unstructured":"Redl, C., Breskovic, I., Brandic, I., & Dustdar, S. Automatic SLA Matching and Provider Selection in Grid and Cloud Computing Markets. Paper Presented at the 13th CM\/IEEE International Conference on Grid Computing (GRID 2012), Beijing, China (2012)","DOI":"10.1109\/Grid.2012.18"},{"key":"44_CR12","unstructured":"Ludwig, H., Keller, A., Dan, A., King, R.P., Franck, R.: Web service level agreement (WSLA) language specification. IBM Corporation (2003)"},{"issue":"4","key":"44_CR13","doi-asserted-by":"publisher","first-page":"320","DOI":"10.1109\/TSC.2009.26","volume":"2","author":"K. Kritikos","year":"2009","unstructured":"Kritikos, K., Plexousakis, D.: Requirements for QoS-Based Web Service Description and Discovery. IEEE Transaction on Service Computing\u00a02(4), 320\u2013337 (2009)","journal-title":"IEEE Transaction on Service Computing"},{"key":"44_CR14","doi-asserted-by":"crossref","unstructured":"Tran, V.X., Tsuji, H.: A Survey and Analysis on Semantics in QoS for Web Services. Paper presented at the IEEE 23rd International Conference on Advanced Information Networking and Applications (AINA), Bradford, United Kingdom (2009)","DOI":"10.1109\/AINA.2009.43"},{"key":"44_CR15","doi-asserted-by":"crossref","unstructured":"Chudasma, N., Chaudhary, S.: Service Composition Using Service Selection with WS-Agreement. Paper presented at the 2nd Bangalore Annual Compute Conference (Compute, Bangalore, India (2009)","DOI":"10.1145\/1517303.1517326"},{"key":"44_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"165","DOI":"10.1007\/978-3-642-16132-2_16","volume-title":"Service-Oriented Computing. ICSOC\/ServiceWave 2009 Workshops","author":"H. Mu\u00f1oz","year":"2010","unstructured":"Mu\u00f1oz, H., Kotsiopoulos, I., Micsik, A., Koller, B., Mora, J.: Flexible SLA negotiation using semantic annotations. In: Dan, A., Gittler, F., Toumani, F. (eds.) ICSOC\/ServiceWave 2009. LNCS, vol.\u00a0ICSOC, pp. 165\u2013175. Springer, Heidelberg (2010)"},{"key":"44_CR17","doi-asserted-by":"crossref","unstructured":"Fakhfakh, K., Tazi, S., Drira, K., Chaari, T., Jmaiel, M.: Implementing and Testing a Semantic-Driven Approach towards a Better Comprehension between Service Consumers and Providers. Paper presented at the IEEE 24th International Conference on Advanced Information Networking and Applications Workshops (WAINA 2010), Perth, Australia (2010)","DOI":"10.1109\/WAINA.2010.188"},{"key":"44_CR18","doi-asserted-by":"crossref","unstructured":"Abbas, H., Yngstr\u00f6m, L., Hemani, A.: Adaptability infrastructure for bridging IT security evaluation and options theory. Paper presented at the 2nd International Conference on Security of Information and Networks SIN 2009, Famagusta, Cyprus (2009)","DOI":"10.1145\/1626195.1626208"},{"key":"44_CR19","unstructured":"Abbas, H., Yngstr\u00f6m, L., Hemani, A.: Option based evaluation: Security evaluation of IT products based on options theory. Paper presented at the 1st Eastern European Regional Conference on the Engineering of Computer-Based Systems: Setting New ECBS Frontiers, Novi Sad, Serbia"},{"key":"44_CR20","doi-asserted-by":"crossref","unstructured":"Abbas, H., Magnusson, C., Yngstr\u00f6m, L., Hemani, A.: A structured approach for internalizing externalities caused by IT security mechanisms. Paper presented at 2nd International Workshop on Education Technology and Computer Science (ETCS 2010), Wuhan, Hubei, China (2010)","DOI":"10.1109\/ETCS.2010.493"},{"key":"44_CR21","doi-asserted-by":"crossref","unstructured":"Alhamad, M., Dillon, T., Chang, E.: Conceptual SLA Framework for Cloud Computing. Paper presented at the 4th IEEE International Conference on Digital Ecosystems and Technologies (IEEE DEST, Dubai, UAE (2010)","DOI":"10.1109\/DEST.2010.5610586"},{"key":"44_CR22","series-title":"LNEE","doi-asserted-by":"publisher","first-page":"285","DOI":"10.1007\/978-3-642-40861-8_42","volume-title":"Future Information Technology","author":"R. Latif","year":"2014","unstructured":"Latif, R., Abbas, H., Assar, S., Ali, Q.: Cloud Computing Risk Assessment: A Systematic Literature Review. In: Park, J.J(J.H.), Stojmenovic, I., Choi, M., Xhafa, F. (eds.) Future Information Technology. LNEE, vol.\u00a0276, pp. 285\u2013295. Springer, Heidelberg (2014)"},{"key":"44_CR23","series-title":"Lecture Notes in Electrical Engineering","doi-asserted-by":"publisher","first-page":"297","DOI":"10.1007\/978-3-642-40861-8_43","volume-title":"Future Information Technology","author":"R. Naveed","year":"2014","unstructured":"Naveed, R., Abbas, H.: Security Requirements Specification Framework for Cloud Users. In: Park, J.J(J.H.), Stojmenovic, I., Choi, M., Xhafa, F. (eds.) Future Information Technology. Lecture Notes in Electrical Engineering, vol.\u00a0276, pp. 297\u2013305. Springer, Heidelberg (2014)"}],"container-title":["Lecture Notes in Computer Science","Intelligent Computing Methodologies"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-09339-0_44","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,1,20]],"date-time":"2019-01-20T18:11:44Z","timestamp":1548007904000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-09339-0_44"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319093383","9783319093390"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-09339-0_44","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014]]}}}