{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,29]],"date-time":"2025-09-29T08:19:28Z","timestamp":1759133968605,"version":"3.40.3"},"publisher-location":"Cham","reference-count":23,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319125732"},{"type":"electronic","value":"9783319125749"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-12574-9_7","type":"book-chapter","created":{"date-parts":[[2014,11,21]],"date-time":"2014-11-21T13:38:31Z","timestamp":1416577111000},"page":"77-88","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Interoperability Analysis of Accountable Data Governance in the Cloud"],"prefix":"10.1007","author":[{"given":"Vasilios","family":"Tountopoulos","sequence":"first","affiliation":[]},{"given":"Massimo","family":"Felici","sequence":"additional","affiliation":[]},{"given":"Alain","family":"Pannetrat","sequence":"additional","affiliation":[]},{"given":"Daniele","family":"Catteddu","sequence":"additional","affiliation":[]},{"given":"Siani","family":"Pearson","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,11,18]]},"reference":[{"key":"7_CR1","unstructured":"European Commission: Unleashing the potential of cloud computing in Europe. COM529 (2012)"},{"key":"7_CR2","unstructured":"Cloud Security Alliance: The notorious nine: cloud computing top threats in 2013. CSA Top Threats Working Group (2013)"},{"key":"7_CR3","unstructured":"European Network and Information Security Agency: Cloud computing: benefits, risks and recommendations for information security. ENISA report (2009)"},{"key":"7_CR4","unstructured":"Article 29 Data Protection Working Party: Opinion 3\/2010 on the principle of accountability. 00062\/10\/EN WP 173 (2010)"},{"key":"7_CR5","unstructured":"Article 29 Data Protection Working Party: Opinion 05\/2012 on Cloud Computing. 01037\/12\/EN WP 196 (2012)"},{"key":"7_CR6","doi-asserted-by":"crossref","unstructured":"Kuan Hon, W., Kosta, E., Christopher, M., Stefanatou, D.: Cloud accountability: the likely impact of the proposed EU data protection regulation. Queen Mary School of Law Legal Studies, Research Paper No. 172\/2014; Tilburg Law School, Research Paper No. 07\/2014","DOI":"10.2139\/ssrn.2405971"},{"key":"7_CR7","unstructured":"International Data Corporation (IDC): Quantitative estimates of the demand for cloud computing in Europe and the likely barriers to up-take, July (2012)"},{"key":"7_CR8","series-title":"Communications in Computer and Information Science","doi-asserted-by":"crossref","first-page":"28","DOI":"10.1007\/978-3-642-41205-9_3","volume-title":"Cyber Security and Privacy","author":"M Felici","year":"2013","unstructured":"Felici, M., Jaatun, M.G., Kosta, E., Wainwright, N.: Bringing accountability to the cloud: addressing emerging threats and legal perspectives. In: Felici, M. (ed.) CSP EU FORUM 2013. CCIS, vol. 182, pp. 28\u201340. Springer, Heidelberg (2013)"},{"key":"7_CR9","doi-asserted-by":"crossref","unstructured":"Felici, M., Koulouris, T., Pearson, S.: Accountability for data governance in cloud ecosystems. In: 2013 IEEE International Conference on Cloud Computing Technology and Science (CloudCom 2013), Proceedings, pp. 327\u2013332. IEEE Computer Society (2013)","DOI":"10.1109\/CloudCom.2013.157"},{"key":"7_CR10","unstructured":"Georgia Tech Information Security Center (GTISC) and Georgia Tech Research Institute (GTRI): Emerging cyber threats report 2014. Georgia Institute of Technology, Georgia Tech Cyber Security Summit (2013)"},{"key":"7_CR11","unstructured":"Organisation of Economic Cooperation and Development (OECD): The future of internet economy: a statistical profile. OECD Report, June 2011"},{"key":"7_CR12","unstructured":"Article 29 Data Protection Working Party: Explanatory document on the processor binding corporate rules. 00658\/13\/EN WP 204 (2013)"},{"key":"7_CR13","unstructured":"Article 29 Data Protection Working Party: Opinion 01\/2012 on the data protection reform proposals. 00530\/12\/EN WP 191 (2012)"},{"key":"7_CR14","volume-title":"Cloud Computing Law","author":"C Reed","year":"2013","unstructured":"Reed, C.: Cloud governance: the way forward. In: Millard, C. (ed.) Cloud Computing Law. Oxford University Press, Oxford (2013)"},{"key":"7_CR15","doi-asserted-by":"crossref","unstructured":"Drago I., Mellia M., Munafo M.M., Sperotto A., Sadre R., Pras A.: Inside dropbox: understanding personal cloud storage services. In: Proceedings of the 2012 ACM Conference on Internet Measurement Conference (IMC\u201912), pp. 481\u2013494. ACM, New York (2012)","DOI":"10.1145\/2398776.2398827"},{"key":"7_CR16","doi-asserted-by":"crossref","unstructured":"Liu, F., Tong, J., Mao, J., Bohn, R., Messina, J., Badger, L., Leaf, D.: NIST cloud computing reference architecture. NIST special publication, 500-292 (2011)","DOI":"10.6028\/NIST.SP.500-292"},{"key":"7_CR17","unstructured":"A4Cloud: MS:C-2.3 conceptual framework. Milestone Report, May 2014"},{"key":"7_CR18","unstructured":"A4Cloud: D:C-3.1 requirements for cloud interoperability. Public Deliverable, November (2013)"},{"key":"7_CR19","unstructured":"Hogben G., Dekker M.: Procure secure, a guide to monitoring of security service levels in cloud contracts. European Network and Information Security Agency (ENISA) Report (2012)"},{"key":"7_CR20","doi-asserted-by":"crossref","unstructured":"Hogben G., Pannetrat A.: Mutant apples: a critical examination of cloud SLA availability definitions. In: IEEE 5th International Conference Cloud Computing Technology and Science (CloudCom), December 2013","DOI":"10.1109\/CloudCom.2013.56"},{"key":"7_CR21","unstructured":"Ardagna A.C., et al.: Primelife policy language (2009). http:\/\/www.w3.org\/2009\/policy-ws\/papers\/Trabelisi.pdf"},{"key":"7_CR22","unstructured":"OASIS: eXtensible Access Control Markup Language (XACML) Version 3.0 (2013)"},{"key":"7_CR23","unstructured":"ISO\/IEC NP 19086, Information technology - Distributed application platforms and services - Cloud computing - Service level agreement (SLA) framework and terminology. Under development, November (2013)"}],"container-title":["Communications in Computer and Information Science","Cyber Security and Privacy"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-12574-9_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,10]],"date-time":"2023-02-10T04:24:03Z","timestamp":1676003043000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-12574-9_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319125732","9783319125749"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-12574-9_7","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2014]]},"assertion":[{"value":"18 November 2014","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}