{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T14:09:14Z","timestamp":1742998154866,"version":"3.40.3"},"publisher-location":"Cham","reference-count":45,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319184906"},{"type":"electronic","value":"9783319184913"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-18491-3_19","type":"book-chapter","created":{"date-parts":[[2015,4,29]],"date-time":"2015-04-29T07:37:47Z","timestamp":1430293067000},"page":"226-239","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["Integrating Security Services in Cloud Service Stores"],"prefix":"10.1007","author":[{"given":"Joshua","family":"Daniel","sequence":"first","affiliation":[]},{"given":"Fadi","family":"El-Moussa","sequence":"additional","affiliation":[]},{"given":"G\u00e9ry","family":"Ducatel","sequence":"additional","affiliation":[]},{"given":"Pramod","family":"Pawar","sequence":"additional","affiliation":[]},{"given":"Ali","family":"Sajjad","sequence":"additional","affiliation":[]},{"given":"Robert","family":"Rowlingson","sequence":"additional","affiliation":[]},{"given":"Theo","family":"Dimitrakos","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,4,30]]},"reference":[{"issue":"1","key":"19_CR1","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.jnca.2010.07.006","volume":"34","author":"S Subashini","year":"2011","unstructured":"Subashini, S., Kavitha, V.: A survey on security issues in service delivery models of cloud computing. J. Netw. Comput. Appl. 34(1), 1\u201311 (2011)","journal-title":"J. Netw. Comput. Appl."},{"key":"19_CR2","doi-asserted-by":"crossref","unstructured":"Yu, H., Powell, N., Stembridge, D., Yuan, X.: Cloud computing and security challenges. In: ACM-SE 2012 Proceedings of the 50th Annual Southeast Regional Conference, pp 298\u2013302 (2012)","DOI":"10.1145\/2184512.2184581"},{"key":"19_CR3","unstructured":"Cloud Security Alliance. Top Ten Big Data Security and Privacy Challenges, November 2012"},{"key":"19_CR4","unstructured":"Cloud Security Alliance. Cloud Computing Vulnerability Incidents: A Statistical Overview, May 2013"},{"key":"19_CR5","unstructured":"Catteddu, D., Hogben, G.: Cloud Computing Risk Assessment. European Network and Information Security Agency (ENISA) (2009)"},{"key":"19_CR6","unstructured":"Cloud Security Alliance. Cloud Controls Matrix v3.0.1, July 2014"},{"key":"19_CR7","unstructured":"European Commission Communication on \u201cUnleashing the Potential of Cloud Computing in Europe\u201d. \n                    http:\/\/eurlex.europa.eu"},{"key":"19_CR8","unstructured":"Skyhigh, Cloud Adoption & Risk Report. \n                    http:\/\/www.skyhighnetworks.com\/"},{"key":"19_CR9","unstructured":"Lachal L.: \u201cPublic Clouds are becoming vertical market-centric\u201d Ovum. \n                    http:\/\/ovum.com\/"},{"key":"19_CR10","unstructured":"UK Government CloudStore. \n                    http:\/\/govstore.service.gov.uk\/Cloudstore\/"},{"key":"19_CR11","unstructured":"ECP Trusted Cloud Europe: Have your Say. \n                    http:\/\/europa.eu\/"},{"key":"19_CR12","unstructured":"El-Moussa F., Dimitrakos, T.: Protecting systems and applications on virtual data centres and in the Cloud: challenges, emerging solutions and lessons learnt. \n                    https:\/\/Cloudsecurityalliance.org\/events\/secureCloud-2012\/#_downloads"},{"key":"19_CR13","unstructured":"Dimitrakos, T.: Cloud Security Challenges and Guidelines. EIT ICT Labs Symposium on Trusted Cloud and Future Enterprises, Oulu, Finland, August 2014. \n                    http:\/\/www.eitictlabs.eu\/news-events\/events\/article\/eit-ict-labs-symposium-on-trusted-Cloud-and-future-enterprises\/"},{"issue":"1","key":"19_CR14","doi-asserted-by":"publisher","first-page":"42","DOI":"10.1016\/j.jnca.2012.05.003","volume":"36","author":"C Modi","year":"2013","unstructured":"Modi, C., Patel, D., Borisaniya, B., Patel, H., Patel, A., Rajarajan, M.: A survey of intrusion detection techniques in Cloud. J. Netw. Comput. Appl. 36(1), 42\u201357 (2013)","journal-title":"J. Netw. Comput. Appl."},{"issue":"1","key":"19_CR15","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1016\/j.jnca.2012.08.007","volume":"36","author":"A Patel","year":"2013","unstructured":"Patel, A., Taghavi, M., Bakhtiyari, K., J\u00fanior, J.C.: An intrusion detection and prevention system in cloud computing: a systematic review. J. Netw. Comput. Appl. 36(1), 25\u201341 (2013)","journal-title":"J. Netw. Comput. Appl."},{"issue":"1","key":"19_CR16","first-page":"1","volume":"4","author":"HM Alsafi","year":"2012","unstructured":"Alsafi, H.M., Abdullah, W.M., Pathan, A.-S.K.: IDPS: an integrated intrusion handling model for cloud computing environment. Int. J. Comput. Inf. Technol. 4(1), 1\u201316 (2012)","journal-title":"Int. J. Comput. Inf. Technol."},{"key":"19_CR17","doi-asserted-by":"crossref","unstructured":"Dastjerdi, A.V., Bakar, K.A., Tabatabaei, S.: Distributed intrusion detection in clouds using mobile agents. In: Third International Conference on Advanced Engineering Computing and Applications in Sciences, pp. 175\u2013180 (2009)","DOI":"10.1109\/ADVCOMP.2009.34"},{"key":"19_CR18","unstructured":"AppStack by Appcara. \n                    http:\/\/www.appcara.com\/products\/appstack-r3"},{"key":"19_CR19","unstructured":"Jamcracker Services Delivery Network (JSDN). \n                    http:\/\/www.jamcracker.com\/jamcracker-servicesdelivery-network-jsdn"},{"key":"19_CR20","unstructured":"Canopy by Atos, EMC, VMWare. \n                    http:\/\/www.canopy-Cloud.com\/enterprise-application-store"},{"key":"19_CR21","unstructured":"Parallels Automation. \n                    http:\/\/www.parallels.com\/uk\/products\/automation\/"},{"key":"19_CR22","unstructured":"SixSQ Slipstream. \n                    http:\/\/sixsq.com\/products\/slipstream.html"},{"key":"19_CR23","unstructured":"CloudSoft AMP. \n                    http:\/\/www.Cloudsoftcorp.com\/product\/"},{"key":"19_CR24","unstructured":"Brooklyn project. \n                    http:\/\/brooklyncentral.github.io\/"},{"key":"19_CR25","unstructured":"Ubuntu Juju. \n                    https:\/\/juju.ubuntu.com\/"},{"key":"19_CR26","unstructured":"G-Cloud Cloudstore. \n                    http:\/\/govstore.service.gov.uk\/Cloudstore\/"},{"key":"19_CR27","unstructured":"Gartner: Market Trends: Cloud-Based Security"},{"issue":"1","key":"19_CR28","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/1869-0238-4-5","volume":"4","author":"K Hashizume","year":"2013","unstructured":"Hashizume, K., Rosado, D.G., Fern\u00e1ndez-Medina, E., Fernandez, E.B.: An analysis of security issues for Cloud computing. J. Internet Serv. Appl. 4(1), 1\u201313 (2013)","journal-title":"J. Internet Serv. Appl."},{"key":"19_CR29","unstructured":"Trend Micro Deep Security. \n                    http:\/\/www.trendmicro.com\/us\/enterprise\/Cloud-solutions\/deep-security\/"},{"key":"19_CR30","unstructured":"McAfee Cloud Security. \n                    http:\/\/www.mcafee.com\/uk\/solutions\/Cloud-security\/Cloud-security.aspx"},{"key":"19_CR31","unstructured":"Symantec Cloud Security suite. \n                    http:\/\/www.symantec.com\/en\/uk\/productssolutions\/solutions\/detail.jsp?parent=Cloud&child=extend_Cloud"},{"key":"19_CR32","unstructured":"Trend Micro Secure Cloud. \n                    http:\/\/www.trendmicro.co.uk\/products\/secureCloud\/"},{"key":"19_CR33","unstructured":"Vormetric. \n                    http:\/\/www.vormetric.com\/"},{"key":"19_CR34","unstructured":"SafeNet: ProtectV. \n                    http:\/\/www.safenet-inc.com\/data-protection\/virtualization-Cloud-security\/protectv-Clouddata-protection\/"},{"key":"19_CR35","unstructured":"Z-Scaler. \n                    http:\/\/www.zscaler.com\/"},{"key":"19_CR36","unstructured":"CA CloudMinder. \n                    http:\/\/www.ca.com\/gb\/Cloud-identity.aspx"},{"key":"19_CR37","unstructured":"SailPoint IDaaS. \n                    http:\/\/www.sailpoint.com\/solutions\/customer-solutions\/iam-for-todays-Cloudenvironments"},{"key":"19_CR38","unstructured":"Nair S.K., Dimitrakos, T.: On the security of data stored in the cloud secure. In: SecureCloud 2012. \n                    https:\/\/Cloudsecurityalliance.org\/events\/secureCloud-2012\/"},{"key":"19_CR39","unstructured":"CA Layer 7. The Value of Application Service Governance for Cloud Computing. Cloud Computing White Paper. \n                    http:\/\/www.layer7tech.com\/resources\/files\/white_papers\/Value%20of%20SOA%20Governance%20for%20Cloud%20Computing.pdf"},{"key":"19_CR40","unstructured":"Apache J-Clouds: Java Multi-Cloud Toolkit. \n                    https:\/\/jClouds.apache.org\/"},{"key":"19_CR41","unstructured":"Chef IT Automation. \n                    http:\/\/www.getchef.com\/chef\/"},{"key":"19_CR42","unstructured":"Puppet Enterprise. \n                    http:\/\/puppetlabs.com\/solutions"},{"key":"19_CR43","unstructured":"Appcara. Cloud Management versus Cloud App Management. \n                    http:\/\/www.appcara.com\/wp-content\/uploads\/2014\/07\/Cloud-Management-versus-Cloud-App-Management-v2.0.pdf"},{"key":"19_CR44","doi-asserted-by":"crossref","unstructured":"Armstrong, D., Djemame, K., Nair, S., Tordsson, J., Ziegler, W.: Towards a contextualization solution for cloud platform services. In: Proceedings - 2011 3rd IEEE International Conference on Cloud Computing Technology and Science, CloudCom 2011, pp. 328\u2013331 (2011)","DOI":"10.1109\/CloudCom.2011.51"},{"key":"19_CR45","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"567","DOI":"10.1007\/978-3-642-36949-0_66","volume-title":"Euro-Par 2012: Parallel Processing Workshops","author":"D Armstrong","year":"2013","unstructured":"Armstrong, D., Espling, D., Tordsson, J., Djemame, K., Elmroth, E.: Runtime virtual machine recontextualization for clouds. In: Caragiannis, I., et al. (eds.) Euro-Par 2012 Workshops. LNCS, vol. 7640, pp. 567\u2013576. Springer, Heidelberg (2013)"}],"container-title":["IFIP Advances in Information and Communication Technology","Trust Management IX"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-18491-3_19","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,29]],"date-time":"2019-05-29T19:15:54Z","timestamp":1559157354000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-18491-3_19"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319184906","9783319184913"],"references-count":45,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-18491-3_19","relation":{},"ISSN":["1868-4238","1868-422X"],"issn-type":[{"type":"print","value":"1868-4238"},{"type":"electronic","value":"1868-422X"}],"subject":[],"published":{"date-parts":[[2015]]},"assertion":[{"value":"30 April 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}