{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T07:21:40Z","timestamp":1743146500505,"version":"3.40.3"},"publisher-location":"Cham","reference-count":31,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319192420"},{"type":"electronic","value":"9783319192437"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-19243-7_45","type":"book-chapter","created":{"date-parts":[[2015,5,26]],"date-time":"2015-05-26T13:05:09Z","timestamp":1432645509000},"page":"495-506","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Towards the Integration of Security Transparency in the Modelling and Design of Cloud Based Systems"],"prefix":"10.1007","author":[{"given":"Moussa","family":"Ouedraogo","sequence":"first","affiliation":[]},{"given":"Shareeful","family":"Islam","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,5,27]]},"reference":[{"issue":"2","key":"45_CR1","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1145\/2408776.2408789","volume":"56","author":"A Sunyaev","year":"2013","unstructured":"Sunyaev, A., Schneider, S.: Cloud services certification. Commun. ACM 56(2), 33\u201336 (2013). ACM Digital Library","journal-title":"Commun. ACM"},{"key":"45_CR2","unstructured":"Chen, Y., Paxson, V., Katz R.H.: What\u2019s New about Cloud Computing Security? Report EECS Department, University of California, Berkeley (2010). \n                    http:\/\/www.eecs.berkeley.edu\/Pubs\/TechRpts\/2010\/EECS-2010\u20135.html\n                    \n                  . Accessed 13 September 2012"},{"key":"45_CR3","doi-asserted-by":"crossref","unstructured":"Nu\u00f1ez, D., Fernandez-Gago, C., Pearson, S., Felici, M.: A metamodel for measuring accountability attributes in the cloud. In: Proceedings of the 2013 IEEE International Conference on Cloud Computing Technology and Science (CloudCom 2013). IEEE (2013)","DOI":"10.1109\/CloudCom.2013.53"},{"key":"45_CR4","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1016\/j.cose.2013.01.007","volume":"38","author":"M Ouedraogo","year":"2013","unstructured":"Ouedraogo, M.: Mouratidis, M: Selecting a cloud service provider in the age of cybercrime. Comput. Secur. 38, 3\u201313 (2013)","journal-title":"Comput. Secur."},{"key":"45_CR5","unstructured":"Santos, N., Gummadi, K.P., Rodrigues, R.: Towards trusted cloud computing. In: Proceedings of the 2009 conference on Hot topics in cloud computing (HotCloud). USENIX, San Diego (2009)"},{"key":"45_CR6","doi-asserted-by":"crossref","unstructured":"Garfinkel, T., Pfaff, B., Chow, J., Rosenblum, M., Boneh, D.: Terra: a virtual machine-based platform for trusted computing. In: Proceedings of SOSP 2003. ACM (2003)","DOI":"10.1145\/945445.945464"},{"key":"45_CR7","unstructured":"Krautheim, F.J.: Private virtual infrastructure for cloud computing. In: Proceedings of the HotCloud Conference 2009. ACM (2009)"},{"key":"45_CR8","doi-asserted-by":"crossref","unstructured":"Arshad, J., Townend, P., Jie, X.: Quantification of security for compute intensive workloads in clouds. In: Proceedings of the 15th International Conference on Parallel and Distributed Systems. IEEE (2009)","DOI":"10.1109\/ICPADS.2009.46"},{"issue":"12","key":"45_CR9","doi-asserted-by":"publisher","first-page":"130","DOI":"10.1109\/MCOM.2011.6094017","volume":"49","author":"SA De Chaves","year":"2011","unstructured":"De Chaves, S.A., Uriarte, R.B., Westphall, C.B.: Toward an architecture for monitoring private clouds. IEEE Commun. Mag. 49(12), 130\u2013137 (2011). IEEE","journal-title":"IEEE Commun. Mag."},{"key":"45_CR10","doi-asserted-by":"crossref","unstructured":"Shao, J., Wei, H., Wang, Q., Mei, H.: A runtime model based monitoring approach for cloud. In: Proceedings of IEEE 3rd International Conference on Cloud Computing. IEEE (2010)","DOI":"10.1109\/CLOUD.2010.31"},{"key":"45_CR11","doi-asserted-by":"crossref","unstructured":"Rak, M., Liccardo, L., Aversa, R.: A SLA-based interface for security management in cloud and GRID integrations. In: Proceedings of the 7th International Conference on Information Assurance and Security (IAS), pp. 378\u2013383. IEEE (2011)","DOI":"10.1109\/ISIAS.2011.6122783"},{"volume-title":"Service Level Agreements for Cloud Computing","year":"2011","key":"45_CR12","unstructured":"Wieder, P., Butler, J.M., Theilmann, W., Yahyapour, R. (eds.): Service Level Agreements for Cloud Computing. Springer, NewYork (2011)"},{"key":"45_CR13","doi-asserted-by":"crossref","unstructured":"Lorenzoli, D., Spanoudakis, G.: EVEREST+: runtime SLA violations prediction. In: Proceedings of the 5th Middleware for Service-Oriented Computing Workshop. ACM (2010)","DOI":"10.1145\/1890912.1890915"},{"key":"45_CR14","series-title":"Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence)","doi-asserted-by":"publisher","first-page":"409","DOI":"10.1007\/3-540-48317-9_17","volume-title":"Artificial Intelligence Today","author":"M Shanahan","year":"1999","unstructured":"Shanahan, M.: The event calculus explained. In: Veloso, M.M., Wooldridge, M.J. (eds.) Artificial Intelligence Today. LNCS (LNAI), vol. 1600, pp. 409\u2013430. Springer, Heidelberg (1999)"},{"key":"45_CR15","doi-asserted-by":"crossref","unstructured":"Chazalet, A.: Service level checking in the cloud computing context. In: Proceedings of the Third International Conference on Cloud Computing, pp. 297\u2013304. IEEE (2010)","DOI":"10.1109\/CLOUD.2010.15"},{"key":"45_CR16","doi-asserted-by":"crossref","unstructured":"Nu\u00f1ez, D., Fernandez-Gago, C., Pearson, S., Felici, M.: A metamodel for measuring accountability attributes in the cloud. In: Proceedings of the 2013 IEEE International Conference on Cloud Computing Technology and Science (CloudCom 2013). IEEE (2013)","DOI":"10.1109\/CloudCom.2013.53"},{"key":"45_CR17","unstructured":"AICPA: Statement on Auditing Standards (SAS) n\u00b070 (2012). \n                    http:\/\/sas70.com\/sas70_overview.html\n                    \n                  . Accessed 20 October 2013"},{"key":"45_CR18","doi-asserted-by":"crossref","unstructured":"Rak, M., Luna, J., Petcu, D., Casola, V., Suri, N., Villano, U.: Security as a service using an sla-based approach via SPECS. In: Proceedings of IEEE 5th International Conference on Cloud Computing Technology and Science (CloudCom), pp, 1\u20136. IEEE (2013)","DOI":"10.1109\/CloudCom.2013.165"},{"key":"45_CR19","unstructured":"T\u00dcV Rheinland\u2019s: Certification for cloud providers (2014). \n                    www.tuv.com\/en\/corporate\/business_customers\/information_scuriy_cw\/strategic_information_security\/cloud_security_certification\/cloud_security_certification.html\n                    \n                  . Accessed 20 October 2014"},{"key":"45_CR20","doi-asserted-by":"crossref","unstructured":"Schneider, S., Lansing, J., Gao, F., Sunyaev, A.: A taxonomic perspective on certification schemes: development of a taxonomy for cloud service certification criteria. In: Proceedings of the 47th Hawaii International Conference on System Sciences (HICSS 2014). IEEE (2014)","DOI":"10.1109\/HICSS.2014.614"},{"key":"45_CR21","doi-asserted-by":"crossref","unstructured":"Petcu, D.: A Taxonomy for SLA-based monitoring of cloud security. In: COMPSAC, pp. 640\u2013641 (2014)","DOI":"10.1109\/COMPSAC.2014.50"},{"key":"45_CR22","doi-asserted-by":"crossref","unstructured":"Kohne, A., Spohr, M., Nagel, L., Spinczyk, O.: FederatedCloudSim: a SLA-aware federated cloud simulation framework. In: Proceedings of the 2nd International Workshop on CrossCloud Systems. ACM, New York (2014)","DOI":"10.1145\/2676662.2676674"},{"key":"45_CR23","doi-asserted-by":"crossref","unstructured":"Maity, S., Chaudhuri, A.: Optimal negotiation of SLA in federated cloud using multiobjective genetic algorithms, In: Proceedings of CLOUDNET, pp. 269\u2013271. IEEExplore (2014)","DOI":"10.1109\/CloudNet.2014.6969005"},{"issue":"2","key":"45_CR24","doi-asserted-by":"publisher","first-page":"285","DOI":"10.1142\/S0218194007003240","volume":"17","author":"H Mouratidis","year":"2007","unstructured":"Mouratidis, H., Paolo Giorgini, P.: Secure tropos: a security-oriented extension of the tropos methodology. Int. J. Softw. Eng. Knowl. Eng. 17(2), 285\u2013309 (2007)","journal-title":"Int. J. Softw. Eng. Knowl. Eng."},{"key":"45_CR25","volume-title":"Securing the Cloud- Cloud Computer Security Techniques and Tactics","author":"V Winkler","year":"2011","unstructured":"Winkler, V.: Securing the Cloud- Cloud Computer Security Techniques and Tactics. Syngress, Waltham (2011)"},{"key":"45_CR26","doi-asserted-by":"crossref","unstructured":"Devanbu, P.T., Stubblebine, S.G.: Software engineering for security: a roadmap. In: ICSE - Future of SE Track 2000, pp. 227\u2013239 (2000)","DOI":"10.1145\/336512.336559"},{"key":"45_CR27","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"426","DOI":"10.1007\/3-540-45800-X_33","volume-title":"\u00abUML\u00bb 2002 - The Unified Modeling Language. Model Engineering, Concepts, and Tools","author":"T Lodderstedt","year":"2002","unstructured":"Lodderstedt, T., Basin, D., Doser, J.: SecureUML: a UML-based modeling language for model-driven security. In: J\u00e9z\u00e9quel, J.-M., Hussmann, H., Cook, S. (eds.) UML 2002. LNCS, vol. 2460, pp. 426\u2013441. Springer, Heidelberg (2002)"},{"key":"45_CR28","first-page":"63","volume":"2003","author":"H Mouratidis","year":"2003","unstructured":"Mouratidis, H., Giorgini, P., Gordon, A., Manson, G.A.: Integrating security and systems engineering: towards the modelling of secure information systems. CAiSE 2003, 63\u201378 (2003)","journal-title":"CAiSE"},{"key":"45_CR29","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"412","DOI":"10.1007\/3-540-45800-X_32","volume-title":"\u00abUML\u00bb 2002 - The Unified Modeling Language. Model Engineering, Concepts, and Tools","author":"J J\u00fcrjens","year":"2002","unstructured":"J\u00fcrjens, J.: UMLsec: extending UML for secure systems development. In: J\u00e9z\u00e9quel, J.-M., Hussmann, H., Cook, S. (eds.) UML 2002. LNCS, vol. 2460, pp. 412\u2013425. Springer, Heidelberg (2002)"},{"key":"45_CR30","series-title":"Communications in Computer and Information Science","first-page":"1","volume-title":"Cloud Computing and Services Science (selected best papers)","author":"T Humberg","year":"2014","unstructured":"Humberg, T., Wessel, C., Poggenpohl, D., Wenzel, S., Ruhroth, T., J\u00a8urjens, j: Using ontologies to analyze compliance requirements of cloud-based processes. In: Helfert, M., Desprez, F., Ferguson, D., Leymann, F. (eds.) CLOSER 2013. CCIS, vol. 453, pp. 1\u201316. Springer, Heidelberg (2014)"},{"key":"45_CR31","unstructured":"Wenzel, S., Wessel, C., Humberg, T., J\u00fcrjens, J.: Securing processes for outsourcing into the cloud. In: 2nd International Conference on Cloud Computing and Services Science. SciTePress (2012)"}],"container-title":["Lecture Notes in Business Information Processing","Advanced Information Systems Engineering Workshops"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-19243-7_45","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,6,8]],"date-time":"2020-06-08T00:13:47Z","timestamp":1591575227000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-19243-7_45"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319192420","9783319192437"],"references-count":31,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-19243-7_45","relation":{},"ISSN":["1865-1348","1865-1356"],"issn-type":[{"type":"print","value":"1865-1348"},{"type":"electronic","value":"1865-1356"}],"subject":[],"published":{"date-parts":[[2015]]},"assertion":[{"value":"27 May 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}