{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T15:02:51Z","timestamp":1742914971210,"version":"3.40.3"},"publisher-location":"Cham","reference-count":15,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319228846"},{"type":"electronic","value":"9783319228853"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-22885-3_35","type":"book-chapter","created":{"date-parts":[[2015,9,1]],"date-time":"2015-09-01T09:57:08Z","timestamp":1441101428000},"page":"392-398","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Monitoring and Checking Privacy Policies of Cloud Services Based on Models"],"prefix":"10.1007","author":[{"given":"Eric","family":"Schmieders","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,9,2]]},"reference":[{"key":"35_CR1","unstructured":"Comparative analysis of access control systems on cloud. In: International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel Distributed Computing"},{"issue":"9","key":"35_CR2","doi-asserted-by":"publisher","first-page":"2093","DOI":"10.1016\/j.comnet.2013.04.001","volume":"57","author":"G Aceto","year":"2013","unstructured":"Aceto, G., Botta, A., de Donato, W., Pescap, A.: Cloud monitoring: a survey. Comput. Netw. 57(9), 2093\u20132115 (2013)","journal-title":"Comput. Netw."},{"key":"35_CR3","doi-asserted-by":"crossref","unstructured":"Brosig, F., Huber, N., Kounev, S.: Automated extraction of architecture-level performance models of distributed component-based systems. In: 26th IEEE\/ACM International Conference on Automated Software Engineering (ASE) (2011)","DOI":"10.1109\/ASE.2011.6100052"},{"key":"35_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"429","DOI":"10.1007\/978-3-642-45005-1_31","volume-title":"Service-Oriented Computing","author":"G Copil","year":"2013","unstructured":"Copil, G., Moldovan, D., Truong, H.-L., Dustdar, S.: Multi-level elasticity control of cloud services. In: Basu, S., Pautasso, C., Zhang, L., Fu, X. (eds.) ICSOC 2013. LNCS, vol. 8274, pp. 429\u2013436. Springer, Heidelberg (2013)"},{"key":"35_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"139","DOI":"10.1007\/978-3-642-12029-9_10","volume-title":"Fundamental Approaches to Software Engineering","author":"H Ehrig","year":"2010","unstructured":"Ehrig, H., Ermel, C., Runge, O., Bucchiarone, A., Pelliccione, P.: Formal analysis and verification of self-healing systems. In: Rosenblum, D.S., Taentzer, G. (eds.) FASE 2010. LNCS, vol. 6013, pp. 139\u2013153. Springer, Heidelberg (2010)"},{"key":"35_CR6","doi-asserted-by":"crossref","unstructured":"Epifani, I., Ghezzi, C., Mirandola, R., Tamburrelli, G.: Model evolution by run-time parameter adaptation. In: 31st ICSE (2009)","DOI":"10.1109\/ICSE.2009.5070513"},{"key":"35_CR7","unstructured":"Jung, R., Heinrich, R., Schmieders, E.: Model-driven instrumentation with kieker and palladio to forecast dynamic applications. In: Symposium on Software Performance: Joint Kieker\/Palladio Days 2013. CEUR (2013)"},{"key":"35_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"43","DOI":"10.1007\/978-3-642-23798-0_5","volume-title":"Software Architecture","author":"R von Massow","year":"2011","unstructured":"von Massow, R., van Hoorn, A., Hasselbring, W.: Performance simulation of runtime reconfigurable component-based software architectures. In: Crnkovic, I., Gruhn, V., Book, M. (eds.) ECSA 2011. LNCS, vol. 6903, pp. 43\u201358. Springer, Heidelberg (2011)"},{"key":"35_CR9","doi-asserted-by":"crossref","unstructured":"Park, S., Chung, S.: Privacy-preserving attribute distribution mechanism for access control in a grid. In: 21st International Conference on Tools with Artificial Intelligence, ICTAI 2009 (2009)","DOI":"10.1109\/ICTAI.2009.128"},{"key":"35_CR10","doi-asserted-by":"publisher","first-page":"307","DOI":"10.1007\/978-3-642-12544-7_17","volume-title":"Intentional Perspectives on Information Systems Engineering","author":"B Pernici","year":"2010","unstructured":"Pernici, B.: Methodologies for design of service-based systems. In: Nurcan, S., Salinesi, C., Souveyet, C., Ralyt, J. (eds.) Intentional Perspectives on Information Systems Engineering, pp. 307\u2013318. Springer, Heidelberg (2010)"},{"key":"35_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"501","DOI":"10.1007\/978-3-642-24485-8_37","volume-title":"Model Driven Engineering Languages and Systems","author":"AJ Ramirez","year":"2011","unstructured":"Ramirez, A.J., Cheng, B.H.C.: Automatic derivation of utility functions for monitoring software requirements. In: Whittle, J., Clark, T., K\u00fchne, T. (eds.) MODELS 2011. LNCS, vol. 6981, pp. 501\u2013516. Springer, Heidelberg (2011)"},{"key":"35_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"194","DOI":"10.1007\/978-3-642-24755-2_19","volume-title":"Towards a Service-Based Internet","author":"E Schmieders","year":"2011","unstructured":"Schmieders, E., Metzger, A.: Preventing performance violations of service compositions using assumption-based run-time verification. In: Abramowicz, W., Llorente, I.M., Surridge, M., Zisman, A., Vayssi\u00e8re, J. (eds.) ServiceWave 2011. LNCS, vol. 6994, pp. 194\u2013205. Springer, Heidelberg (2011)"},{"key":"35_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"306","DOI":"10.1007\/978-3-662-45391-9_21","volume-title":"Service-Oriented Computing","author":"E Schmieders","year":"2014","unstructured":"Schmieders, E., Metzger, A., Pohl, K.: A runtime model approach for data geo-location checks of cloud services. In: Franch, X., Ghose, A.K., Lewis, G.A., Bhiri, S. (eds.) ICSOC 2014. LNCS, vol. 8831, pp. 306\u2013320. Springer, Heidelberg (2014)"},{"key":"35_CR14","doi-asserted-by":"crossref","unstructured":"Suleiman, B., Venugopal, S.: Modeling performance of elasticity rules for cloud-based applications. In: 2013 17th IEEE International Enterprise Distributed Object Computing Conference (EDOC), September 2013","DOI":"10.1109\/EDOC.2013.31"},{"key":"35_CR15","doi-asserted-by":"crossref","unstructured":"Wu, E., Diao, Y., Rizvi, S.: High-performance complex event processing over streams. In: Proceedings of the 2006 ACM SIGMOD International Conference on Management of Data, SIGMOD 2006, pp. 407\u2013418. ACM, New York (2006)","DOI":"10.1145\/1142473.1142520"}],"container-title":["Lecture Notes in Computer Science","Service-Oriented Computing - ICSOC 2014 Workshops"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-22885-3_35","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,15]],"date-time":"2023-02-15T15:32:20Z","timestamp":1676475140000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-22885-3_35"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319228846","9783319228853"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-22885-3_35","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]},"assertion":[{"value":"2 September 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}