{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T21:58:19Z","timestamp":1725832699174},"publisher-location":"Cham","reference-count":50,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319261478"},{"type":"electronic","value":"9783319261485"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-26148-5_38","type":"book-chapter","created":{"date-parts":[[2015,10,14]],"date-time":"2015-10-14T05:50:57Z","timestamp":1444801857000},"page":"557-574","source":"Crossref","is-referenced-by-count":2,"title":["All You Need is Trust \u2013 An Analysis of Trust Measures Communicated by Cloud Providers"],"prefix":"10.1007","author":[{"given":"Julian","family":"Gantner","sequence":"first","affiliation":[]},{"given":"Lukas","family":"Demetz","sequence":"additional","affiliation":[]},{"given":"Ronald","family":"Maier","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,10,28]]},"reference":[{"key":"38_CR1","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1016\/j.future.2008.12.001","volume":"25","author":"R Buyya","year":"2009","unstructured":"Buyya, R., Yeo, C.S., Venugopal, S., Broberg, J., Brandic, I.: Cloud Computing and Emerging IT Platforms: Vision, Hype, and Reality for Delivering Computing as the 5th Utility. Future Generation Computer Systems 25, 17 (2009)","journal-title":"Future Generation Computer Systems"},{"key":"38_CR2","doi-asserted-by":"crossref","unstructured":"Mell, P., Grance, T.: The NIST Definition of Cloud Computing. National Institute of Standards and Technology (2011)","DOI":"10.6028\/NIST.SP.800-145"},{"key":"38_CR3","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1109\/MSP.2010.186","volume":"8","author":"H Takabi","year":"2010","unstructured":"Takabi, H., Joshi, J.B.D., Ahn, G.-J.: Security and Privacy Challenges in Cloud Computing Environments. IEEE Security & Privacy Magazine 8, 24\u201331 (2010)","journal-title":"IEEE Security & Privacy Magazine"},{"key":"38_CR4","unstructured":"Forbes (2014). \n                      http:\/\/www.forbes.com\/sites\/tjmccue\/2014\/01\/29\/cloud-computing-united-states-businesses-will-spend-13-billion-on-it\/"},{"key":"38_CR5","unstructured":"Bartels, A., Rymer, J.R., Staten, J., Kark, K., Clark, J., Whittaker, D.: The Public Cloud Market Is Now In Hypergrowth (2014). \n                      https:\/\/www.forrester.com\/The+Public+Cloud+Market+Is+Now+In+Hypergrowth\/fulltext\/-\/E-RES113365?intcmp=blog:forrlink"},{"key":"38_CR6","doi-asserted-by":"publisher","first-page":"339","DOI":"10.1007\/s12599-014-0351-3","volume":"6","author":"M Nofer","year":"2014","unstructured":"Nofer, M., Hinz, O., Muntermann, J., Ro\u00dfnagel, H.: The Economic Impact of Privacy Violations and Security Breaches. Business & Information Systems Engineering 6, 339\u2013348 (2014)","journal-title":"Business & Information Systems Engineering"},{"key":"38_CR7","doi-asserted-by":"crossref","unstructured":"Ko, R.K.L., Jagadpramana, P., Mowbray, M., Pearson, S., Kirchberg, M., Liang, Q., Lee, B.S.: Trustcloud: a framework for accountability and trust in cloud computing. In: Proceedings of the 2011 IEEE World Congress on Services (SERVICES), pp. 584\u2013588 (2011)","DOI":"10.1109\/SERVICES.2011.91"},{"key":"38_CR8","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1109\/MSP.2009.87","volume":"7","author":"LM Kaufman","year":"2009","unstructured":"Kaufman, L.M.: Data Security in the World of Cloud Computing. IEEE Security and Privacy 7, 61\u201364 (2009)","journal-title":"IEEE Security and Privacy"},{"key":"38_CR9","doi-asserted-by":"publisher","first-page":"38","DOI":"10.1016\/j.cose.2013.11.002","volume":"40","author":"D Bachlechner","year":"2014","unstructured":"Bachlechner, D., Thalmann, S., Maier, R.: Security and Compliance Challenges in Complex IT Outsourcing Arrangements: A Multi-stakeholder Perspective. Computers and Security 40, 38\u201359 (2014)","journal-title":"Computers and Security"},{"key":"38_CR10","doi-asserted-by":"publisher","first-page":"574","DOI":"10.2307\/2393868","volume":"41","author":"SL Robinson","year":"1996","unstructured":"Robinson, S.L.: Trust and Breach of the Psychological Contract. Administrative Science Quarterly 41, 574\u2013599 (1996)","journal-title":"Administrative Science Quarterly"},{"key":"38_CR11","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1037\/0003-066X.35.1.1","volume":"35","author":"JB Rotter","year":"1980","unstructured":"Rotter, J.B.: Interpersonal Trust, Trustworthiness, and Gullibility. American Psychologist 35, 1\u20137 (1980)","journal-title":"American Psychologist"},{"key":"38_CR12","doi-asserted-by":"publisher","first-page":"20","DOI":"10.2307\/1252308","volume":"58","author":"RM Morgan","year":"1994","unstructured":"Morgan, R.M., Hunt, S.D.: The Commitment-Trust Theory of Relationship Marketing. Journal of Marketing 58, 20\u201338 (1994)","journal-title":"Journal of Marketing"},{"key":"38_CR13","unstructured":"Kong, W.C., Hung, Y.T.C.: Modeling initial and repeat online trust in B2C e-commerce. In: Proceedings of the 39th Annual Hawaii International Conference on System Sciences (HICSS 2006) (2006)"},{"key":"38_CR14","doi-asserted-by":"publisher","first-page":"93","DOI":"10.1108\/13552550310476184","volume":"9","author":"P Durkan","year":"2003","unstructured":"Durkan, P., Durkin, M., Gillen, J.: Exploring Efforts to Engender On-line Trust. Entrepreneurial Behaviour and Research 9, 93\u2013110 (2003)","journal-title":"Entrepreneurial Behaviour and Research"},{"key":"38_CR15","doi-asserted-by":"publisher","first-page":"8","DOI":"10.1145\/503345.503347","volume":"31","author":"GJ Walters","year":"2001","unstructured":"Walters, G.J.: Privacy and Security: An Ethical Analysis. Computers and Society 31, 8\u201323 (2001)","journal-title":"Computers and Society"},{"key":"38_CR16","doi-asserted-by":"publisher","first-page":"737","DOI":"10.1016\/S1071-5819(03)00041-7","volume":"58","author":"CL Corritore","year":"2003","unstructured":"Corritore, C.L., Kracher, B., Wiedenbeck, S.: On-line Trust: Concepts, Evolving Themes, a Model. International Journal of Human Computer Studies 58, 737\u2013758 (2003)","journal-title":"International Journal of Human Computer Studies"},{"key":"38_CR17","doi-asserted-by":"publisher","first-page":"38","DOI":"10.1109\/MIC.2010.83","volume":"14","author":"J Huang","year":"2010","unstructured":"Huang, J., Nicol, D.: A Formal-Semantics-based Calculus of Trust. IEEE Internet Computing 14, 38\u201346 (2010)","journal-title":"IEEE Internet Computing"},{"key":"38_CR18","unstructured":"Gambetta, D.: Can We Trust Trust? In: Gambetta, D. (ed.) Trust: Making and Breaking Cooperative Relations\u00a0213\u2013237 (2000)"},{"key":"38_CR19","doi-asserted-by":"crossref","first-page":"709","DOI":"10.5465\/amr.1995.9508080335","volume":"20","author":"RC Mayer","year":"1995","unstructured":"Mayer, R.C., Davis, J.H., Schoorman, F.D.: An Integrative Model of Organizational Trust. Academy of Management Review 20, 709\u2013734 (1995)","journal-title":"Academy of Management Review"},{"key":"38_CR20","doi-asserted-by":"crossref","first-page":"75","DOI":"10.1080\/10864415.2001.11044227","volume":"6","author":"MKO Lee","year":"2001","unstructured":"Lee, M.K.O., Turban, E.: A Trust Model for Consumer Internet Shopping. International Journal of Electronic Commerce 6, 75\u201391 (2001)","journal-title":"International Journal of Electronic Commerce"},{"key":"38_CR21","doi-asserted-by":"publisher","first-page":"123","DOI":"10.1177\/001872676001300202","volume":"13","author":"M Deutsch","year":"1960","unstructured":"Deutsch, M.: The Effect of Motivational Orientation upon Trust and Suspicion. Human Relations 13, 123\u2013139 (1960)","journal-title":"Human Relations"},{"key":"38_CR22","doi-asserted-by":"publisher","first-page":"313","DOI":"10.1108\/10662249810231050","volume":"8","author":"P Ratnasingham","year":"1998","unstructured":"Ratnasingham, P.: The Importance of Trust in Electronic Commerce. Internet Research 8, 313\u2013321 (1998)","journal-title":"Internet Research"},{"key":"38_CR23","unstructured":"McKnight, D.H., Chervany, N.L.: Conceptualizing trust: a typology and e-commerce customer relationships model. In: Proceedings of the 34th Annual Hawaii International Conference on System Sciences (HICSS 2001) (2001)"},{"key":"38_CR24","doi-asserted-by":"publisher","first-page":"544","DOI":"10.1016\/j.dss.2007.07.001","volume":"44","author":"DJ Kim","year":"2008","unstructured":"Kim, D.J., Ferrin, D.L., Rao, H.R.: A Trust-Based Consumer Decision-Making Model in Electronic Commerce: The Role of Trust, Perceived Risk, and their Antecedents. Decision Support Systems 44, 544\u2013564 (2008)","journal-title":"Decision Support Systems"},{"key":"38_CR25","doi-asserted-by":"crossref","first-page":"211","DOI":"10.1080\/07421222.2002.11045715","volume":"19","author":"A Bhattacherjee","year":"2002","unstructured":"Bhattacherjee, A.: Individual Trust in Online Firms: Scale Development and Initial Test. Journal of Management Information Systems 19, 211\u2013241 (2002)","journal-title":"Journal of Management Information Systems"},{"key":"38_CR26","doi-asserted-by":"publisher","first-page":"38","DOI":"10.1145\/569905.569910","volume":"33","author":"D Gefen","year":"2002","unstructured":"Gefen, D.: Reflections on the Dimensions of Trust and Trustworthiness among Online Consumers. ACM SIGMIS Database 33, 38\u201353 (2002)","journal-title":"ACM SIGMIS Database"},{"key":"38_CR27","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1145\/1721654.1721672","volume":"53","author":"B Armbrust","year":"2010","unstructured":"Armbrust, B., Griffith, R., Joseph, A.D., Katz, R., Konwinski, A., Lee, G., Patterson, D., Rabkin, A.: A View of Cloud Computing. Communications of the ACM 53, 50\u201358 (2010)","journal-title":"Communications of the ACM"},{"key":"38_CR28","doi-asserted-by":"publisher","first-page":"62","DOI":"10.1145\/1735223.1735242","volume":"53","author":"D Durkee","year":"2010","unstructured":"Durkee, D.: Why Cloud Computing will never be Free. Communications of the ACM 53, 62\u201369 (2010)","journal-title":"Communications of the ACM"},{"key":"38_CR29","doi-asserted-by":"publisher","first-page":"1","DOI":"10.2307\/1252265","volume":"58","author":"S Ganesan","year":"1994","unstructured":"Ganesan, S.: Determinants of Long-term Orientation in Buyer-Seller Relationships. Journal of Marketing 58, 1\u201319 (1994)","journal-title":"Journal of Marketing"},{"key":"38_CR30","doi-asserted-by":"publisher","first-page":"179","DOI":"10.1016\/j.intmar.2009.03.001","volume":"23","author":"GL Urban","year":"2009","unstructured":"Urban, G.L., Amyx, C., Lorenzon, A.: Online Trust: State of the Art, New Frontiers, and Research Potential. Journal of Interactive Marketing 23, 179\u2013190 (2009)","journal-title":"Journal of Interactive Marketing"},{"key":"38_CR31","doi-asserted-by":"publisher","first-page":"20","DOI":"10.1109\/MITP.2010.128","volume":"12","author":"KM Khan","year":"2010","unstructured":"Khan, K.M., Malluhi, Q.: Establishing Trust in Cloud Computing. IT Professional 12, 20\u201327 (2010)","journal-title":"IT Professional"},{"key":"38_CR32","first-page":"24","volume":"4","author":"M Firdhous","year":"2012","unstructured":"Firdhous, M., Ghazali, O., Hassan, S.: Trust Management in Cloud Computing: A Critical Review. International Journal on Advances in ICT for Emerging Regions 4, 24\u201336 (2012)","journal-title":"International Journal on Advances in ICT for Emerging Regions"},{"key":"38_CR33","doi-asserted-by":"publisher","first-page":"583","DOI":"10.1016\/j.future.2010.12.006","volume":"28","author":"D Zissis","year":"2012","unstructured":"Zissis, D., Lekkas, D.: Addressing Cloud Computing Security Issues. Future Generation Computer Systems 28, 583\u2013592 (2012)","journal-title":"Future Generation Computer Systems"},{"key":"38_CR34","unstructured":"Talkin\u2019Cloud (2014). \n                      http:\/\/talkincloud.com\/TC100\/talkin-cloud-100-2014-edition-ranked-1-25"},{"key":"38_CR35","unstructured":"Sandelowski, M., Holditch-David, D., Harris, B.G.: Using Qualitative and Quantitative Methods: The Transition to Parenthood of Infertile Couples, pp. 301-323. Sage Publications, London (1992)"},{"key":"38_CR36","unstructured":"Holsti, O.R.: Content Analysis for the Social Sciences and Humanities. Addison-Wesley Pub. Co. (1969)"},{"key":"38_CR37","volume-title":"Qualitative Research in the Study of Leadership","author":"K Klenke","year":"2008","unstructured":"Klenke, K.: Qualitative Research in the Study of Leadership. Emerald Group Publishing, Bingley (2008)"},{"key":"38_CR38","unstructured":"Google: How Google handles your data (2014). \n                      https:\/\/support.google.com\/googleforwork\/answer\/6057301?hl=us"},{"key":"38_CR39","unstructured":"Microsoft: Protecting Data and Privacy in the Cloud (2014). \n                      http:\/\/azure.microsoft.com\/en-us\/support\/trust-center\/resources\/"},{"key":"38_CR40","unstructured":"salesforce.com: Secure, private, and trustworthy: enterprise cloud computing with Force.com (2010). \n                      http:\/\/www.salesforce.com\/assets\/pdf\/misc\/WP_Forcedotcom-Security.pdf"},{"key":"38_CR41","unstructured":"Microsoft: Microsoft Azure Privacy Statement (2014). \n                      http:\/\/www.microsoft.compPrivacy\/principles.aspx"},{"key":"38_CR42","unstructured":"salesforce.com: Salesforce Privacy Statement (2014). \n                      http:\/\/www.salesforce.com\/company\/privacy\/full_privacy.jsp"},{"key":"38_CR43","unstructured":"Amazon.com: Amazon Web Services: Overview of Security Processes (2014). \n                      http:\/\/media.amazonwebservices.com\/pdf\/AWS_Security_Whitepaper.pdf"},{"key":"38_CR44","unstructured":"Microsoft: Windows Azure Privacy Overview (2014). \n                      http:\/\/azure.microsoft.com\/en-us\/support\/trust-center\/resources\/"},{"key":"38_CR45","unstructured":"Amazon.com: AWS Customer Agreement (2012). \n                      http:\/\/aws.amazon.com\/de\/agreement\/"},{"key":"38_CR46","unstructured":"Google: Google\u2019s Approach to IT Security - A Google Whitepaper (2012). \n                      https:\/\/cloud.google.com\/files\/Google-CommonSecurity-WhitePaper-v1.4.pdf"},{"key":"38_CR47","unstructured":"salesforce.com: Salesforce Security, Privacy and Architecture Documentation (2014). \n                      https:\/\/help.salesforce.com\/apex\/HTViewSolution?urlname=Salesforce-Services-Trust-and-Compliance-Documentation&language=en_US"},{"key":"38_CR48","unstructured":"Microsoft: Security, Privacy, and Compliance in Microsoft Azure (2014). \n                      http:\/\/azure.microsoft.com\/en-us\/support\/trust-center\/resources\/"},{"key":"38_CR49","unstructured":"Amazon.com: AWS Case Study: HTC (2014). \n                      http:\/\/aws.amazon.com\/solutions\/case-studies\/htc\/"},{"key":"38_CR50","unstructured":"salesforce.com: Salesforce Case Study: Stanley Black and Decker (2014). \n                      http:\/\/www.salesforce.com\/customers\/"}],"container-title":["Lecture Notes in Computer Science","On the Move to Meaningful Internet Systems: OTM 2015 Conferences"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-26148-5_38","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,31]],"date-time":"2019-05-31T05:59:01Z","timestamp":1559282341000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-26148-5_38"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319261478","9783319261485"],"references-count":50,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-26148-5_38","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]}}}