{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T21:58:03Z","timestamp":1725832683731},"publisher-location":"Cham","reference-count":19,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319261478"},{"type":"electronic","value":"9783319261485"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-26148-5_42","type":"book-chapter","created":{"date-parts":[[2015,10,14]],"date-time":"2015-10-14T05:50:57Z","timestamp":1444801857000},"page":"620-638","source":"Crossref","is-referenced-by-count":2,"title":["Design and Implementation of a Trust Service for the Cloud"],"prefix":"10.1007","author":[{"given":"Julien","family":"Lacroix","sequence":"first","affiliation":[]},{"given":"Omar","family":"Boucelma","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,10,28]]},"reference":[{"issue":"4","key":"42_CR1","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1145\/1713254.1713258","volume":"43","author":"K-K Muniswamy-Reddy","year":"2009","unstructured":"Muniswamy-Reddy, K.-K., Seltzer, M.I.: Provenance as first class cloud data. Operating Systems Review 43(4), 11\u201316 (2009)","journal-title":"Operating Systems Review"},{"key":"42_CR2","unstructured":"Moreau, L., Missier, P. (eds.): PROV-DM: The PROV Data Model. W3C Recommendation (2013)"},{"key":"42_CR3","unstructured":"Li, Y., Boucelma, O.: A CPN provenance model of workflow: towards diagnosis in the cloud. In: ADBIS (2), pp. 55-64 (2011)"},{"key":"42_CR4","doi-asserted-by":"crossref","unstructured":"Park, J., Nguyen, D., Sandhu, R.: A provenance-based access control model. In: Proceedings of the 10th Annual International Conference on Privacy, Security and Trust (PST 2012) (2012)","DOI":"10.1109\/PST.2012.6297930"},{"key":"42_CR5","doi-asserted-by":"crossref","unstructured":"Lacroix, J., Boucelma, O.: Trusting the cloud: a PROV + RBAC approach. In: Proceedings of the 7th IEEE International Conference on Cloud Computing (CLOUD 2014) (2014)","DOI":"10.1109\/CLOUD.2014.92"},{"key":"42_CR6","doi-asserted-by":"crossref","unstructured":"Ali, M., Moreau, L.: A provenance-aware policy language (cProvl) and a data traceability model (cProv) for the cloud. In: Proceedings of the 2013 IEEE 3rd International Conference on Cloud and Green Computing (CGC 2013) (2013)","DOI":"10.1109\/CGC.2013.81"},{"key":"42_CR7","unstructured":"Singh, M.P.: Towards a science of security. In: Presented keynote 4 at the 7th IEEE International Conference on Cloud Computing (CLOUD 2014) (2014)"},{"key":"42_CR8","unstructured":"Dahl, R.L., et al.: Node.js (2010). \n                      https:\/\/nodejs.org\/"},{"key":"42_CR9","unstructured":"Moreau, L.: ProvTranslator REST API (2013). \n                      https:\/\/provenance.ecs.soton.ac.uk\/validator\/view\/api.html"},{"key":"42_CR10","unstructured":"Jewell, M.O., Keshavarz, A.S., Michaelides, D.T., Yang, H., Moreau, L.: The PROV-JSON Serialization - W3C Member Submission (2014). \n                      https:\/\/provenance.ecs.soton.ac.uk\/prov-json\/"},{"key":"42_CR11","doi-asserted-by":"crossref","unstructured":"Moreau, L., Clifford, B., Freire, J., Futrelle, J., Gil, Y., Groth, P., Kwasnikowska, N., Miles, S., Missier, P., Myers, J., Plale, B., Simmhan, Y., Stephan, E., den Bussche, J.V.: The open provenance model core specification (v1.1). Future Generation Computer Systems (2010)","DOI":"10.1016\/j.future.2010.07.005"},{"key":"42_CR12","unstructured":"Lebo, T., Sahoo, S., McGuinness, D., (eds.): PROV-O: The PROV Ontology. W3C Recommendation (2013)"},{"key":"42_CR13","unstructured":"Goble, C., et al.: Taverna (2009). \n                      http:\/\/www.taverna.org.uk"},{"key":"42_CR14","unstructured":"Cheney, J., Missier, P., Moreau, L., (eds.): Constraints of the PROV Data Model. W3C Recommendation (2013)"},{"key":"42_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"291","DOI":"10.1007\/978-3-642-54804-8_20","volume-title":"Fundamental Approaches to Software Engineering","author":"L Moreau","year":"2014","unstructured":"Moreau, L., Huynh, T.D., Michaelides, D.: An online validator for provenance: algorithmic design, testing, and API. In: Gnesi, S., Rensink, A. (eds.) FASE 2014 (ETAPS). LNCS, vol. 8411, pp. 291\u2013305. Springer, Heidelberg (2014)"},{"key":"42_CR16","unstructured":"Cheney, J., Soiland-Reyes, S.: PROV-N: The Provenance Notation. W3C Recommendation (2013)"},{"key":"42_CR17","unstructured":"De Nies, T., Magliacane, S., Verborgh, R., Coppens, S., Groth, P., Mannens, E., Van de Walle, R.: Git2PROV: exposing version control system content as W3C PROV. In: Poster and Demo Proceedings of the 12th International Semantic Web Conference (2013)"},{"key":"42_CR18","doi-asserted-by":"crossref","unstructured":"Sun, L., Park, J., Sandhu, R.: Engineering access control policies for provenance-aware systems. In: Proceedings of the third ACM conference on Data and application security and privacy (CODASPY 2013) (2013)","DOI":"10.1145\/2435349.2435390"},{"issue":"5","key":"42_CR19","doi-asserted-by":"publisher","first-page":"1357","DOI":"10.4304\/jcp.8.5.1357-1365","volume":"8","author":"G Lin","year":"2013","unstructured":"Lin, G., Bie, Y., Lei, M.: Trust Based Access Control Policy in Multi-domain of Cloud Computing. Journal of Computers 8(5), 1357 (2013)","journal-title":"Journal of Computers"}],"container-title":["Lecture Notes in Computer Science","On the Move to Meaningful Internet Systems: OTM 2015 Conferences"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-26148-5_42","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,31]],"date-time":"2019-05-31T05:57:04Z","timestamp":1559282224000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-26148-5_42"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319261478","9783319261485"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-26148-5_42","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]}}}