{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,30]],"date-time":"2025-12-30T03:33:28Z","timestamp":1767065608761,"version":"3.40.3"},"publisher-location":"Cham","reference-count":30,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319295817"},{"type":"electronic","value":"9783319295824"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-29582-4_3","type":"book-chapter","created":{"date-parts":[[2016,2,2]],"date-time":"2016-02-02T11:06:17Z","timestamp":1454411177000},"page":"38-57","source":"Crossref","is-referenced-by-count":3,"title":["Accountability Through Transparency for Cloud Customers"],"prefix":"10.1007","author":[{"given":"Martin Gilje","family":"Jaatun","sequence":"first","affiliation":[]},{"given":"Daniela S.","family":"Cruzes","sequence":"additional","affiliation":[]},{"given":"Julio","family":"Angulo","sequence":"additional","affiliation":[]},{"given":"Simone","family":"Fischer-H\u00fcbner","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,2,3]]},"reference":[{"key":"3_CR1","doi-asserted-by":"publisher","first-page":"245","DOI":"10.1016\/j.giq.2010.01.002","volume":"27","author":"S Paquette","year":"2010","unstructured":"Paquette, S., Jaeger, P.T., Wilson, S.C.: Identifying the security risks associated with governmental use of cloud computing. Gov. Inf. Q. 27, 245\u2013253 (2010)","journal-title":"Gov. Inf. Q."},{"key":"3_CR2","doi-asserted-by":"publisher","first-page":"e67","DOI":"10.2196\/jmir.1867","volume":"13","author":"AM Kuo","year":"2011","unstructured":"Kuo, A.M.: Opportunities and challenges of cloud computing to improve health care services. J. Med. Internet Res. 13, e67 (2011)","journal-title":"J. Med. Internet Res."},{"key":"3_CR3","unstructured":"Gavrilov, G., Trajkovik, V.: Security and privacy issues and requirements for healthcare cloud computing. In: Proceedings of the ICT Innovations (2012)"},{"key":"3_CR4","doi-asserted-by":"publisher","first-page":"621","DOI":"10.3390\/fi4030621","volume":"4","author":"E AbuKhousa","year":"2012","unstructured":"AbuKhousa, E., Mohamed, N., Al-Jaroodi, J.: e-health cloud: opportunities and challenges. Future Internet 4, 621 (2012)","journal-title":"Future Internet"},{"key":"3_CR5","doi-asserted-by":"publisher","first-page":"e186","DOI":"10.2196\/jmir.2494","volume":"15","author":"JJ Rodrigues","year":"2013","unstructured":"Rodrigues, J.J., de la Torre, I., Fernandez, G., Lopez-Coronado, M.: Analysis of the security and privacy requirements of cloud-based electronic health records systems. J. Med. Internet Res. 15, e186 (2013)","journal-title":"J. Med. Internet Res."},{"key":"3_CR6","first-page":"12","volume":"1","author":"SP Ahuja","year":"2012","unstructured":"Ahuja, S.P., Mani, S., Zambrano, J.: A survey of the state of cloud computing in healthcare. Netw. Commun. Technol. 1, 12\u201319 (2012)","journal-title":"Netw. Commun. Technol."},{"key":"3_CR7","doi-asserted-by":"crossref","unstructured":"Felici, M., Koulouris, T., Pearson, S.: Accountability for data governance in cloud ecosystems. In: 2013 IEEE 5th International Conference on Cloud Computing Technology and Science (CloudCom), vol. 2, pp. 327\u2013332 (2013)","DOI":"10.1109\/CloudCom.2013.157"},{"key":"3_CR8","first-page":"35","volume":"31","author":"H Yang","year":"2012","unstructured":"Yang, H., Tate, M.: A descriptive literature review and classification of cloud computing research. Commun. Assoc. Inf. Syst. 31, 35\u201360 (2012)","journal-title":"Commun. Assoc. Inf. Syst."},{"key":"3_CR9","series-title":"Computer Communications and Networks","doi-asserted-by":"publisher","first-page":"271","DOI":"10.1007\/978-1-84996-241-4_16","volume-title":"Cloud Computing","author":"C Onwubiko","year":"2010","unstructured":"Onwubiko, C.: Security issues to cloud computing. In: Antonopoulos, N., Gillam, L. (eds.) Cloud Computing. Computer Communications and Networks, pp. 271\u2013288. Springer, London (2010)"},{"key":"3_CR10","doi-asserted-by":"publisher","first-page":"833","DOI":"10.1016\/j.future.2012.01.006","volume":"28","author":"MT Khorshed","year":"2012","unstructured":"Khorshed, M.T., Ali, A.S., Wasimi, S.A.: A survey on gaps, threat remediation challenges and some thoughts for proactive attack detection in cloud computing. Future Gener. Comput. Syst. 28, 833\u2013851 (2012). Including Special sections SS: Volunteer Computing and Desktop Grids and SS: Mobile Ubiquitous Computing","journal-title":"Future Gener. Comput. Syst."},{"key":"3_CR11","doi-asserted-by":"publisher","first-page":"62","DOI":"10.1145\/1735223.1735242","volume":"53","author":"D Durkee","year":"2010","unstructured":"Durkee, D.: Why cloud computing will never be free. Commun. ACM 53, 62\u201369 (2010)","journal-title":"Commun. ACM"},{"key":"3_CR12","doi-asserted-by":"publisher","first-page":"32","DOI":"10.1109\/MSP.2010.140","volume":"8","author":"W Pauley","year":"2010","unstructured":"Pauley, W.: Cloud provider transparency: an empirical evaluation. IEEE Secur. Priv. 8, 32\u201339 (2010)","journal-title":"IEEE Secur. Priv."},{"key":"3_CR13","unstructured":"Bernsmed, K., Tountopoulos, V., Brigden, P., R\u00fcbsamen, T., Felici, M., Wainwright, N., Santana De Oliveira, A., Sendor, J., Sellami, M., Royer, J.C.: Consolidated use case report. A4Cloud Deliverable D23.2 (2014)"},{"key":"3_CR14","doi-asserted-by":"crossref","unstructured":"Jaatun, M.G., Pearson, S., Gittler, F., Leenes, R.: Towards strong accountability for cloud service providers. In: 2014 IEEE 6th International Conference on Cloud Computing Technology and Science (CloudCom), pp. 1001\u20131006 (2014)","DOI":"10.1109\/CloudCom.2014.123"},{"key":"3_CR15","doi-asserted-by":"crossref","unstructured":"Cruzes, D.S., Dyb\u00e5, T.: Recommended steps for thematic synthesis in software engineering. In: Proceedings of the ESEM 2011, pp. 275\u2013284 (2011)","DOI":"10.1109\/ESEM.2011.36"},{"key":"3_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"319","DOI":"10.1007\/978-3-319-17016-9_21","volume-title":"Data Privacy Management, Autonomous Spontaneous Security, and Security Assurance","author":"M Azraoui","year":"2015","unstructured":"Azraoui, M., Elkhiyaoui, K., \u00d6nen, M., Bernsmed, K., De Oliveira, A.S., Sendor, J.: A-PPL: an accountability policy language. In: Garcia-Alfaro, J., Herrera-Joancomart\u00ed, J., Lupu, E., Posegga, J., Aldini, A., Martinelli, F., Suri, N. (eds.) DPM\/SETOP\/QASA 2014. LNCS, vol. 8872, pp. 319\u2013326. Springer, Heidelberg (2015)"},{"key":"3_CR17","doi-asserted-by":"crossref","unstructured":"Alnemr, R., Pearson, S., Leenes, R., Mhungu, R.: Coat: cloud offerings advisory tool. In: 2014 IEEE 6th International Conference on Cloud Computing Technology and Science (CloudCom), pp. 95\u2013100 (2014)","DOI":"10.1109\/CloudCom.2014.100"},{"key":"3_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"123","DOI":"10.1007\/978-3-642-32498-7_10","volume-title":"Multidisciplinary Research and Practice for Information Systems","author":"MG Jaatun","year":"2012","unstructured":"Jaatun, M.G., Bernsmed, K., Undheim, A.: Security SLAs \u2013 an idea whose time has come? In: Quirchmayr, G., Basl, J., You, I., Xu, L., Weippl, E. (eds.) CD-ARES 2012. LNCS, vol. 7465, pp. 123\u2013130. Springer, Heidelberg (2012)"},{"key":"3_CR19","unstructured":"Pulls, T.: Preserving privacy in transparency logging. Ph.D. thesis, Karlstad University Studies, vol. 28 (2015)"},{"key":"3_CR20","doi-asserted-by":"publisher","first-page":"245","DOI":"10.1007\/978-3-642-20317-6_13","volume-title":"Privacy and Identity Management for Life","author":"S Fischer-H\u00fcbner","year":"2011","unstructured":"Fischer-H\u00fcbner, S., Hedbom, H., W\u00e4stlund, E.: Trust and assurance HCI. In: Camenisch, J., Fischer-H\u00fcbner, S., Rannenberg, K. (eds.) Privacy and Identity Management for Life, pp. 245\u2013260. Springer, Heidelberg (2011)"},{"key":"3_CR21","doi-asserted-by":"crossref","unstructured":"Angulo, J., Fischer-H\u00fcbner, S., Pulls, T., W\u00e4stlund, E.: Usable transparency with the data track: a tool for visualizing data disclosures. In: Extended Abstracts in the Proceedings of the Conference on Human Factors in Computing Systems, CHI 2015, Seoul, Republic of Korea, pp. 1803\u20131808. ACM (2015)","DOI":"10.1145\/2702613.2732701"},{"key":"3_CR22","series-title":"IFIP Advances in Information and Communication Technology","doi-asserted-by":"publisher","first-page":"299","DOI":"10.1007\/978-3-642-14282-6_25","volume-title":"Privacy and Identity Management for Life","author":"H Hedbom","year":"2010","unstructured":"Hedbom, H., Pulls, T., Hj\u00e4rtquist, P., Lav\u00e9n, A.: Adding secure transparency logging to the PRIME core. In: Bezzi, M., Duquenoy, P., Fischer-H\u00fcbner, S., Hansen, M., Zhang, G. (eds.) IFIP AICT 320. IFIP AICT, vol. 320, pp. 299\u2013314. Springer, Heidelberg (2010)"},{"key":"3_CR23","series-title":"IFIP Advances in Information and Communication Technology","doi-asserted-by":"publisher","first-page":"67","DOI":"10.1007\/978-3-642-03315-5_5","volume-title":"The Future of Identity in the Information Society","author":"H Hedbom","year":"2009","unstructured":"Hedbom, H.: A survey on transparency tools for enhancing privacy. In: Maty\u00e1\u0161, V., Fischer-H\u00fcbner, S., Cvr\u010dek, D., \u0160venda, P. (eds.) The Future of Identity. IFIP AICT, vol. 298, pp. 67\u201382. Springer, Heidelberg (2009)"},{"key":"3_CR24","doi-asserted-by":"crossref","unstructured":"Pulls, T., Peeters, R., Wouters, K.: Distributed privacy-preserving transparency logging. In: Workshop on Privacy in the Electronic Society, WPES 2013, Berlin, Heidelberg, Germany, pp. 83\u201394 (2013)","DOI":"10.1145\/2517840.2517847"},{"key":"3_CR25","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"131","DOI":"10.1007\/978-3-642-29615-4_10","volume-title":"Information Security Technology for Applications","author":"E Kani-Zabihi","year":"2012","unstructured":"Kani-Zabihi, E., Helmhout, M.: Increasing service users\u2019 privacy awareness by introducing on-line interactive privacy features. In: Laud, P. (ed.) NordSec 2011. LNCS, vol. 7161, pp. 131\u2013148. Springer, Heidelberg (2012)"},{"key":"3_CR26","doi-asserted-by":"crossref","unstructured":"Kolter, J., Netter, M., Pernul, G.: Visualizing past personal data disclosures. In: ARES 2010 International Conference on Availability, Reliability, and Security. IEEE, pp. 131\u2013139 (2010)","DOI":"10.1109\/ARES.2010.51"},{"key":"3_CR27","unstructured":"Becker, H., Naaman, M., Gravano, L.: Beyond trending topics: real-world event identification on twitter. In: Proceedings of the Fifth International AAAI Conference on Weblogs and Social Media, ICWSM 2011 (2011)"},{"key":"3_CR28","first-page":"4","volume":"1","author":"LC Freeman","year":"2000","unstructured":"Freeman, L.C.: Visualizing social networks. J. Soc. Struct. 1, 4 (2000)","journal-title":"J. Soc. Struct."},{"key":"3_CR29","doi-asserted-by":"crossref","unstructured":"Kairam, S., MacLean, D., Savva, M., Heer, J.: Graphprism: compact visualization of network structure. In: Proceedings of the International Working Conference on Advanced Visual Interfaces, ACM, pp. 498\u2013505 (2012)","DOI":"10.1145\/2254556.2254651"},{"key":"3_CR30","unstructured":"Hon, W., Millard, C., Walden, I.: Negotiating cloud contracts - looking at clouds from both sides now. Stan. Tech. L. Rev. 81 (2012). Queen Mary School of Law Legal Studies Research Paper No. 117\/2012. \n                    https:\/\/journals.law.stanford.edu\/stanford-technology-law-review\/online\/negotiating-cloud-contracts-looking-clouds-both-sides-now\n                    \n                  , \n                    http:\/\/papers.ssrn.com\/sol3\/papers.cfm?abstract_id=2055199"}],"container-title":["Communications in Computer and Information Science","Cloud Computing and Services Science"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-29582-4_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T09:02:56Z","timestamp":1559379776000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-29582-4_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319295817","9783319295824"],"references-count":30,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-29582-4_3","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2016]]}}}