{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,11]],"date-time":"2025-06-11T04:13:18Z","timestamp":1749615198084,"version":"3.41.0"},"publisher-location":"Cham","reference-count":32,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319453897"},{"type":"electronic","value":"9783319453903"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-45390-3_18","type":"book-chapter","created":{"date-parts":[[2016,9,19]],"date-time":"2016-09-19T02:24:40Z","timestamp":1474251880000},"page":"200-211","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["A Confidence Indicator Model for Virtual Organization Creation in Cloud Computing Environment"],"prefix":"10.1007","author":[{"given":"Lu\u00eds Felipe","family":"Bilecki","sequence":"first","affiliation":[]},{"given":"Adriano","family":"Fiorese","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,9,20]]},"reference":[{"key":"18_CR1","doi-asserted-by":"publisher","first-page":"145","DOI":"10.1016\/j.ijpe.2013.10.003","volume":"148","author":"E Esposito","year":"2014","unstructured":"Esposito, E., Evangelista, P.: Investigating virtual enterprise models: literature review and empirical findings. Int. J. Prod. Econ. 148, 145\u2013157 (2014)","journal-title":"Int. J. Prod. Econ."},{"key":"18_CR2","doi-asserted-by":"publisher","first-page":"46","DOI":"10.1016\/j.cie.2008.11.024","volume":"57","author":"LM Camarinha-Matos","year":"2009","unstructured":"Camarinha-Matos, L.M., Afsarmanesh, H., Galeano, N., Molina, A.: Collaborative networked organizations \u2013 concepts and practice in manufacturing enterprises. Comput. Ind. Eng. 57, 46\u201360 (2009)","journal-title":"Comput. Ind. Eng."},{"key":"18_CR3","doi-asserted-by":"publisher","first-page":"203","DOI":"10.1007\/978-3-319-17906-3_9","volume":"87","author":"FSB de Lemos","year":"2015","unstructured":"de Lemos, F.S.B., Fiorese, A., Alves, O.C., Vieira Jr., R.G.: Using data envelopment analysis and fuzzy logic as intelligent risk-based decision making support for virtual organizations. Intell. Syst. Ref. Libr. 87, 203\u2013218 (2015)","journal-title":"Intell. Syst. Ref. Libr."},{"key":"18_CR4","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/978-0-387-35577-1_1","volume-title":"Infrastructures Virtual Enterprise","author":"LM Camarinha-Matos","year":"1999","unstructured":"Camarinha-Matos, L.M., Afsarmanesh, H.: The virtual enterprise concept. In: Camarinha-Matos, L.M., Afsarmanesh, H. (eds.) Infrastructures Virtual Enterprise, vol. 27, pp. 3\u201314. Springer, Heidelberg (1999)"},{"key":"18_CR5","unstructured":"Winkler, T.J., Haller, J., Gimpel, H., Weinhardt, C.: Trust indicator modeling for a reputation service in virtual organizations. In: Proceedings of the ECIS 2007, pp. 1584\u20131595 (2007)"},{"key":"18_CR6","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1016\/j.csi.2010.03.003","volume":"33","author":"AC Squicciarini","year":"2011","unstructured":"Squicciarini, A.C., Paci, F., Bertino, E.: Trust establishment in the formation of virtual organizations. Comput. Stand. Interfaces 33, 13\u201323 (2011)","journal-title":"Comput. Stand. Interfaces"},{"key":"18_CR7","doi-asserted-by":"crossref","unstructured":"Vieira, R.G., Alves-Junior, O.C., Rabelo, R.J., Fiorese, A.: A risk analysis method to support virtual organization partners\u2019 selection. Presented at the (2014)","DOI":"10.1007\/978-3-662-44745-1_59"},{"key":"18_CR8","doi-asserted-by":"publisher","first-page":"1012","DOI":"10.1016\/j.future.2012.06.006","volume":"29","author":"SK Garg","year":"2013","unstructured":"Garg, S.K., Versteeg, S., Buyya, R.: A framework for ranking of cloud computing services. Futur. Gener. Comput. Syst. 29, 1012\u20131023 (2013)","journal-title":"Futur. Gener. Comput. Syst."},{"key":"18_CR9","doi-asserted-by":"crossref","unstructured":"Sun, M., Zang, T., Xu, X., Wang, R.: Consumer-centered cloud services selection using AHP. In: 2013 International Conference on Service Sciences (ICSS), pp. 1\u20136 (2013)","DOI":"10.1109\/ICSS.2013.26"},{"key":"18_CR10","doi-asserted-by":"publisher","first-page":"149","DOI":"10.1504\/IJNVO.2013.053746","volume":"12","author":"OCA Junior","year":"2013","unstructured":"Junior, O.C.A., Rabelo, R.J.: A KPI model for logistics partners\u2019 search and suggestion to create virtual organisations. Int. J. Netw. Virtual Organ. 12, 149\u2013177 (2013)","journal-title":"Int. J. Netw. Virtual Organ."},{"key":"18_CR11","doi-asserted-by":"publisher","first-page":"367","DOI":"10.1016\/j.procs.2014.09.007","volume":"36","author":"BL Sadigh","year":"2014","unstructured":"Sadigh, B.L., Arikan, F., Ozbayoglu, M., Unver, H.O., Kilic, S.E.: A multi-agent system model for partner selection process in virtual enterprise. Procedia Comput. Sci. 36, 367\u2013372 (2014)","journal-title":"Procedia Comput. Sci."},{"key":"18_CR12","doi-asserted-by":"publisher","first-page":"1445","DOI":"10.1016\/j.pnsc.2008.03.030","volume":"18","author":"Q Zhao","year":"2008","unstructured":"Zhao, Q., Zhang, X., Xiao, R.: Particle swarm optimization algorithm for partner selection in virtual enterprise. Prog. Nat. Sci. 18, 1445\u20131452 (2008)","journal-title":"Prog. Nat. Sci."},{"key":"18_CR13","volume-title":"Towards a trust evaluation middleware for cloud service selection","author":"M Tang","year":"2016","unstructured":"Tang, M., Dai, X., Liu, J., Chen, J.: Towards a trust evaluation middleware for cloud service selection. Futur. Gener. Comput., Syst (2016)"},{"key":"18_CR14","doi-asserted-by":"crossref","unstructured":"Noor, T.H., Sheng, Q.Z., Ngu, A.H.H., Alfazi, A., Law, J.: Cloud armor: a platform for credibility-based trust management of cloud services. In: Proceedings of the 22nd ACM International Conference Information and Knowledge Management, pp. 2509\u20132512 (2013)","DOI":"10.1145\/2505515.2508204"},{"key":"18_CR15","doi-asserted-by":"crossref","unstructured":"Yau, S.S., Yin, Y.: QoS-based service ranking and selection for service-based systems. In: Proceedings of the 2011 IEEE International Conference on Services Computing, SCC 2011, pp. 56\u201363 (2011)","DOI":"10.1109\/SCC.2011.114"},{"key":"18_CR16","doi-asserted-by":"crossref","unstructured":"Liu, X., Fletcher, K.K., Tang, M.: Service selection based on personalized preference and trade-offs among QoS factors and price. In: Proceedings of the 2012 IEEE First International Conference on Services Economics, SE 2012, pp. 32\u201339 (2012)","DOI":"10.1109\/SE.2012.5"},{"key":"18_CR17","doi-asserted-by":"crossref","unstructured":"Mell, P.M., Grance, T.: SP 800-145. The NIST Definition of Cloud Computing. National Institute of Standards & Technology, Gaithersburg, MD, United States (2011)","DOI":"10.6028\/NIST.SP.800-145"},{"key":"18_CR18","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1109\/MIC.2010.86","volume":"14","author":"K Hwang","year":"2010","unstructured":"Hwang, K., Li, D.: Trusted cloud computing with secure resources and data coloring. IEEE Internet Comput. 14, 14\u201322 (2010)","journal-title":"IEEE Internet Comput."},{"key":"18_CR19","doi-asserted-by":"crossref","unstructured":"Mashayekhy, L., Grosu, D.: A reputation-based mechanism for dynamic virtual organization formation in grids. In: Proceedings of the International Conference Parallel Process, pp. 108\u2013117 (2012)","DOI":"10.1109\/ICPP.2012.11"},{"key":"18_CR20","doi-asserted-by":"publisher","first-page":"562","DOI":"10.1109\/SURV.2011.092110.00088","volume":"13","author":"J-H Cho","year":"2011","unstructured":"Cho, J.-H., Swami, A., Chen, I.-R.: A survey on trust management for mobile ad hoc networks. IEEE Commun. Surv. Tutor. 13, 562\u2013583 (2011)","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"18_CR21","unstructured":"Blaze, M., Feigenbaum, J., Lacy, J.: Decentralized trust management. In: 1996 IEEE Symposium on Security and Privacy, pp. 164\u2013173 (1996)"},{"key":"18_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"193","DOI":"10.1007\/11755593_15","volume-title":"Trust Management","author":"F Kerschbaum","year":"2006","unstructured":"Kerschbaum, F., Haller, J., Karabulut, Y., Robinson, P.: PathTrust: a trust-based reputation service for virtual organization formation. In: St\u00f8len, K., Winsborough, W.H., Martinelli, F., Massacci, F. (eds.) iTrust 2006. LNCS, vol. 3986, pp. 193\u2013205. Springer, Heidelberg (2006)"},{"key":"18_CR23","series-title":"Advances in Applied Microeconomics","doi-asserted-by":"publisher","first-page":"127","DOI":"10.1016\/S0278-0984(02)11030-3","volume-title":"The Economics of the Internet and E-Commerce","author":"P Resnick","year":"2002","unstructured":"Resnick, P., Zeckhauser, R.: Trust among strangers in internet transactions: empirical analysis of eBay\u2019s reputation system. In: Baye, M.R. (ed.) The Economics of the Internet and E-Commerce. Advances in Applied Microeconomics, vol. 11, pp. 127\u2013157. Elsevier Science, Amsterdam (2002)"},{"key":"18_CR24","doi-asserted-by":"crossref","unstructured":"Ko, R.K.L., Jagadpramana, P., Mowbray, M., Pearson, S., Kirchberg, M., Liang, Q., Lee, B.S.: TrustCloud: a framework for accountability and trust in cloud computing. In: Proceedings of the 2011 IEEE World Congress on Services, pp. 584\u2013588 (2011)","DOI":"10.1109\/SERVICES.2011.91"},{"key":"18_CR25","doi-asserted-by":"crossref","unstructured":"Pearson, S., Benameur, A.: Privacy, Security and Trust Issues Arising from Cloud Computing. In: 2010 IEEE Second International Conference on Cloud Computing Technology and Science, pp. 693\u2013702 (2010)","DOI":"10.1109\/CloudCom.2010.66"},{"key":"18_CR26","doi-asserted-by":"publisher","first-page":"184","DOI":"10.1016\/j.jpdc.2014.08.004","volume":"75","author":"JPD Comput","year":"2015","unstructured":"Comput, J.P.D., Hendrikx, F., Bubendorfer, K., Chard, R.: Reputation systems: a survey and taxonomy. J. Parallel Distrib. Comput. 75, 184\u2013197 (2015)","journal-title":"J. Parallel Distrib. Comput."},{"key":"18_CR27","doi-asserted-by":"crossref","unstructured":"Rehman, Z.U., Hussain, O.K., Hussain, F.K.: Iaas cloud selection using MCDM methods. In: Proceedings of the 2012 IEEE Ninth International Conference on e-Business Engineering, ICEBE 2012, pp. 246\u2013251 (2012)","DOI":"10.1109\/ICEBE.2012.47"},{"key":"18_CR28","first-page":"10","volume":"2014","author":"M Whaiduzzaman","year":"2014","unstructured":"Whaiduzzaman, M., Gani, A., Anuar, N.B., Shiraz, M., Haque, M.N., Haque, I.T.: Cloud service selection using multicriteria decision analysis. Sci. World J. 2014, 10 (2014)","journal-title":"Sci. World J."},{"key":"18_CR29","first-page":"56","volume":"10","author":"M Velasquez","year":"2013","unstructured":"Velasquez, M., Hester, P.: An analysis of multi-criteria decision making methods. Int. J. Oper. Res. 10, 56\u201366 (2013)","journal-title":"Int. J. Oper. Res."},{"key":"18_CR30","doi-asserted-by":"publisher","first-page":"417","DOI":"10.1016\/j.cor.2009.06.010","volume":"37","author":"WC Chen","year":"2010","unstructured":"Chen, W.C., Johnson, A.L.: A unified model for detecting efficient and inefficient outliers in data envelopment analysis. Comput. Oper. Res. 37, 417\u2013425 (2010)","journal-title":"Comput. Oper. Res."},{"key":"18_CR31","doi-asserted-by":"publisher","first-page":"1078","DOI":"10.1287\/mnsc.30.9.1078","volume":"30","author":"RD Banker","year":"1984","unstructured":"Banker, R.D., Charnes, A., Cooper, W.W.: Some models for estimating technical and scale inefficiencies in data envelopment analysis. Manage. Sci. 30, 1078\u20131092 (1984)","journal-title":"Manage. Sci."},{"key":"18_CR32","unstructured":"de Souza, L.M., Fernandez, M.P.: Performance evaluation methodology for cloud computing using data envelopment analysis. In: Proceedings of the Fourteenth International Conference on Networks, ICN 2015, pp. 58\u201364 (2015)"}],"container-title":["IFIP Advances in Information and Communication Technology","Collaboration in a Hyperconnected World"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-45390-3_18","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,10]],"date-time":"2025-06-10T19:48:47Z","timestamp":1749584927000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-45390-3_18"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319453897","9783319453903"],"references-count":32,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-45390-3_18","relation":{},"ISSN":["1868-4238","1868-422X"],"issn-type":[{"type":"print","value":"1868-4238"},{"type":"electronic","value":"1868-422X"}],"subject":[],"published":{"date-parts":[[2016]]},"assertion":[{"value":"20 September 2016","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"PRO-VE","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Working Conference on Virtual Enterprises","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Porto","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Portugal","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2016","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"3 October 2016","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5 October 2016","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"pro-ve2016","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}