{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,26]],"date-time":"2026-02-26T00:11:01Z","timestamp":1772064661896,"version":"3.50.1"},"publisher-location":"Cham","reference-count":15,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319491080","type":"print"},{"value":"9783319491097","type":"electronic"}],"license":[{"start":{"date-parts":[[2016,10,22]],"date-time":"2016-10-22T00:00:00Z","timestamp":1477094400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-49109-7_22","type":"book-chapter","created":{"date-parts":[[2016,10,21]],"date-time":"2016-10-21T05:03:15Z","timestamp":1477026195000},"page":"233-241","source":"Crossref","is-referenced-by-count":3,"title":["Risk Management Framework to Avoid SLA Violation in Cloud from a Provider\u2019s Perspective"],"prefix":"10.1007","author":[{"given":"Walayat","family":"Hussain","sequence":"first","affiliation":[]},{"given":"Farookh Khadeer","family":"Hussain","sequence":"additional","affiliation":[]},{"given":"Omar Khadeer","family":"Hussain","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,10,22]]},"reference":[{"key":"22_CR1","doi-asserted-by":"crossref","unstructured":"Khajeh-Hosseini, A., D. Greenwood, and I. Sommerville. Cloud migration: a case study of migrating an enterprise IT system to IaaS. in Cloud Computing (CLOUD), 2010 IEEE 3rd International Conference on. 2010. IEEE.","DOI":"10.1109\/CLOUD.2010.37"},{"key":"22_CR2","doi-asserted-by":"crossref","unstructured":"Hashem, I.A.T., et al., The rise of \u201cbig data\u201d on cloud computing: Review and open research issues. Information Systems, 2015. 47: p. 98-115.","DOI":"10.1016\/j.is.2014.07.006"},{"key":"22_CR3","doi-asserted-by":"crossref","unstructured":"Hussain, W., F.K. Hussain, and O.K. Hussain. Maintaining Trust in Cloud Computing through SLA Monitoring. in Neural Information Processing. 2014. Springer.","DOI":"10.1007\/978-3-319-12643-2_83"},{"key":"22_CR4","doi-asserted-by":"crossref","unstructured":"Hussain, W., F.K. Hussain, and O. Hussain, Comparative analysis of consumer profile-based methods to predict SLA violation, in FUZZ-IEEE, IEEE, Editor. 2015, IEEE: Istanbul Turkey.","DOI":"10.1109\/FUZZ-IEEE.2015.7337993"},{"key":"22_CR5","unstructured":"Hussain, W., et al., Profile-based viable Service Level Agreement (SLA) Violation Prediction Model in the Cloud, in 2015 10th International Conference on P2P, Parallel, Grid, Cloud and Internet Computing (3PGCIC). 2015, IEEE: Krakow, Poland. p. 268-272."},{"key":"22_CR6","doi-asserted-by":"crossref","unstructured":"Hussain, O.K., et al., A methodology to quantify failure for risk-based decision support system in digital business ecosystems. Data & knowledge engineering, 2007. 63(3): p. 597-621.","DOI":"10.1016\/j.datak.2007.03.014"},{"key":"22_CR7","doi-asserted-by":"crossref","unstructured":"Albakri, S.H., et al., Security risk assessment framework for cloud computing environments. Security and Communication Networks, 2014. 7(11): p. 2114-2124.","DOI":"10.1002\/sec.923"},{"key":"22_CR8","doi-asserted-by":"crossref","unstructured":"Zhang, X., et al. Information security risk management framework for the cloud computing environments. in Computer and Information Technology (CIT), 2010 IEEE 10th International Conference on. 2010. IEEE.","DOI":"10.1109\/CIT.2010.501"},{"key":"22_CR9","doi-asserted-by":"crossref","unstructured":"Majd, E. and V. Balakrishnan, A trust model for recommender agent systems. Soft Computing, 2016: p. 1-17.","DOI":"10.1007\/s00500-016-2036-y"},{"key":"22_CR10","doi-asserted-by":"crossref","unstructured":"Morin, J.-H., J. Aubert, and B. Gateau. Towards cloud computing SLA risk management: issues and challenges. in System Science (HICSS), 2012 45th Hawaii International Conference on. 2012. IEEE.","DOI":"10.1109\/HICSS.2012.602"},{"key":"22_CR11","doi-asserted-by":"crossref","unstructured":"Wang, H., F. Liu, and H. Liu, A method of the cloud computing security management risk assessment, in Advances in Computer Science and Engineering. 2012, Springer. p. 609-618.","DOI":"10.1007\/978-3-642-27948-5_81"},{"key":"22_CR12","unstructured":"Wang, P., et al. Threat risk analysis for cloud security based on Attack-Defense Trees. in Computing Technology and Information Management (ICCM), 2012 8th International Conference on. 2012. IEEE."},{"key":"22_CR13","doi-asserted-by":"crossref","unstructured":"Hussain, W., F.K. Hussain, and O. Hussain, QoS Prediction Methods to Avoid SLA Violation in Post-Interaction Time Phase, in 11th IEEE Conference on Industrial Electronics and Applications (ICIEA 2016) 2016, IEEE: Hefei, China.","DOI":"10.1109\/ICIEA.2016.7603547"},{"key":"22_CR14","unstructured":"CloudClimate. Watching the Cloud. Available from: http:\/\/www.cloudclimate.com\/ ."},{"key":"22_CR15","unstructured":"Monitor, P.N.; PRTG Network Monitor ]. Available from: https:\/\/prtg.paessler.com\/ ."}],"container-title":["Lecture Notes on Data Engineering and Communications Technologies","Advances on P2P, Parallel, Grid, Cloud and Internet Computing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-49109-7_22","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,14]],"date-time":"2019-09-14T18:00:30Z","timestamp":1568484030000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-49109-7_22"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,10,22]]},"ISBN":["9783319491080","9783319491097"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-49109-7_22","relation":{},"ISSN":["2367-4512","2367-4520"],"issn-type":[{"value":"2367-4512","type":"print"},{"value":"2367-4520","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,10,22]]}}}