{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T07:57:57Z","timestamp":1725868677678},"publisher-location":"Cham","reference-count":17,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319491080"},{"type":"electronic","value":"9783319491097"}],"license":[{"start":{"date-parts":[[2016,10,22]],"date-time":"2016-10-22T00:00:00Z","timestamp":1477094400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-49109-7_54","type":"book-chapter","created":{"date-parts":[[2016,10,21]],"date-time":"2016-10-21T05:03:15Z","timestamp":1477026195000},"page":"567-576","source":"Crossref","is-referenced-by-count":0,"title":["SFCS-Broker: Supporting Feedback Credibility Brokering Service for Multiple Clouds Environments"],"prefix":"10.1007","author":[{"given":"Heba","family":"Kurdi","sequence":"first","affiliation":[]},{"given":"Sara","family":"Alfaraj","sequence":"additional","affiliation":[]},{"given":"Asma","family":"Alatawi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,10,22]]},"reference":[{"key":"54_CR1","doi-asserted-by":"crossref","unstructured":"S. D. Kamvar, M. T. Schlosser, and H. Garcia-Molina, \u201cThe eigentrust algorithm for reputation management in p2p networks,\u201d in Proceedings of the 12th international conference on World Wide Web, 2003, pp. 640-651.","DOI":"10.1145\/775152.775242"},{"key":"54_CR2","doi-asserted-by":"crossref","unstructured":"T. Noor, Q. Sheng, L. Yao, S. Dustdar, and A. Ngu, \u201cCloudArmor: Supporting reputation based trust management for cloud services,\u201d 2015.","DOI":"10.1109\/TPDS.2015.2408613"},{"key":"54_CR3","unstructured":"A. Alexa and A. Theobald, \u201cReputation management in P2P networks: the eigentrust algorithm,\u201d ed: Thesis, Supervised by Anja Theobald."},{"key":"54_CR4","doi-asserted-by":"crossref","unstructured":"M. Armbrust, A. Fox, R. Griffith, A. D. Joseph, R. Katz, A. Konwinski, et al., \u201cA view of cloud computing,\u201d Communications of the ACM, vol. 53, pp. 50-58, 2010.","DOI":"10.1145\/1721654.1721672"},{"key":"54_CR5","doi-asserted-by":"crossref","unstructured":"F. Paraiso, N. Haderer, P. Merle, R. Rouvoy, and L. Seinturier, \u201cA federated multi-cloud PaaS infrastructure,\u201d in Cloud Computing (CLOUD), 2012 IEEE 5th International Conference on, 2012, pp. 392-399.","DOI":"10.1109\/CLOUD.2012.79"},{"key":"54_CR6","doi-asserted-by":"crossref","unstructured":"P. Jain, D. Rane, and S. Patidar, \u201cA novel cloud bursting brokerage and aggregation (CBBA) algorithm for multi cloud environment,\u201d in Advanced Computing & Communication Technologies (ACCT), 2012 Second International Conference on, 2012, pp. 383-387.","DOI":"10.1109\/ACCT.2012.7"},{"key":"54_CR7","doi-asserted-by":"crossref","unstructured":"X. Li, H. Ma, F. Zhou, and W. Yao, \u201cT-Broker: A Trust-Aware Service Brokering Scheme for Multiple Cloud Collaborative Services,\u201d Information Forensics and Security, IEEE Transactions on, vol. 10, pp. 1402-1415, 2015.","DOI":"10.1109\/TIFS.2015.2413386"},{"key":"54_CR8","doi-asserted-by":"crossref","unstructured":"K. Hwang, S. Kulkareni, and Y. Hu, \u201cCloud security with virtualized defense and reputation based trust management,\u201d in Dependable, Autonomic and Secure Computing, 2009. DASC\u201909. Eighth IEEE International Conference on, 2009, pp. 717-722.","DOI":"10.1109\/DASC.2009.149"},{"key":"54_CR9","doi-asserted-by":"crossref","unstructured":"B. Rochwerger, D. Breitgand, E. Levy, A. Galis, K. Nagin, I. M. Llorente, et al., \u201cThe reservoir model and architecture for open federated cloud computing,\u201d IBM Journal of Research and Development, vol. 53, pp. 4: 1-4: 11, 2009.","DOI":"10.1147\/JRD.2009.5429058"},{"key":"54_CR10","doi-asserted-by":"crossref","unstructured":"D. Chaves, S. Aparecida, R. B. Uriarte, and C. B. Westphall, \u201cToward an architecture for monitoring private clouds,\u201d Communications Magazine, IEEE, vol. 49, pp. 130-137, 2011.","DOI":"10.1109\/MCOM.2011.6094017"},{"key":"54_CR11","unstructured":"(2013). OPTIMIS. Available: optimis-project.eu\/project"},{"key":"54_CR12","doi-asserted-by":"crossref","unstructured":"S. M. Habib, S. Ries, and M. M\u00fchlh\u00e4user, \u201cTowards a trust management system for cloud computing,\u201d in Trust, Security and Privacy in Computing and Communications (TrustCom), 2011 IEEE 10th International Conference on, 2011, pp. 933-939.","DOI":"10.1109\/TrustCom.2011.129"},{"key":"54_CR13","unstructured":"PCMONS. Available: findbestopensource.com\/product\/pcmons"},{"key":"54_CR14","doi-asserted-by":"crossref","unstructured":"T. H. Noor and Q. Z. Sheng, \u201cTrust as a service: a framework for trust management in cloud environments,\u201d in Web Information System Engineering\u2013WISE 2011, ed: Springer, 2011, pp. 314-321.","DOI":"10.1007\/978-3-642-24434-6_27"},{"key":"54_CR15","doi-asserted-by":"crossref","unstructured":"F. J. Krautheim, D. S. Phatak, and A. T. Sherman, \u201cIntroducing the trusted virtual environment module: a new mechanism for rooting trust in cloud computing,\u201d in Trust and Trustworthy Computing, ed: Springer, 2010, pp. 211-227.","DOI":"10.1007\/978-3-642-13869-0_14"},{"key":"54_CR16","doi-asserted-by":"crossref","unstructured":"P. D. Manuel, S. T. Selvi, and M.-E. Barr, \u201cTrust management system for grid and cloud resources,\u201d in Advanced Computing, 2009. ICAC 2009. First International Conference on, 2009, pp. 176-181.","DOI":"10.1109\/ICADVC.2009.5378187"},{"key":"54_CR17","doi-asserted-by":"crossref","unstructured":"A. G. West, S. Kannan, I. Lee, and O. Sokolsky, \u201cAn evaluation framework for reputation management systems,\u201d Trust Modeling and Management in Digital Environments: From Social Concept to System Development, pp. 282-308, 2010.","DOI":"10.4018\/978-1-61520-682-7.ch012"}],"container-title":["Lecture Notes on Data Engineering and Communications Technologies","Advances on P2P, Parallel, Grid, Cloud and Internet Computing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-49109-7_54","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,14]],"date-time":"2019-09-14T18:01:19Z","timestamp":1568484079000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-49109-7_54"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,10,22]]},"ISBN":["9783319491080","9783319491097"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-49109-7_54","relation":{},"ISSN":["2367-4512","2367-4520"],"issn-type":[{"type":"print","value":"2367-4512"},{"type":"electronic","value":"2367-4520"}],"subject":[],"published":{"date-parts":[[2016,10,22]]}}}