{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T14:36:41Z","timestamp":1742913401167,"version":"3.40.3"},"publisher-location":"Cham","reference-count":24,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319504629"},{"type":"electronic","value":"9783319504636"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-50463-6_13","type":"book-chapter","created":{"date-parts":[[2016,12,9]],"date-time":"2016-12-09T01:45:11Z","timestamp":1481247911000},"page":"153-167","source":"Crossref","is-referenced-by-count":0,"title":["Cloud Security Quantitative Assessment Based on Mobile Agent and Web Service Interaction"],"prefix":"10.1007","author":[{"given":"Abir","family":"Khaldi","sequence":"first","affiliation":[]},{"given":"Kamel","family":"Karoui","sequence":"additional","affiliation":[]},{"given":"Henda","family":"Ben Ghezala","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,12,10]]},"reference":[{"key":"13_CR1","unstructured":"Cloud Adoption Practices & Priorities Survey Report. https:\/\/downloads.cloudsecurityalliance.org\/initiatives\/surveys\/capp\/Cloud_Adoption_Practices_Priorities_Survey_Final.pdf . Accessed 16 Feb 2016"},{"key":"13_CR2","doi-asserted-by":"crossref","unstructured":"Endsley, M.R.: Design and evaluation for situation awareness enhancement. In: Human Factors Society, 32nd Annual Meeting, Santa Monica, CA (1988)","DOI":"10.1177\/154193128803200221"},{"key":"13_CR3","unstructured":"Bass, T., et al.: A glimpse into the future of ID. http:\/\/www.usenix.org\/publications\/login\/1999-9\/features\/future.html"},{"issue":"4","key":"13_CR4","doi-asserted-by":"crossref","first-page":"885","DOI":"10.1360\/jos170885","volume":"17","author":"XZ Chen","year":"2006","unstructured":"Chen, X.Z., et al.: Quantitative hierarchical threat evaluation model for network security. J. Softw. 17(4), 885\u2013897 (2006)","journal-title":"J. Softw."},{"key":"13_CR5","doi-asserted-by":"crossref","unstructured":"Jibao, L., et al.: Study of network security situation awareness model based on simple additive weight and grey theory. IEEE (2006)","DOI":"10.1109\/ICCIAS.2006.295320"},{"key":"13_CR6","doi-asserted-by":"crossref","unstructured":"Yong, Z., Xiaobin, T., Hongsheng, X.: A novel approach to network security situation awareness based on multiperspective analysis. In: 2007 International Conference on Computational Intelligence and Security, pp. 768\u2013772. IEEE, December 2007","DOI":"10.1109\/CIS.2007.160"},{"key":"13_CR7","doi-asserted-by":"crossref","first-page":"1701","DOI":"10.1016\/j.phpro.2012.03.298","volume":"25","author":"C Xiaorong","year":"2012","unstructured":"Xiaorong, C., Su, L., Mingxuan, L.: Research of network security situational assessment quantization based on mobile agent. Phys. Procedia 25, 1701\u20131707 (2012)","journal-title":"Phys. Procedia"},{"key":"13_CR8","doi-asserted-by":"crossref","unstructured":"Dastjerdi, A.V., Bakar, K.A., Tabatabaei, S.G.H.: Distributed intrusion detection in clouds using mobile agents. In: 3rd International Conference on Advanced Engineering Computing and Applications in Sciences (2009)","DOI":"10.1109\/ADVCOMP.2009.34"},{"key":"13_CR9","unstructured":"Toumi, H., Eddaoui, A., Talea, M.: Cooperative intrusion detection system framework using mobile agents for cloud computing. J. Theor. Appl. Inf. Technol. 70(1) (2014)"},{"key":"13_CR10","doi-asserted-by":"crossref","unstructured":"Doelitzscher, F., et al.: An agent based business aware incident detection system for cloud environments. J. Cloud Comput. 1(1) (2012)","DOI":"10.1186\/2192-113X-1-9"},{"key":"13_CR11","doi-asserted-by":"crossref","unstructured":"Zargar, S.T., Takabi, H., Joshi, J.B.D.: DCDIDP: a distributed, collaborative, and data-driven intrusion detection and prevention framework for cloud computing environments. In: International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom), Orlando, Florida (2011)","DOI":"10.4108\/icst.collaboratecom.2011.247158"},{"key":"13_CR12","doi-asserted-by":"crossref","unstructured":"Kamongi, P., et al.: Vulcan: vulnerability assessment framework for cloud computing. In: 7th International Conference on Software Security and Reliability (SERE). IEEE (2013)","DOI":"10.1109\/SERE.2013.31"},{"key":"13_CR13","doi-asserted-by":"crossref","unstructured":"Saripalli, P., Walters, B.: QUIRC: a quantitative impact and risk assessment framework for cloud security. In: 2010 IEEE 3rd International Conference on Cloud Computing (CLOUD). IEEE (2010)","DOI":"10.1109\/CLOUD.2010.22"},{"issue":"11","key":"13_CR14","doi-asserted-by":"crossref","first-page":"2114","DOI":"10.1002\/sec.923","volume":"7","author":"SH Albakri","year":"2014","unstructured":"Albakri, S.H., et al.: Security risk assessment framework for cloud computing environments. Secur. Commun. Netw. 7(11), 2114\u20132124 (2014)","journal-title":"Secur. Commun. Netw."},{"key":"13_CR15","doi-asserted-by":"crossref","unstructured":"Sen, A., Madria, S.: Off-line risk assessment of cloud service provider. In: 2014 IEEE World Congress on Services (SERVICES). IEEE (2014)","DOI":"10.1109\/SERVICES.2014.20"},{"key":"13_CR16","doi-asserted-by":"crossref","unstructured":"Mell, P., Grance, T.: The NIST definition of cloud computing. NIST Special Publication 800\u2013145 (Draft) (2011). Accessed 11 Oct 2015","DOI":"10.6028\/NIST.SP.800-145"},{"issue":"5","key":"13_CR17","doi-asserted-by":"crossref","first-page":"4","DOI":"10.1109\/MITP.2009.112","volume":"11","author":"HE Schaffer","year":"2009","unstructured":"Schaffer, H.E.: X as a service, cloud computing, and the need for good judgment. IT Prof. 11(5), 4\u20135 (2009)","journal-title":"IT Prof."},{"key":"13_CR18","unstructured":"DoD Directive 3600.1, Information Operations, December 1996"},{"key":"13_CR19","doi-asserted-by":"crossref","unstructured":"Lange, D., Oshima, M.: Seven good reasons for mobile agents. Commun. ACM (1999)","DOI":"10.1145\/295685.298136"},{"key":"13_CR20","unstructured":"Lemahieu, W.: Web service description, advertising and discovery: WSDL and beyond. In: Vandenbulcke, J., Snoeck, M. (eds.) Leuven University Press (2001)"},{"key":"13_CR21","doi-asserted-by":"crossref","unstructured":"Khaldi, A., Karoui, K., Tanabene, N., Ben Ghzala, H.: A secure cloud computing architecture design. In: 2nd IEEE International Conference on Mobile Cloud Computing, Services, and Engineering (MobileCloud), pp. 289\u2013294. IEEE (2014)","DOI":"10.1109\/MobileCloud.2014.44"},{"key":"13_CR22","unstructured":"Snort, January 2016. http:\/\/www.snort.org\/"},{"key":"13_CR23","unstructured":"Aglet, January 2016. http:\/\/aglets.sourceforge.net\/"},{"key":"13_CR24","unstructured":"Ben Ftima, F., Karoui, K.: Interaction mobile agents - web services. In: Encyclopedia of Multimedia Technology and Networking, 2 edn., pp. 717\u2013725 (2007)"}],"container-title":["Lecture Notes in Computer Science","Mobile, Secure, and Programmable Networking"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-50463-6_13","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,16]],"date-time":"2019-09-16T06:38:36Z","timestamp":1568615916000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-50463-6_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319504629","9783319504636"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-50463-6_13","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016]]}}}