{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T11:17:25Z","timestamp":1775042245730,"version":"3.50.1"},"publisher-location":"Cham","reference-count":35,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319591704","type":"print"},{"value":"9783319591711","type":"electronic"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-59171-1_6","type":"book-chapter","created":{"date-parts":[[2017,5,19]],"date-time":"2017-05-19T08:09:03Z","timestamp":1495181343000},"page":"57-75","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Investigating Security Capabilities in Service Level Agreements as Trust-Enhancing Instruments"],"prefix":"10.1007","author":[{"given":"Yudhistira","family":"Nugraha","sequence":"first","affiliation":[]},{"given":"Andrew","family":"Martin","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,5,20]]},"reference":[{"key":"6_CR1","series-title":"IFIP Advances in Information and Communication Technology","doi-asserted-by":"publisher","first-page":"262","DOI":"10.1007\/978-3-319-18491-3_22","volume-title":"Trust Management IX","author":"AJ Ferrer","year":"2015","unstructured":"Ferrer, A.J., i Montanera, E.P.: The role of SLAs in building a trusted cloud for europe. In: Damsgaard Jensen, C., Marsh, S., Dimitrakos, T., Murayama, Y. (eds.) IFIPTM 2015. IAICT, vol. 454, pp. 262\u2013275. Springer, Cham (2015). doi:10.1007\/978-3-319-18491-3_22"},{"key":"6_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"129","DOI":"10.1007\/978-3-642-32946-3_11","volume-title":"Financial Cryptography and Data Security","author":"R B\u00f6hme","year":"2012","unstructured":"B\u00f6hme, R.: Security audits revisited. In: Keromytis, A.D. (ed.) FC 2012. LNCS, vol. 7397, pp. 129\u2013147. Springer, Heidelberg (2012). doi:10.1007\/978-3-642-32946-3_11"},{"key":"6_CR3","doi-asserted-by":"crossref","unstructured":"Bernsmed, et al.: Security SLAs for federated cloud services. In: International Conference on Availability, Reliability and Security, pp. 202\u2013209. IEEE (2011)","DOI":"10.1109\/ARES.2011.34"},{"key":"6_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"123","DOI":"10.1007\/978-3-642-32498-7_10","volume-title":"Multidisciplinary Research and Practice for Information Systems","author":"MG Jaatun","year":"2012","unstructured":"Jaatun, M.G., Bernsmed, K., Undheim, A.: Security SLAs \u2013 an idea whose time has come? In: Quirchmayr, G., Basl, J., You, I., Xu, L., Weippl, E. (eds.) CD-ARES 2012. LNCS, vol. 7465, pp. 123\u2013130. Springer, Heidelberg (2012). doi:10.1007\/978-3-642-32498-7_10"},{"key":"6_CR5","doi-asserted-by":"crossref","unstructured":"Henning, R.R.: Security service level agreements: quantifiable security for the enterprise? In: Proceedings of the 1999 workshop on New security paradigms, pp. 54\u201360. ACM (1999)","DOI":"10.1145\/335169.335194"},{"key":"6_CR6","unstructured":"Monahan, B., Yearworth, M.: Meaningful security SLAs. Technical report, HP Labs (2008)"},{"key":"6_CR7","doi-asserted-by":"crossref","unstructured":"Guesmi, et al.: Access control and security properties requirements specification for clouds\u2019 SECLAS. In: IEEE Conference on Cloud Computing Technology and Science (2013)","DOI":"10.1109\/CloudCom.2013.133"},{"key":"6_CR8","doi-asserted-by":"publisher","first-page":"54","DOI":"10.1109\/MVT.2013.2269188","volume":"8","author":"T Takahashi","year":"2013","unstructured":"Takahashi, T., et al.: Tailored security: building nonrepudiable security service-level agreements. IEEE Veh. Technol. Mag. 8, 54\u201362 (2013)","journal-title":"IEEE Veh. Technol. Mag."},{"key":"6_CR9","doi-asserted-by":"crossref","unstructured":"Rak, et al.: Security as a service using an SLA-based approach via SPECS. In: IEEE Conference on Cloud Computing Technology and Science, pp. 1\u20136 (2013)","DOI":"10.1109\/CloudCom.2013.165"},{"key":"6_CR10","unstructured":"SLALOM Project. The SLALOM project website (2015)"},{"key":"6_CR11","unstructured":"SLA Ready Consortium. The SLA ready project website (2015)"},{"key":"6_CR12","unstructured":"Rios, et al.: Towards Self-Protective Multi-Cloud Applications (2015)"},{"key":"6_CR13","unstructured":"Luna, J., et al.: Quantitative reasoning about cloud security using service level agreements. IEEE Trans. Cloud Comput., p. 1 (2015)"},{"key":"6_CR14","unstructured":"Cabinet Office: Procurement policy note-use of cyber essentials scheme certification (2016)"},{"key":"6_CR15","unstructured":"Hadeka, S., Scheimer, M.: DoD Amends its DFARS Safeguarding and Cyber Incident Reporting Requirements with a Second Interim Rule (2016)"},{"key":"6_CR16","unstructured":"Bird, et al.: China introduces new cybersecurity for rules for banking procurement (2016)"},{"key":"6_CR17","doi-asserted-by":"crossref","unstructured":"Nugraha, Y.: Security assurance requirements engineering (STARE) for trustworthy service level agreements. In: IEEE Conference on Requirements Engineering, pp. 398\u2013399 (2015)","DOI":"10.1109\/RE.2015.7320458"},{"key":"6_CR18","unstructured":"NIST 800-53: Security and privacy controls for federal information systems and organisations (2013)"},{"key":"6_CR19","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1109\/TETC.2015.2389661","volume":"4","author":"Y Nugraha","year":"2016","unstructured":"Nugraha, Y., et al.: An adaptive wideband delphi method to study state cyber-defence requirements. IEEE Trans. Emerg. Top. Comput. 4, 47\u201359 (2016)","journal-title":"IEEE Trans. Emerg. Top. Comput."},{"key":"6_CR20","unstructured":"Harrell et al.: Data Collection Methods, RAND Corporation (2009)"},{"key":"6_CR21","doi-asserted-by":"crossref","unstructured":"Paul, G., et al.: Methods of data collection in qualitative research. Nature, 291\u2013295 (2008)","DOI":"10.1038\/bdj.2008.192"},{"key":"6_CR22","unstructured":"McGregor, et al.: Investigating the computer security practices and needs of journalists. In: 24th USENIX Security Symposium (USENIX Security 15), pp. 399\u2013414 (2015)"},{"key":"6_CR23","doi-asserted-by":"crossref","unstructured":"Egelman, et al.: Are you ready to lock? In: ACM CCS, pp. 750\u2013761 (2014)","DOI":"10.1145\/2660267.2660273"},{"key":"6_CR24","volume-title":"Constructing Grounded Theory","author":"K Charmaz","year":"2014","unstructured":"Charmaz, K.: Constructing Grounded Theory. Sage, London (2014)"},{"key":"6_CR25","volume-title":"Grounded Theory: A Practical Guide","author":"M Birks","year":"2015","unstructured":"Birks, M., Mills, J.: Grounded Theory: A Practical Guide. Sage, London (2015)"},{"key":"6_CR26","doi-asserted-by":"publisher","first-page":"59","DOI":"10.1177\/1525822X05279903","volume":"18","author":"G Guest","year":"2006","unstructured":"Guest, G., et al.: How many interviews are enough? Field Methods 18, 59\u201382 (2006)","journal-title":"Field Methods"},{"key":"6_CR27","unstructured":"Pivrinta, et al.: Grounding theory from Delphi studies. In: International Conference on Information Systems, pp. 2022\u20132035 (2011)"},{"key":"6_CR28","unstructured":"Howard, K.: Educating cultural heritage information professionals for Australia\u2019s galleries, libraries, archives and museums: A grounded Delphi study, Ph.D dissertation, QUT (2015)"},{"issue":"2","key":"6_CR29","doi-asserted-by":"publisher","first-page":"149","DOI":"10.1016\/0040-1625(70)90161-7","volume":"2","author":"M Turoff","year":"1970","unstructured":"Turoff, M.: The design of a policy Delphi. Technol. Forecast. Soc. Change 2(2), 149\u2013171 (1970)","journal-title":"Technol. Forecast. Soc. Change"},{"issue":"4","key":"6_CR30","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1080\/07421222.2001.11045662","volume":"17","author":"R Schmidt","year":"2001","unstructured":"Schmidt, R., et al.: Identifying software project risks: an international Delphi study. J. Manag. Inf. Syst. 17(4), 5\u201336 (2001)","journal-title":"J. Manag. Inf. Syst."},{"key":"6_CR31","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1016\/j.im.2003.11.002","volume":"42","author":"C Okoli","year":"2004","unstructured":"Okoli, C., et al.: The Delphi method as a research tool. Inf. Manag. 42, 15\u201329 (2004)","journal-title":"Inf. Manag."},{"key":"6_CR32","unstructured":"Forsyth, D.: Delphi technique. In: Levine, J., Hogg, M. (eds.), Encyclopedia of Group Processes & Intergroup Relations, pp. 196\u2013198. SAGE Publications (2010)"},{"key":"6_CR33","unstructured":"Delbecq, et al.: Group Techniques for Program Planning. Scott Foresman (1975)"},{"key":"6_CR34","unstructured":"Hsu, C., Sandford, B.: Delphi technique. In: Salkind, N.J. (ed.) Encyclopedia of Research Design, pp. 344\u2013347. SAGE Publications (2010)"},{"key":"6_CR35","volume-title":"Threat Modeling: Designing for Security","author":"A Shostack","year":"2014","unstructured":"Shostack, A.: Threat Modeling: Designing for Security. Wiley, Hoboken (2014)"}],"container-title":["IFIP Advances in Information and Communication Technology","Trust Management XI"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-59171-1_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,7]],"date-time":"2024-03-07T12:42:07Z","timestamp":1709815327000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-59171-1_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319591704","9783319591711"],"references-count":35,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-59171-1_6","relation":{},"ISSN":["1868-4238","1868-422X"],"issn-type":[{"value":"1868-4238","type":"print"},{"value":"1868-422X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017]]},"assertion":[{"value":"20 May 2017","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"IFIPTM","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"IFIP International Conference on Trust Management","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Gothenburg","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Sweden","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2017","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12 June 2017","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16 June 2017","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"11","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ifiptm2017","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/s.ifiptm.org\/conf2017","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}