{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,26]],"date-time":"2026-03-26T20:15:11Z","timestamp":1774556111565,"version":"3.50.1"},"publisher-location":"Cham","reference-count":19,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319615653","type":"print"},{"value":"9783319615660","type":"electronic"}],"license":[{"start":{"date-parts":[[2017,7,5]],"date-time":"2017-07-05T00:00:00Z","timestamp":1499212800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-61566-0_81","type":"book-chapter","created":{"date-parts":[[2017,7,4]],"date-time":"2017-07-04T02:36:53Z","timestamp":1499135813000},"page":"854-863","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":8,"title":["A Security Metric Catalogue for Cloud Applications"],"prefix":"10.1007","author":[{"given":"Valentina","family":"Casola","sequence":"first","affiliation":[]},{"given":"Alessandra","family":"De Benedictis","sequence":"additional","affiliation":[]},{"given":"Massimiliano","family":"Rak","sequence":"additional","affiliation":[]},{"given":"Umberto","family":"Villano","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,7,5]]},"reference":[{"key":"81_CR1","unstructured":"A4Cloud project web site (2017). http:\/\/www.a4cloud.eu\/"},{"key":"81_CR2","unstructured":"MUSA project web site (2017). http:\/\/www.musa-project.eu"},{"key":"81_CR3","unstructured":"SPECS project web site (2017). http:\/\/www.specs-project.eu"},{"key":"81_CR4","unstructured":"A4Cloud Consortium: Deliverable D: 35.1: Metrics for Accountability. (2013). http:\/\/www.a4cloud.eu\/sites\/default\/files\/D35.1%20Metrics%20for%20accountability.pdf"},{"key":"81_CR5","unstructured":"Andrieux, A., Czajkowski, K., Dan, A., Keahey, K., Ludwig, H., Nakata, T., Pruyne, J., Rofrano, J., Tuecke, S., Xu, M.: Web services agreement specification (WS-Agreement). In: Global Grid Forum. The Global Grid Forum (GGF) (2004)"},{"key":"81_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1007\/978-3-319-17199-9_2","volume-title":"Accountability and Security in the Cloud","author":"V Casola","year":"2015","unstructured":"Casola, V., De Benedictis, A., Rak, M.: On the Adoption of Security SLAs in the Cloud. In: Felici, M., Fern\u00e1ndez-Gago, C. (eds.) A4Cloud 2014. LNCS, vol. 8937, pp. 45\u201362. Springer, Cham (2015). doi: 10.1007\/978-3-319-17199-9_2"},{"key":"81_CR7","doi-asserted-by":"publisher","unstructured":"Casola, V., De Benedictis, A., Rak, M.: Security monitoring in the cloud: an SLA-based approach. In: 2015 10th International Conference on Availability, Reliability and Security (ARES), pp. 749\u2013755 (2015). doi: 10.1109\/ARES.2015.74 (2015)","DOI":"10.1109\/ARES.2015.74"},{"issue":"99","key":"81_CR8","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/TSC.2016.2540630","volume":"PP","author":"V Casola","year":"2016","unstructured":"Casola, V., De Benedictis, A., Rak, M., Modic, J., Erascu, M.: Automatically enforcing security slas in the cloud. IEEE Trans. Serv. Comput. PP(99), 1 (2016). doi: 10.1109\/TSC.2016.2540630","journal-title":"IEEE Trans. Serv. Comput."},{"key":"81_CR9","doi-asserted-by":"crossref","unstructured":"Casola, V., De Benedictis, A., Rak, M., Villano, U.: Preliminary design of a platform-as-a-service to provide security in cloud. In: CLOSER 2014 - Proceedings of the 4th International Conference on Cloud Computing and Services Science, Barcelona, Spain, 3\u20135 April 2014, pp. 752\u2013757 (2014)","DOI":"10.5220\/0004979307520757"},{"key":"81_CR10","unstructured":"Center for Internet Security: The CIS Security Metrics v1.1.0. (2010). https:\/\/benchmarks.cisecurity.org\/tools2\/metrics\/cis_security_metrics_v1.1.0.pdf"},{"key":"81_CR11","unstructured":"Cloud Security Alliance: Cloud Control Matrix v3.0. https:\/\/cloudsecurityalliance.org\/download\/cloud-controls-matrix-v3\/"},{"key":"81_CR12","unstructured":"Cloud Security Alliance: The Treacherous Twelve, Cloud Computing Top Threats in 2016 (2016). https:\/\/cloudsecurityalliance.org\/download\/the-treacherous-twelve-cloud-computing-top-threats-in-2016\/"},{"key":"81_CR13","unstructured":"International Organization for Standardization: ISO\/IEC CD 19086\u20132. Information Technology - Cloud computing - Service level agreement (SLA) framework - Part 2: Metric Model (2017). https:\/\/www.iso.org\/standard\/67546.html"},{"key":"81_CR14","unstructured":"MUSA Consortium: Deliverable D2.1: Initial Sbd methods for multi-cloud applications (2016). http:\/\/www.tut.fi\/musa-project\/wp-content\/uploads\/2017\/02\/MUSA-D2.1-Initial-SbD-methods-for-multi-cloud-applications.pdf"},{"key":"81_CR15","unstructured":"National Institute of Standards and Technology: NIST Special Publication 800\u201355 Rev1. Performance measurement guide for information security (2008). http:\/\/nvlpubs.nist.gov\/nistpubs\/Legacy\/SP\/nistspecialpublication800-55r1.pdf"},{"key":"81_CR16","unstructured":"National Institute of Standards and Technology: NIST SP-800-53: Recommended Security Controls for Federal Information Systems (2013)"},{"key":"81_CR17","unstructured":"SPECS Consortium: Deliverable D4.3.2: Implementation of the enforcement SLA components - Intermediary (2015). http:\/\/www.specs-project.eu\/publications\/public-deliverables\/d4-3-2\/"},{"key":"81_CR18","unstructured":"SPECS Consortium: The SPECS Security Metric Catalogue (2017). http:\/\/apps.specs-project.eu\/specs-app-security_metric_catalogue\/"},{"key":"81_CR19","unstructured":"Jansen, W.: NIST Interagency\/Internal Report (NISTIR) - 7564. Directions in Security Metrics Research (2009). http:\/\/nvlpubs.nist.gov\/nistpubs\/Legacy\/IR\/nistir7564.pdf"}],"container-title":["Advances in Intelligent Systems and Computing","Complex, Intelligent, and Software Intensive Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-61566-0_81","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,21]],"date-time":"2025-06-21T01:36:06Z","timestamp":1750469766000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-61566-0_81"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,7,5]]},"ISBN":["9783319615653","9783319615660"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-61566-0_81","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"value":"2194-5357","type":"print"},{"value":"2194-5365","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,7,5]]},"assertion":[{"value":"5 July 2017","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"CISIS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Conference on Complex, Intelligent, and Software Intensive Systems","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Turin","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Italy","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2017","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"10 July 2017","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13 July 2017","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"coisis2017","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/voyager.ce.fit.ac.jp\/conf\/cisis\/2017\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}