{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,10]],"date-time":"2024-09-10T12:08:56Z","timestamp":1725970136280},"publisher-location":"Cham","reference-count":19,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319763538"},{"type":"electronic","value":"9783319763545"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-76354-5_25","type":"book-chapter","created":{"date-parts":[[2018,3,9]],"date-time":"2018-03-09T06:43:48Z","timestamp":1520577828000},"page":"277-287","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Optimized Security as a Service Platforms via Stochastic Modeling and Dynamic Programming"],"prefix":"10.1007","author":[{"given":"Oussama","family":"Mjihil","sequence":"first","affiliation":[]},{"given":"Hamid","family":"Taramit","sequence":"additional","affiliation":[]},{"given":"Abdelkrim","family":"Haqiq","sequence":"additional","affiliation":[]},{"given":"Dijiang","family":"Huang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,3,10]]},"reference":[{"issue":"3","key":"25_CR1","doi-asserted-by":"crossref","first-page":"560","DOI":"10.1109\/TPDS.2013.67","volume":"25","author":"D Bruneo","year":"2014","unstructured":"Bruneo, D.: A stochastic model to investigate data center performance and QOS in IAAS cloud computing systems. IEEE Trans. Parallel Distrib. Syst. 25(3), 560\u2013569 (2014)","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"key":"25_CR2","doi-asserted-by":"crossref","unstructured":"Butt, S., Lagar-Cavilla, H.A., Srivastava, A., Ganapathy, V.: Self-service cloud computing. In: Proceedings of the 2012 ACM Conference on Computer and Communications Security, pp. 253\u2013264. ACM (2012)","DOI":"10.1145\/2382196.2382226"},{"key":"25_CR3","unstructured":"Chang, X., Xia, R., Muppala, J.K., Trivedi, K.S., Liu, J.: Effective modeling approach for IAAS data center performance analysis under heterogeneous workload. IEEE Trans. Cloud Comput. (2016)"},{"key":"25_CR4","unstructured":"Garfinkel, T., Rosenblum, M., et al.: A virtual machine introspection based architecture for intrusion detection. In: NDSS, vol. 3, pp. 191\u2013206 (2003)"},{"issue":"5","key":"25_CR5","doi-asserted-by":"crossref","first-page":"1216","DOI":"10.1016\/j.future.2012.06.005","volume":"29","author":"R Ghosh","year":"2013","unstructured":"Ghosh, R., Longo, F., Naik, V.K., Trivedi, K.S.: Modeling and performance analysis of large scale IAAS clouds. Future Gener. Comput. Syst. 29(5), 1216\u20131234 (2013)","journal-title":"Future Gener. Comput. Syst."},{"issue":"6","key":"25_CR6","doi-asserted-by":"crossref","first-page":"491","DOI":"10.1109\/TAC.1984.1103577","volume":"29","author":"B Hajek","year":"1984","unstructured":"Hajek, B.: Optimal control of two interacting service stations. IEEE Trans. Autom. Control 29(6), 491\u2013499 (1984)","journal-title":"IEEE Trans. Autom. Control"},{"key":"25_CR7","doi-asserted-by":"crossref","unstructured":"Kumar, P.R., Varaiya, P.: Stochastic systems: estimation, identification, and adaptive control. SIAM (2015). \nhttp:\/\/epubs.siam.org\/doi\/book\/10.1137\/1.9781611974263","DOI":"10.1137\/1.9781611974263"},{"issue":"1","key":"25_CR8","doi-asserted-by":"crossref","first-page":"223","DOI":"10.1080\/15326349408807294","volume":"10","author":"I Lambadaris","year":"1994","unstructured":"Lambadaris, I., Narayan, P.: Jointly optimal admission and routing controls at a networks node. Commun. Stat. Stoch. Models 10(1), 223\u2013252 (1994)","journal-title":"Commun. Stat. Stoch. Models"},{"issue":"4","key":"25_CR9","doi-asserted-by":"crossref","first-page":"687","DOI":"10.1287\/opre.23.4.687","volume":"23","author":"SA Lippman","year":"1975","unstructured":"Lippman, S.A.: Applying a new device in the optimization of exponential queuing systems. Oper. Res. 23(4), 687\u2013710 (1975)","journal-title":"Oper. Res."},{"issue":"11","key":"25_CR10","doi-asserted-by":"crossref","first-page":"1225","DOI":"10.1287\/mnsc.21.11.1225","volume":"21","author":"SA Lippman","year":"1975","unstructured":"Lippman, S.A.: On dynamic programming with unbounded rewards. Manag. Sci. 21(11), 1225\u20131233 (1975)","journal-title":"Manag. Sci."},{"key":"25_CR11","doi-asserted-by":"crossref","unstructured":"Mjihil, O., Huang, D., Haqiq, A.: Improving attack graph scalability for the cloud through SDN-based decomposition and parallel processing. In: International Symposium on Ubiquitous Networking, pp. 193\u2013205. Springer (2017)","DOI":"10.1007\/978-3-319-68179-5_17"},{"issue":"5","key":"25_CR12","first-page":"283","volume":"11","author":"O Mjihil","year":"2016","unstructured":"Mjihil, O., Kim, D.S., Haqiq, A.: Security assessment framework for multi-tenant cloud with nested virtualization. J. Inf. Assur. Secur. 11(5), 283\u2013292 (2016)","journal-title":"J. Inf. Assur. Secur."},{"key":"25_CR13","doi-asserted-by":"crossref","unstructured":"Pawar, P.S., Sajjad, A., Dimitrakos, T., Chadwick, D.W.: Security-as-a-service in multi-cloud and federated cloud environments. In: IFIP International Conference on Trust Management, pp. 251\u2013261. Springer (2015)","DOI":"10.1007\/978-3-319-18491-3_21"},{"issue":"3","key":"25_CR14","doi-asserted-by":"crossref","first-page":"600","DOI":"10.1109\/TAC.1982.1102957","volume":"27","author":"Z Rosberg","year":"1982","unstructured":"Rosberg, Z., Varaiya, P., Walrand, J.: Optimal control of service in tandem queues. IEEE Trans. Autom. Control 27(3), 600\u2013610 (1982)","journal-title":"IEEE Trans. Autom. Control"},{"key":"25_CR15","doi-asserted-by":"crossref","DOI":"10.1002\/047001363X","volume-title":"A First Course in Stochastic Models","author":"HC Tijms","year":"2003","unstructured":"Tijms, H.C.: A First Course in Stochastic Models. Wiley, Chichester (2003)"},{"issue":"1","key":"25_CR16","doi-asserted-by":"crossref","first-page":"60","DOI":"10.1109\/TNSM.2014.041614.120394","volume":"11","author":"V Varadharajan","year":"2014","unstructured":"Varadharajan, V., Tupakula, U.: Security as a service model for cloud environment. IEEE Trans. Netw. Serv. Manag. 11(1), 60\u201375 (2014)","journal-title":"IEEE Trans. Netw. Serv. Manag."},{"key":"25_CR17","volume-title":"An Introduction to Queueing Networks","author":"J Walrand","year":"1988","unstructured":"Walrand, J.: An Introduction to Queueing Networks. Prentice Hall, Englewood Cliffs (1988)"},{"key":"25_CR18","doi-asserted-by":"crossref","unstructured":"Yu, C., Li, L.X., Wang, K., Yu, W.T.: Protecting the security and privacy of the virtual machine through privilege separation. In: Applied Mechanics and Materials, vol. 347, pp. 2488\u20132494. Trans Tech Publ. (2013)","DOI":"10.2991\/iccsee.2013.558"},{"key":"25_CR19","doi-asserted-by":"crossref","unstructured":"Zhang, F., Chen, J., Chen, H., Zang, B.: Cloudvisor: retrofitting protection of virtual machines in multi-tenant cloud with nested virtualization. In: Proceedings of the Twenty-Third ACM Symposium on Operating Systems Principles, pp. 203\u2013216. ACM (2011)","DOI":"10.1145\/2043556.2043576"}],"container-title":["Advances in Intelligent Systems and Computing","Innovations in Bio-Inspired Computing and Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-76354-5_25","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,3,9]],"date-time":"2018-03-09T07:00:43Z","timestamp":1520578843000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-76354-5_25"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783319763538","9783319763545"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-76354-5_25","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2018]]}}}