{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T00:52:24Z","timestamp":1740099144871,"version":"3.37.3"},"publisher-location":"Cham","reference-count":38,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319926230"},{"type":"electronic","value":"9783319926247"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-92624-7_4","type":"book-chapter","created":{"date-parts":[[2018,9,4]],"date-time":"2018-09-04T06:46:11Z","timestamp":1536043571000},"page":"81-99","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["A Predictive Model for Risk and Trust Assessment in Cloud Computing: Taxonomy and Analysis for Attack Pattern Detection"],"prefix":"10.1007","author":[{"given":"Alexandros","family":"Chrysikos","sequence":"first","affiliation":[]},{"given":"Stephen","family":"McGuire","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,9,5]]},"reference":[{"key":"4_CR1","doi-asserted-by":"crossref","unstructured":"Dillon T, Wu C, Chang E (2010) Cloud computing: issues and challenges. In: 2010 24th IEEE international conference on advanced information networking and applications (AINA). Ieee, pp C27\u201333","DOI":"10.1109\/AINA.2010.187"},{"issue":"1","key":"4_CR2","doi-asserted-by":"publisher","first-page":"12","DOI":"10.1145\/2522968.2522980","volume":"46","author":"TH Noor","year":"2013","unstructured":"Noor, T.H., Sheng, Q.Z., Zeadally, S., Yu, J.: Trust management of services in cloud environments: obstacles and solutions. ACM Comput Surv (CSUR) 46(1), 12 (2013)","journal-title":"ACM Comput Surv (CSUR)"},{"key":"4_CR3","unstructured":"Abbadi IM, Martin A (2011) Trust in the cloud. information security technical report 16(3\u20134):108\u2013114"},{"key":"4_CR4","doi-asserted-by":"crossref","unstructured":"Habib SM, Ries S, Muhlhauser M (2010) Cloud computing landscape and research challenges regarding trust and reputation. In: 2010 7th international conference on ubiquitous intelligence & computing and 7th international conference on autonomic & trusted computing (UIC\/ATC). IEEE, pp 410\u2013415","DOI":"10.1109\/UIC-ATC.2010.48"},{"issue":"2","key":"4_CR5","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1109\/MSP.2010.115","volume":"9","author":"B Grobauer","year":"2011","unstructured":"Grobauer, B., Walloschek, T., Stocker, E.: Understanding cloud computing vulnerabilities. IEEE Secur Priv 9(2), 50\u201357 (2011)","journal-title":"IEEE Secur Priv"},{"issue":"9","key":"4_CR6","doi-asserted-by":"publisher","first-page":"2276","DOI":"10.1016\/j.jss.2013.03.011","volume":"86","author":"H Mouratidis","year":"2013","unstructured":"Mouratidis, H., Islam, S., Kalloniatis, C., Gritzalis, S.: A framework to support selection of cloud providers based on security and privacy requirements. J Syst Softw 86(9), 2276\u20132293 (2013)","journal-title":"J Syst Softw"},{"issue":"2","key":"4_CR7","doi-asserted-by":"publisher","first-page":"440","DOI":"10.17722\/ijme.v3i2.166","volume":"3","author":"A Heydari","year":"2014","unstructured":"Heydari, A., Tavakoli, M.A., Riazi, M.: An overview of public cloud security issues. Int J Manag Excell 3(2), 440\u2013445 (2014)","journal-title":"Int J Manag Excell"},{"key":"4_CR8","doi-asserted-by":"crossref","unstructured":"Catteddu D (2010) Cloud computing: benefits, risks and recommendations for information security. In: Web application security. Springer, pp 17\u201317","DOI":"10.1007\/978-3-642-16120-9_9"},{"issue":"3","key":"4_CR9","doi-asserted-by":"publisher","first-page":"44","DOI":"10.4018\/IJSSE.2016070103","volume":"7","author":"S Islam","year":"2016","unstructured":"Islam, S., Fenz, S., Weippl, E., Kalloniatis, C.: Migration goals and risk management in cloud computing: a review of state of the art and survey results on practitioners. Int J Secur Softw Eng (IJSSE) 7(3), 44\u201373 (2016)","journal-title":"Int J Secur Softw Eng (IJSSE)"},{"key":"4_CR10","doi-asserted-by":"publisher","first-page":"7356","DOI":"10.1109\/ACCESS.2016.2619360","volume":"4","author":"AJ Trappey","year":"2016","unstructured":"Trappey, A.J., Trappey, C.V., Govindarajan, U.H., Sun, J.J., Chuang, A.C.: A review of technology standards and patent portfolios for enabling cyber-physical systems in advanced manufacturing. IEEE Access 4, 7356\u20137382 (2016)","journal-title":"IEEE Access"},{"key":"4_CR11","unstructured":"ISO: ISO\/IEC 27000:2016 the overview of information security management systems. https:\/\/www.iso.org\/standard\/66435.html . Accessed 01 Feb 2016"},{"key":"4_CR12","unstructured":"Kreger H, Estefan J (2009) Navigating the soa open standards landscape around architecture. Joint Paper, The Open Group, OASIS, and OMG"},{"key":"4_CR13","unstructured":"Lemoudden M, Bouazza N, El\u00a0Ouahidi B, Bourget D (2013) A survey of cloud computing security overview of attack vectors and defense mechanisms. J Theor Appl Inf Technol 54(2)"},{"issue":"2","key":"4_CR14","doi-asserted-by":"publisher","first-page":"113","DOI":"10.1007\/s10207-013-0208-7","volume":"13","author":"DA Fernandes","year":"2014","unstructured":"Fernandes, D.A., Soares, L.F., Gomes, J.V., Freire, M.M., In\u00e1cio, P.R.: Security issues in cloud environments: a survey. Int J Inf Secur 13(2), 113\u2013170 (2014)","journal-title":"Int J Inf Secur"},{"issue":"6","key":"4_CR15","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1109\/MSP.2010.186","volume":"8","author":"H Takabi","year":"2010","unstructured":"Takabi, H., Joshi, J.B., Ahn, G.-J.: Security and privacy challenges in cloud computing environments. IEEE Secur Priv 8(6), 24\u201331 (2010)","journal-title":"IEEE Secur Priv"},{"issue":"1","key":"4_CR16","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.jnca.2010.07.006","volume":"34","author":"S Subashini","year":"2011","unstructured":"Subashini, S., Kavitha, V.: A survey on security issues in service delivery models of cloud computing. J Netw Comput Appl. 34(1), 1\u201311 (2011)","journal-title":"J Netw Comput Appl."},{"key":"4_CR17","doi-asserted-by":"crossref","unstructured":"Moyano F, Fernandez-Gago C, Lopez J (2012) A conceptual framework for trust models. In: International conference on trust, privacy and security in digital business. Springer, pp 93\u2013104","DOI":"10.1007\/978-3-642-32287-7_8"},{"key":"4_CR18","doi-asserted-by":"crossref","unstructured":"Rimal BP, Choi E, Lumb I (2009) A taxonomy and survey of cloud computing systems. In: 2009. NCM\u201909. fifth international joint conference on INC, IMS and IDC. Ieee, pp 44\u201351","DOI":"10.1109\/NCM.2009.218"},{"issue":"1","key":"4_CR19","doi-asserted-by":"publisher","first-page":"9","DOI":"10.1186\/2192-113X-2-9","volume":"2","author":"J Huang","year":"2013","unstructured":"Huang, J., Nicol, D.M.: Trust mechanisms for cloud computing. J Cloud Comput Adv Syst Appl 2(1), 9 (2013)","journal-title":"J Cloud Comput Adv Syst Appl"},{"key":"4_CR20","doi-asserted-by":"crossref","unstructured":"Pearson S (2013) Privacy, security and trust in cloud computing. In: Privacy and security for cloud computing. Springer, pp 3\u201342","DOI":"10.1007\/978-1-4471-4189-1_1"},{"key":"4_CR21","doi-asserted-by":"crossref","unstructured":"Habib SM, Ries S, Muhlhauser M (2011) Towards a trust management system for cloud computing. In: 2011 ieee 10th international conference on trust, security and privacy in computing and communications (TrustCom). IEEE, pp 933\u2013939","DOI":"10.1109\/TrustCom.2011.129"},{"key":"4_CR22","doi-asserted-by":"crossref","unstructured":"Wang C, Wang Q, Ren K, Lou W (2010) Privacy-preserving public auditing for data storage security in cloud computing. In: 2010 Proceedings Ieee Infocom. Ieee, pp 1\u20139","DOI":"10.1109\/INFCOM.2010.5462173"},{"key":"4_CR23","doi-asserted-by":"crossref","unstructured":"Mell P, Grance T et al (2011) The nist definition of cloud computing","DOI":"10.6028\/NIST.SP.800-145"},{"issue":"2","key":"4_CR24","doi-asserted-by":"publisher","first-page":"367","DOI":"10.1109\/TPDS.2015.2408613","volume":"27","author":"TH Noor","year":"2016","unstructured":"Noor, T.H., Sheng, Q.Z., Yao, L., Dustdar, S., Ngu, A.H.: Cloudarmor: supporting reputation-based trust management for cloud services. IEEE Trans Parallel Distrib Syst 27(2), 367\u2013380 (2016)","journal-title":"IEEE Trans Parallel Distrib Syst"},{"issue":"1","key":"4_CR25","doi-asserted-by":"publisher","first-page":"66","DOI":"10.1109\/TCC.2014.2328578","volume":"3","author":"N Ghosh","year":"2015","unstructured":"Ghosh, N., Ghosh, S.K., Das, S.K.: Selcsp: a framework to facilitate selection of cloud service providers. IEEE Trans Cloud Comput 3(1), 66\u201379 (2015)","journal-title":"IEEE Trans Cloud Comput"},{"key":"4_CR26","doi-asserted-by":"crossref","unstructured":"Qu C, Buyya R (2014) A cloud trust evaluation system using hierarchical fuzzy inference system for service selection. In: 2014 Ieee 28th international conference on advanced information networking and applications (aina). IEEE, pp 850\u2013857","DOI":"10.1109\/AINA.2014.104"},{"key":"4_CR27","doi-asserted-by":"crossref","unstructured":"Pawar PS, Rajarajan M, Nair SK, Zisman A (2012) Trust model for optimized cloud services. In: IFIP international conference on trust management. Springer, pp 97\u2013112","DOI":"10.1007\/978-3-642-29852-3_7"},{"key":"4_CR28","doi-asserted-by":"crossref","unstructured":"Alhamad M, Dillon T, Chang E (2010) Sla-based trust model for cloud computing. In: 2010 13th international conference on network-based information systems (NBiS). Ieee, pp 321\u2013324","DOI":"10.1109\/NBiS.2010.67"},{"issue":"1","key":"4_CR29","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1016\/j.cose.2004.06.011","volume":"24","author":"S Hansman","year":"2005","unstructured":"Hansman, S., Hunt, R.: A taxonomy of network and computer attacks. Comput Secur 24(1), 31\u201343 (2005)","journal-title":"Comput Secur"},{"key":"4_CR30","unstructured":"Hafez Amer S, Hamilton Jr, JA (2010) Intrusion detection systems (ids) taxonomy-a short review. This is a paid advertisement. STN 13-2 June 2010: Defensive Cyber Security: Policies and Procedures 2, 23"},{"issue":"1","key":"4_CR31","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1016\/j.jnca.2012.08.007","volume":"36","author":"A Patel","year":"2013","unstructured":"Patel, A., Taghavi, M., Bakhtiyari, K., J\u00faNior, J.C.: An intrusion detection and prevention system in cloud computing: a systematic review. J Netw Comput Appl 36(1), 25\u201341 (2013)","journal-title":"J Netw Comput Appl"},{"key":"4_CR32","doi-asserted-by":"crossref","unstructured":"Howard JD, Longstaff TA (1998) A common language for computer security incidents. Technical report, Sandia National Labs., Albuquerque, NM (US); Sandia National Labs., Livermore, CA (US)","DOI":"10.2172\/751004"},{"key":"4_CR33","doi-asserted-by":"crossref","unstructured":"Ficco M, Tasquier L, Aversa R (2013) Intrusion detection in cloud computing. In: 2013 eighth international conference on P2P, parallel, grid, cloud and internet computing (3PGCIC). IEEE, pp 276\u2013283","DOI":"10.1109\/3PGCIC.2013.47"},{"key":"4_CR34","doi-asserted-by":"crossref","unstructured":"Bace R, Mell P (2001) Nist special publication on intrusion detection systems. Technical report, BOOZ-ALLEN AND HAMILTON INC MCLEAN VA","DOI":"10.6028\/NIST.SP.800-31"},{"issue":"4","key":"4_CR35","doi-asserted-by":"publisher","first-page":"247","DOI":"10.1016\/j.istr.2008.10.010","volume":"13","author":"E Humphreys","year":"2008","unstructured":"Humphreys, E.: Information security management standards: compliance, governance and risk management. Inf Secur Tech Rep 13(4), 247\u2013255 (2008)","journal-title":"Inf Secur Tech Rep"},{"issue":"3","key":"4_CR36","doi-asserted-by":"publisher","first-page":"146","DOI":"10.1109\/TDSC.2004.21","volume":"1","author":"F Valeur","year":"2004","unstructured":"Valeur, F., Vigna, G., Kruegel, C., Kemmerer, R.A.: Comprehensive approach to intrusion detection alert correlation. IEEE Trans Dependable Secure Comput 1(3), 146\u2013169 (2004)","journal-title":"IEEE Trans Dependable Secure Comput"},{"key":"4_CR37","doi-asserted-by":"crossref","unstructured":"Shin J, Son H, Heo G (2013) Cyber security risk analysis model composed with activity-quality and architecture model. In: International conference on computer, networks and communication engineering, pp 609\u2013612","DOI":"10.2991\/iccnce.2013.151"},{"issue":"2","key":"4_CR38","doi-asserted-by":"publisher","first-page":"171","DOI":"10.1016\/j.clsr.2016.11.002","volume":"33","author":"L Bolognini","year":"2017","unstructured":"Bolognini, L., Bistolfi, C.: Pseudonymization and impacts of big (personal\/anonymous) data processing in the transition from the directive 95\/46\/ec to the new eu general data protection regulation. Comput Law Secur Rev 33(2), 171\u2013181 (2017)","journal-title":"Comput Law Secur Rev"}],"container-title":["Computer Communications and Networks","Guide to Vulnerability Analysis for Computer Networks and Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-92624-7_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,23]],"date-time":"2019-10-23T11:36:05Z","timestamp":1571830565000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-92624-7_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783319926230","9783319926247"],"references-count":38,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-92624-7_4","relation":{},"ISSN":["1617-7975","2197-8433"],"issn-type":[{"type":"print","value":"1617-7975"},{"type":"electronic","value":"2197-8433"}],"subject":[],"published":{"date-parts":[[2018]]}}}