{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T15:02:53Z","timestamp":1761663773903,"version":"3.37.3"},"publisher-location":"Cham","reference-count":33,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319951706"},{"type":"electronic","value":"9783319951713"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-95171-3_54","type":"book-chapter","created":{"date-parts":[[2018,7,3]],"date-time":"2018-07-03T15:49:47Z","timestamp":1530632987000},"page":"683-694","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":9,"title":["Cloud Applications Management \u2013 Issues and Developments"],"prefix":"10.1007","author":[{"given":"I.","family":"Odun-Ayo","sequence":"first","affiliation":[]},{"given":"B.","family":"Odede","sequence":"additional","affiliation":[]},{"given":"R.","family":"Ahuja","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,7,4]]},"reference":[{"key":"54_CR1","doi-asserted-by":"crossref","unstructured":"Mell, P., Grance, T.: The NIST Definition of Cloud Computing. NIST Special Publication 800-145 (2011)","DOI":"10.6028\/NIST.SP.800-145"},{"key":"54_CR2","unstructured":"BetterCloud: Cloud Application Management (2015). https:\/\/www.bettercloud.com\/glossary-cloud-application-management\/"},{"key":"54_CR3","doi-asserted-by":"publisher","unstructured":"Brogi, A., Ibrahim, A., Soldani, J., Carrasco, J., Cubo, J., Pimentel, E., D\u2019Andria, F.: SeaClouds: a European project on seamless management of multi-cloud applications. SIGSOFT Softw. Eng. Notes 39(1), 1\u20134 (2014). 39-1-2014-0163-5948. https:\/\/doi.org\/10.1145\/2557833.2557844","DOI":"10.1145\/2557833.2557844"},{"issue":"18","key":"54_CR4","doi-asserted-by":"publisher","first-page":"1587","DOI":"10.1002\/wcm.1203","volume":"13","author":"HT Dinh","year":"2011","unstructured":"Dinh, H.T., Lee, C., Niyato, D., Wang, P.: A survey of mobile cloud computing: architecture, applications, and approaches. Wirel. Commun. Mob. Comput. 13(18), 1587\u20131611 (2011)","journal-title":"Wirel. Commun. Mob. Comput."},{"issue":"4","key":"54_CR5","doi-asserted-by":"publisher","first-page":"20","DOI":"10.1109\/MCOM.2012.6178830","volume":"50","author":"T Ho\u00dffeld","year":"2012","unstructured":"Ho\u00dffeld, T.: Challenges of QoE management for cloud applications. IEEE Commun. Mag. 50(4), 20\u201327 (2012)","journal-title":"IEEE Commun. Mag."},{"issue":"1","key":"54_CR6","doi-asserted-by":"publisher","first-page":"110","DOI":"10.3390\/fi4010110","volume":"4","author":"Christoph Fehling","year":"2012","unstructured":"Fehling, C., Leymann, F., R\u00fctschlin, J., Schumm, D.: Pattern-based development and management of cloud applications. Future Internet 4, 110\u2013141 (2012). https:\/\/doi.org\/10.3390\/fi4010110","journal-title":"Future Internet"},{"key":"54_CR7","unstructured":"Pourghomi, P., Ghinea, G.: Managing NFC payment applications through cloud computing. In: The 7th International Conference for Internet Technology and Secured Transactions (ICITST-2012) (2012)"},{"issue":"4","key":"54_CR8","doi-asserted-by":"publisher","first-page":"32","DOI":"10.1109\/MNET.2012.6246750","volume":"26","author":"Xi Fang","year":"2012","unstructured":"Fang, X., Misra, S., Xue, G., Yang, D.: Managing smart grid information in the cloud: opportunities, model, and applications. IEEE Netw. 26(4), 32\u201338 (2015). https:\/\/doi.org\/10.1109\/mnet.2012.6246750","journal-title":"IEEE Network"},{"key":"54_CR9","doi-asserted-by":"publisher","unstructured":"Doukas, C., Maglogiannis, I.: Managing wearable sensor data through cloud computing. In: 2011 Third IEEE International Conference on Coud Computing Technology and Science (2011). https:\/\/doi.org\/10.1109\/cloudcom.2011.65","DOI":"10.1109\/cloudcom.2011.65"},{"key":"54_CR10","unstructured":"Caglar, F., Gokhale, A.: iOverbook: Managing Cloud-based Soft Real-time Applications in a Resource Overbooked Data Center. https:\/\/pdfs.semanticscholar.org\/f42c\/56380367fa638f389eeb3eae67ab8a6c075e.pdf"},{"key":"54_CR11","unstructured":"Ferry, N., Song, H., Rossini, A., Chauvel, F., Solberg, A.: CloudMF: Applying MDE to Tame the Complexity of Managing Multi-Cloud Applications (2013). http:\/\/cloudml.org\/wp-content\/uploads\/nordicloud13_pres.pdf"},{"key":"54_CR12","doi-asserted-by":"publisher","first-page":"349","DOI":"10.1016\/j.jocs.2016.11.007","volume":"21","author":"Sura Khalil Abd","year":"2017","unstructured":"Abd, S.K., Al-Haddad, S.A.R., Hashim, F., Abdullah, A.B.H.J., Yussof, S.: An effective approach for managing power consumption in cloud computing infrastructure. J. Comput. Sci. 21, 349\u2013360 (2016). http:\/\/dx.doi.org\/10.1016\/j.jocs.2016.11.007","journal-title":"Journal of Computational Science"},{"issue":"2015","key":"54_CR13","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1016\/j.procs.2015.09.220","volume":"68","author":"Z Zhaoa","year":"2015","unstructured":"Zhaoa, Z., Martin, P., Wang, J., Taal, A., Jones, A., Taylor, I., Stankovski, V., Vega, I.G., Suciu, G., Ulisses, A., de Laat, C.: Developing and operating time critical applications in clouds: the state of the art and the SWITCH approach. Proc. Comput. Sci. 68(2015), 17\u201328 (2015). https:\/\/doi.org\/10.1016\/j.procs.2015.09.220","journal-title":"Proc. Comput. Sci."},{"key":"54_CR14","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2016.09.002","author":"G Toffetti","year":"2016","unstructured":"Toffetti, G., Brunner, S., Bl\u00f6chlinger, M., Spillner, J., Bohnert, T.M.: Self-managing cloud-native applications: design, implementation, and experience. Future Gener. Comput. Syst. (2016). https:\/\/doi.org\/10.1016\/j.future.2016.09.002","journal-title":"Future Gener. Comput. Syst."},{"key":"54_CR15","unstructured":"Fortinet: Securing Cloud Applications (2017). www.fortinet.com"},{"key":"54_CR16","unstructured":"Huebscher, M.C., Mccann, J.A.: A survey of autonomic computing\u2014degrees, models and applications (2009). Accessed 24 May 2017"},{"issue":"2015","key":"54_CR17","doi-asserted-by":"publisher","first-page":"357","DOI":"10.1016\/j.ins.2015.01.025","volume":"305","author":"M Ali","year":"2015","unstructured":"Ali, M., Khan, S.U., Vasilakos, A.V.: Security in cloud computing: opportunities and challenges. Inf. Sci. 305(2015), 357\u2013383 (2015)","journal-title":"Inf. Sci."},{"key":"54_CR18","unstructured":"Velte, A.T., Velte, T.J., Elsenpeter, R.C., Elsenpeter, R.C.: Cloud Computing: A Practical Approach, pp. 250\u2013251. The McGraw-Hill, New York (2010). ISBN 978-0-07-162695-8"},{"key":"54_CR19","unstructured":"Cloud Management Tools: Cloud Native Application Management, 1 October 2017. https:\/\/cloud.google.com\/products\/management\/"},{"key":"54_CR20","unstructured":"App Dynamics: Cloud Application Management (2017). https:\/\/www.appdynamics.com\/solutions\/cloud-application-management\/"},{"key":"54_CR21","unstructured":"Mishra, A., Mathur, R., Jain, S., Singh Rathore, J.: Cloud computing security. Int. J. Recent Innov. Trends Comput. Commun. (IJRITCC), pp. 36\u201339 (2013). http:\/\/www.ijritcc.org\/download\/IJRITCC_1309.pdf"},{"issue":"1","key":"54_CR22","doi-asserted-by":"publisher","first-page":"54","DOI":"10.1109\/MCC.2014.20","volume":"1","author":"Z Tari","year":"2014","unstructured":"Tari, Z.: Security and privacy in cloud computing. IEEE Cloud Comput. 1(1), 54\u201357 (2014). https:\/\/doi.org\/10.1109\/MCC.2014.20","journal-title":"IEEE Cloud Comput."},{"key":"54_CR23","doi-asserted-by":"crossref","unstructured":"Behl, A., Behl, K.: An analysis of cloud computing security issues. In: 2012 World Congress on Information and Communication Technologies (WICT), pp. 109\u2013114 (2012). http:\/\/doi.org\/10.1109\/WICT.2012.6409059","DOI":"10.1109\/WICT.2012.6409059"},{"key":"54_CR24","doi-asserted-by":"crossref","unstructured":"Chen, D., Zhao, H.: Data security and privacy protection issues in cloud computing. In: 2012 International Conference on Computer Science and Electronics Engineering (ICCSEE), vol. 1, pp. 647\u2013651 (2012). http:\/\/doi.org\/10.1109\/ICCSEE.2012.193","DOI":"10.1109\/ICCSEE.2012.193"},{"issue":"2","key":"54_CR25","doi-asserted-by":"publisher","first-page":"843","DOI":"10.1109\/SURV.2012.060912.00182","volume":"15","author":"Z Xiao","year":"2013","unstructured":"Xiao, Z., Xiao, Y.: Security and privacy in cloud computing. IEEE Commun. Surv. Tutorials 15(2), 843\u2013859 (2013). https:\/\/doi.org\/10.1109\/SURV.2012.060912.00182","journal-title":"IEEE Commun. Surv. Tutorials"},{"issue":"3","key":"54_CR26","doi-asserted-by":"publisher","first-page":"583","DOI":"10.1016\/j.future.2010.12.006","volume":"28","author":"D Zissis","year":"2012","unstructured":"Zissis, D., Lekkas, D.: Addressing cloud computing security issues. Future Gener. Comput. Syst. 28(3), 583\u2013592 (2012). https:\/\/doi.org\/10.1016\/j.future.2010.12.006","journal-title":"Future Gener. Comput. Syst."},{"key":"54_CR27","unstructured":"Rahman, M., Cheung, W.M.: Analysis of cloud computing vulnerabilities. Int. J. Innov. Sci. Res. 2(2), 308\u2013312 (2014a). http:\/\/www.issr-journals.org\/links\/papers.php?journal=ijisr&application=pdf&article=IJISR-14-120-07"},{"issue":"3","key":"54_CR28","doi-asserted-by":"publisher","first-page":"621","DOI":"10.1109\/TPDS.2014.2314672","volume":"26","author":"M Liu","year":"2015","unstructured":"Liu, M., Dou, W., Yu, S., Zhang, Z.: A decentralized cloud firewall framework with resources provisioning cost optimization. IEEE Trans. Parallel Distrib. Syst. 26(3), 621\u2013631 (2015). https:\/\/doi.org\/10.1109\/TPDS.2014.2314672","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"key":"54_CR29","doi-asserted-by":"crossref","unstructured":"Li, J., Li, J., Xie, D., Cai, Z.: Secure auditing and deduplicating data in cloud. IEEE Trans. Comput. PP(99), 1 (2015). http:\/\/doi.org\/10.1109\/TC.2015.2389960","DOI":"10.1109\/TC.2015.2389960"},{"key":"54_CR30","doi-asserted-by":"crossref","unstructured":"Al-Anzi, F.S., Salman, A.A., Jacob, N.K., Soni, J.: Towards robust, scalable and secure network storage in Cloud Computing. In: 2014 Fourth International Conference on Digital Information and Communication Technology and it\u2019s Applications (DICTAP), pp. 51\u201355 (2014). http:\/\/doi.org\/10.1109\/DICTAP.2014.6821656","DOI":"10.1109\/DICTAP.2014.6821656"},{"key":"54_CR31","doi-asserted-by":"crossref","unstructured":"Khalil, I.M., Khreishah, A., Bouktif, S., Ahmad, A.: Security concerns in cloud computing. In: 2013 Tenth International Conference on Information Technology: New Generations (ITNG), pp. 411\u2013416 (2013). http:\/\/doi.org\/10.1109\/ITNG.2013.127","DOI":"10.1109\/ITNG.2013.127"},{"issue":"1","key":"54_CR32","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2522968.2522980","volume":"46","author":"Talal H. Noor","year":"2013","unstructured":"Noor, T.H., Sheng, Q.Z., Zeadally, S., Yu, J.: Trust management of services in cloud environments: obstacles and solutions. ACM Comput. Surv. 46(1), 12:1\u201312:30 (2013). http:\/\/doi.org\/10.1145\/2522968.2522980","journal-title":"ACM Computing Surveys"},{"key":"54_CR33","doi-asserted-by":"crossref","unstructured":"Al-Anzi, F.S., Yadav, S.K., Soni, J.: Cloud computing: security model comprising governance, risk management and compliance. In: 2014 International Conference on Data Mining and Intelligent Computing (ICDMIC), pp. 1\u20136 (2014). http:\/\/doi.org\/10.1109\/ICDMIC.2014.6954232","DOI":"10.1109\/ICDMIC.2014.6954232"}],"container-title":["Lecture Notes in Computer Science","Computational Science and Its Applications \u2013 ICCSA 2018"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-95171-3_54","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,20]],"date-time":"2019-10-20T05:15:32Z","timestamp":1571548532000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-95171-3_54"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783319951706","9783319951713"],"references-count":33,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-95171-3_54","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2018]]}}}