{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T08:40:03Z","timestamp":1743064803490,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":15,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540749738"},{"type":"electronic","value":"9783540749745"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-01247-1_28","type":"book-chapter","created":{"date-parts":[[2009,4,20]],"date-time":"2009-04-20T12:44:08Z","timestamp":1240231448000},"page":"270-283","source":"Crossref","is-referenced-by-count":2,"title":["On the Feasibility of Bilaterally Agreed Accounting of Resource Consumption"],"prefix":"10.1007","author":[{"given":"Carlos","family":"Molina-Jimenez","sequence":"first","affiliation":[]},{"given":"Nick","family":"Cook","sequence":"additional","affiliation":[]},{"given":"Santosh","family":"Shrivastava","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"28_CR1","unstructured":"Amazon Simple Storage Service (Amazon S3), http:\/\/aws.amazon.com\/s3"},{"key":"28_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/10958513_1","volume-title":"Information Security","author":"P.C. Oorschot van","year":"2003","unstructured":"van Oorschot, P.C.: Revisiting Software Protection. In: Boyd, C., Mao, W. (eds.) ISC 2003. LNCS, vol.\u00a02851, pp. 1\u201313. Springer, Heidelberg (2003)"},{"key":"28_CR3","unstructured":"TCG Specification Architecture Overview. Specification Revision-1.4, http:\/\/www.trustedcomputinggroup.org\/"},{"key":"28_CR4","first-page":"249","volume-title":"IEEE International Conference on Dependable Systems and Networks (DSN 2002)","author":"N. Cook","year":"2002","unstructured":"Cook, N., Shrivastava, S.K., Wheater, S.: Distributed Object Middleware to Support Dependable Information Sharing Between Organisations. In: IEEE International Conference on Dependable Systems and Networks (DSN 2002), Washington DC, pp. 249\u2013258. IEEE Computer Society, Los Alamitos (2002)"},{"issue":"4","key":"28_CR5","doi-asserted-by":"publisher","first-page":"565","DOI":"10.1142\/S0218843006001499","volume":"15","author":"N. Cook","year":"2006","unstructured":"Cook, N., Robinson, P., Shrivastava, S.K.: Design and Implementation of Web Services Middleware to Support Fair Non-repudiable Interactions. Int. J. Cooperative Information Systems (IJCIS) Special Issue on Enterprise Distributed Computing\u00a015(4), 565\u2013597 (2006)","journal-title":"Int. J. Cooperative Information Systems (IJCIS) Special Issue on Enterprise Distributed Computing"},{"key":"28_CR6","first-page":"1","volume-title":"First IEEE International Workshop on Electronic Contracting","author":"C. Molina-Jimenez","year":"2004","unstructured":"Molina-Jimenez, C., Shrivastava, S.K., Crowcroft, J., Gevros, P.: On the Monitoring of Service Level Agreements. In: First IEEE International Workshop on Electronic Contracting, San Diego, pp. 1\u20138. IEEE Computer Society, Los Alamitos (2004)"},{"key":"28_CR7","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1145\/1216993.1216997","volume-title":"Sixth International Workshop on Software and Performance (WOSP 2007)","author":"J. Skene","year":"2007","unstructured":"Skene, J., Skene, A., Crampton, J., Emmerich, W.: The monitorability of service-level agreements for application-service provision. In: Sixth International Workshop on Software and Performance (WOSP 2007), Buenos Aires, Argentina, pp. 3\u201314. ACM, New York (2007)"},{"key":"28_CR8","doi-asserted-by":"crossref","unstructured":"Zseby, T., Zander, S., Carle, G.: Policy\u2013Based Accounting, IETF RFC 3334 (October 2002), http:\/\/www.ietf.org\/rfc\/rfc3334.txt","DOI":"10.17487\/rfc3334"},{"key":"28_CR9","doi-asserted-by":"crossref","first-page":"55","DOI":"10.1109\/SRDS.2007.30","volume-title":"26th IEEE International Symposium on Reliable Distributed Systems (SRDS 2007)","author":"V. Kher","year":"2007","unstructured":"Kher, V., Kim, Y.: Building Trust in Storage Outsourcing: Secure Accounting of Utility Storage. In: 26th IEEE International Symposium on Reliable Distributed Systems (SRDS 2007), Beijing, pp. 55\u201364. IEEE Computer Society, Los Alamitos (2007)"},{"key":"28_CR10","doi-asserted-by":"publisher","first-page":"273","DOI":"10.1109\/WETICE.2007.4407170","volume-title":"16th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE 2007)","author":"F. Scibilia","year":"2007","unstructured":"Scibilia, F.: Accounting of Storage Resources in gLite Based Infrastructures. In: 16th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE 2007), Paris, pp. 273\u2013278. IEEE Computer Society, Los Alamitos (2007)"},{"key":"28_CR11","doi-asserted-by":"crossref","unstructured":"Yumerefendi, A.R., Chase, J.S.: Strong Accountability for Network Storage. ACM Trans. on Storage\u00a03(3) (2007)","DOI":"10.1145\/1288783.1288786"},{"key":"28_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"282","DOI":"10.1007\/3-540-36504-4_20","volume-title":"Financial Cryptography","author":"J. Ioannidis","year":"2003","unstructured":"Ioannidis, J., Ioannidis, S., Keromytis, A.D., Prevelakis, V.: Fileteller: Paying and Getting Paid for File Storage. In: Blaze, M. (ed.) FC 2002. LNCS, vol.\u00a02357, pp. 282\u2013289. Springer, Heidelberg (2003)"},{"key":"28_CR13","unstructured":"Garfinkel, L.S.: An Evaluation of Amazon\u2019s Grid Computing Services: EC2, S3 and SQS. Technical Report TR-08-07; Center for Research on Computing and Society, School of Engineering and Applied Science, Harvard University (2007)"},{"key":"28_CR14","first-page":"251","volume-title":"Annual ACM Conference (SIGMOD 2008)","author":"M. Brantner","year":"2008","unstructured":"Brantner, M., Florescu, D., Graf, D., Kossmann, D., Kraska, T.: Building a Database on S3. In: Annual ACM Conference (SIGMOD 2008), Vancouver, pp. 251\u2013263. ACM, New York (2008)"},{"key":"28_CR15","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1109\/ECOWS.2007.8","volume-title":"Proceedings of the Fifth IEEE European Conference on Web Services (ECOWS 2007)","author":"M. Mazzucco","year":"2007","unstructured":"Mazzucco, M., Mitrani, I., Palmer, J., Fisher, M., McKee, P.: Web Service Hosting and Revenue Maximization. In: Proceedings of the Fifth IEEE European Conference on Web Services (ECOWS 2007), Halle, Saale, Germany, pp. 45\u201354. IEEE Computer Society, Los Alamitos (2007)"}],"container-title":["Lecture Notes in Computer Science","Service-Oriented Computing \u2013 ICSOC 2007"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-01247-1_28","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,5,24]],"date-time":"2023-05-24T21:54:12Z","timestamp":1684965252000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-01247-1_28"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783540749738","9783540749745"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-01247-1_28","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2009]]}}}