{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T03:34:39Z","timestamp":1725593679220},"publisher-location":"Berlin, Heidelberg","reference-count":10,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642223648"},{"type":"electronic","value":"9783642223655"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-22365-5_22","type":"book-chapter","created":{"date-parts":[[2011,6,28]],"date-time":"2011-06-28T02:07:06Z","timestamp":1309226826000},"page":"182-189","source":"Crossref","is-referenced-by-count":0,"title":["Dynamic Security Monitoring and Accounting for Virtualized Environments"],"prefix":"10.1007","author":[{"given":"Antonio","family":"Mu\u00f1oz","sequence":"first","affiliation":[]},{"given":"Rajesh","family":"Harjani","sequence":"additional","affiliation":[]},{"given":"Antonio","family":"Ma\u00f1a","sequence":"additional","affiliation":[]},{"given":"Rodrigo","family":"D\u00edaz","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"22_CR1","doi-asserted-by":"crossref","first-page":"209","DOI":"10.1145\/1755913.1755935","volume-title":"Proceedings of the 5th European Conference on Computer systems (EuroSys 2010)","author":"U. Steinberg","year":"2010","unstructured":"Steinberg, U., Kauer, B.: NOVA: a microhypervisor-based secure virtualization architecture. In: Proceedings of the 5th European Conference on Computer systems (EuroSys 2010), pp. 209\u2013222. ACM, New York (2010)"},{"key":"22_CR2","unstructured":"Chowdhury, A., Meyers, S.: Facilitating Software Maintenance by Automated Detection of Constraint Violations, Tech. Rep. CS-93-37 Brown Univ. (1993)"},{"key":"22_CR3","doi-asserted-by":"crossref","unstructured":"Sellink, A., Verhoef, C.: An Architecture for Automated Software Maintenance. In: Proceedings of the 7th Intl. Workshop on Program Comprehension (1999)","DOI":"10.1109\/WPC.1999.777742"},{"issue":"1-4","key":"22_CR4","doi-asserted-by":"publisher","first-page":"315","DOI":"10.1023\/A:1018941228255","volume":"9","author":"C. Verhoef","year":"2000","unstructured":"Verhoef, C.: Towards automated modification of legacy assets. Annals of Software Engineering\u00a09(1-4), 315\u2013336 (2000)","journal-title":"Annals of Software Engineering"},{"key":"22_CR5","doi-asserted-by":"crossref","unstructured":"van den Brand, M.G.J., Sellink, M.P.A., Verhoef, C.: Control flow normalization for COBOL\/CICS legacy system. In: Proceedings of the 2nd Euromicro Conf. on Maintenance and Reengineering","DOI":"10.1109\/CSMR.1998.665727"},{"issue":"6","key":"22_CR6","doi-asserted-by":"publisher","first-page":"737","DOI":"10.1016\/S1071-5819(03)00041-7","volume":"58","author":"L. Corritore","year":"2003","unstructured":"Corritore, L., et al.: On-line trust: concepts, evolving themes, a model. Int. J. of Human-Computer Studies\u00a058(6), 737\u2013758 (2003)","journal-title":"Int. J. of Human-Computer Studies"},{"key":"22_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"209","DOI":"10.1007\/978-3-540-74810-6_8","volume-title":"Foundations of Security Analysis and Design IV","author":"A. J\u00f8sang","year":"2007","unstructured":"J\u00f8sang, A.: Trust and Reputation Systems. In: Aldini, A., Gorrieri, R. (eds.) FOSAD 2007. LNCS, vol.\u00a04677, pp. 209\u2013245. Springer, Heidelberg (2007)"},{"key":"22_CR8","unstructured":"McKnight, D.H., Chervany, N.L.: The Meanings of Trust. Technical Report MISRC Working Paper Series 96-04, University of Minnesota (1996)"},{"issue":"12","key":"22_CR9","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1145\/355112.355122","volume":"43","author":"P. Resnick","year":"2000","unstructured":"Resnick, P., et al.: Reputation systems. Communications of the ACM\u00a043(12), 45\u201348 (2000)","journal-title":"Communications of the ACM"},{"key":"22_CR10","doi-asserted-by":"crossref","unstructured":"Spanoudakis, G.: Dynamic Trust Assessment of Software Services. In: Proc. of 2nd International Workshop on Service Oriented Software Engineering, IW-SOSE 2007 (2007)","DOI":"10.1145\/1294928.1294937"}],"container-title":["Communications in Computer and Information Science","Secure and Trust Computing, Data Management, and Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-22365-5_22","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,11,27]],"date-time":"2021-11-27T00:23:21Z","timestamp":1637972601000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-22365-5_22"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642223648","9783642223655"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-22365-5_22","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2011]]}}}