{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T00:21:13Z","timestamp":1743034873266,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":51,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642308666"},{"type":"electronic","value":"9783642308673"}],"license":[{"start":{"date-parts":[[2013,1,1]],"date-time":"2013-01-01T00:00:00Z","timestamp":1356998400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2013,1,1]],"date-time":"2013-01-01T00:00:00Z","timestamp":1356998400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-30867-3_42","type":"book-chapter","created":{"date-parts":[[2012,7,17]],"date-time":"2012-07-17T16:00:06Z","timestamp":1342540806000},"page":"467-479","source":"Crossref","is-referenced-by-count":1,"title":["A Novel Agent-Based Framework in Bridge-Mode Hypervisors of Cloud Security"],"prefix":"10.1007","author":[{"given":"Maziar","family":"Janbeglou","sequence":"first","affiliation":[]},{"given":"WeiQi","family":"Yan","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"42_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"232","DOI":"10.1007\/978-3-642-10665-1_21","volume-title":"Cloud Computing","author":"X. Wu","year":"2009","unstructured":"Wu, X., Wang, W., Lin, B., Miao, K.: Composable IO: A Novel Resource Sharing Platform in Personal Clouds. In: Jaatun, M.G., Zhao, G., Rong, C. (eds.) CloudCom 2009. LNCS, vol.\u00a05931, pp. 232\u2013242. Springer, Heidelberg (2009)"},{"key":"42_CR2","doi-asserted-by":"crossref","unstructured":"Weiss, A.: Computing in the clouds. netWorker, 16\u201325 (2007), doi:10.1145\/1327512.1327513.","DOI":"10.1145\/1327512.1327513"},{"key":"42_CR3","series-title":"Lecture Notes in Computer Science","first-page":"1","volume-title":"CloudCom 2009","author":"J.T. Yeh","year":"2009","unstructured":"Yeh, J.T.: The Many Colors and Shapes of Cloud. In: Jaatun, M.G., Zhao, G., Rong, C. (eds.) CloudCom 2009. LNCS, vol.\u00a05931, p. 1. Springer, Heidelberg (2009)"},{"key":"42_CR4","unstructured":"David, W.C.: Cloud computing: Key initiative overview. Gartner (2010), doi:EUKEINCLCOOVRW012110"},{"key":"42_CR5","unstructured":"Mell, P., Grance, T.: The National institute of standards and technology (NIST) definition of cloud computing (2009)"},{"key":"42_CR6","doi-asserted-by":"publisher","first-page":"271","DOI":"10.1007\/978-1-84996-241-4\\_16","volume-title":"Security issues to cloud computing","author":"C. Onwubiko","year":"2010","unstructured":"Onwubiko, C.: Security issues to cloud computing, pp. 271\u2013288. Springer, London (2010), doi:10.1007\/978-1-84996-241-4_16"},{"issue":"8","key":"42_CR7","doi-asserted-by":"publisher","first-page":"1061","DOI":"10.1016\/S0167-739X(02)00085-7","volume":"18","author":"D. Abramson","year":"2002","unstructured":"Abramson, D., Buyya, R., Giddy, J.: A computational economy for grid computing and its implementation in the nimrod-g resource broker. Future Generation Computer Systems (FGCS)\u00a018(8), 1061\u20131074 (2002)","journal-title":"Future Generation Computer Systems (FGCS)"},{"key":"42_CR8","doi-asserted-by":"publisher","first-page":"26","DOI":"10.1109\/MC.2009.26","volume":"42","author":"R.T. Kouzes","year":"2009","unstructured":"Kouzes, R.T., Anderson, G.A., Elbert, S.T., Gorton, I., Gracio, D.K.: The changing paradigm of data-intensive computing. Computer\u00a042, 26\u201334 (2009)","journal-title":"Computer"},{"key":"42_CR9","unstructured":"Mather, T., Kumaraswamy, S., Latif, S.: Cloud security and privacy: An enterprise perspective on risks and compliance. O\u2019Reilly Media (2009)"},{"key":"42_CR10","doi-asserted-by":"crossref","unstructured":"Zhang, Q., Cheng, L., Boutaba, R.: Cloud computing: State-of-the-art and research challenges. Journal of Internet Services and Applications, 7\u201318 (2010), doi:10.1007\/s13174-010-0007-6","DOI":"10.1007\/s13174-010-0007-6"},{"key":"42_CR11","unstructured":"Gourley, B.: Cloud computing and cyber defense. A white paper provided to the national security council and homeland security council as input to the White House review of communications and information infrastructure (2009)"},{"key":"42_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"678","DOI":"10.1007\/11590354_85","volume-title":"Grid and Cooperative Computing - GCC 2005","author":"H. Yang","year":"2005","unstructured":"Yang, H., Wu, G., Zhang, J.-z.: On-Demand Resource Allocation for Service Level Guarantee in Grid Environment. In: Zhuge, H., Fox, G.C. (eds.) GCC 2005. LNCS, vol.\u00a03795, pp. 678\u2013689. Springer, Heidelberg (2005)"},{"key":"42_CR13","series-title":"CCIS","doi-asserted-by":"publisher","first-page":"629","DOI":"10.1007\/978-3-642-16444-6_79","volume-title":"Security-Enriched Urban Computing and Smart Grid","author":"T.H. Oh","year":"2010","unstructured":"Oh, T.H., Lim, S., Choi, Y.B., Park, K.-R., Lee, H., Choi, H.: State of the Art of Network Security Perspectives in Cloud Computing. In: Kim, T.-h., Stoica, A., Chang, R.-S. (eds.) SUComS 2010. CCIS, vol.\u00a078, pp. 629\u2013637. Springer, Heidelberg (2010)"},{"key":"42_CR14","doi-asserted-by":"crossref","unstructured":"Espadas, J., Molina, A., Jimenez, G., Molina, M., Ramirez, R., Concha, D.: A tenant-based resource allocation model for scaling Software-as-a-Service applications over cloud computing infrastructures (2011), doi:10.1016\/j.future.2011.10.013","DOI":"10.1016\/j.future.2011.10.013"},{"key":"42_CR15","doi-asserted-by":"crossref","unstructured":"Mahmood, Z.: Cloud computing for enterprise architectures: concepts, principles and approaches. In: Cloud Computing for Enterprise Architectures, pp. 3\u201310. Springer (2011)","DOI":"10.1007\/978-1-4471-2236-4_1"},{"key":"42_CR16","unstructured":"Dawoud, W., Takouna, I., Meinel, C.: Infrastructure as a service security: Challenges and solutions. In: 2010 7th International Conference on Informatics and Systems, INFOS 2010, Cairo, Egypt, March 28-30 (2010)"},{"key":"42_CR17","doi-asserted-by":"crossref","unstructured":"Dave, T.: Enabling application agility - Software as a Service, cloud computing and dynamic languages. Journal of Object Technology, 29\u201332 (2008)","DOI":"10.5381\/jot.2008.7.4.c3"},{"key":"42_CR18","unstructured":"Frederick, C., Gianpaolo, C.: Architecture strategies for catching the long tail. Microsoft Corporation (2006)"},{"key":"42_CR19","unstructured":"Gillett, F.E.: The new tech ecosystems of cloud, cloud services, and cloud computing. Forrester Research (2008)"},{"issue":"10","key":"42_CR20","doi-asserted-by":"publisher","first-page":"38","DOI":"10.1109\/MC.2003.1236470","volume":"36","author":"M. Turner","year":"2003","unstructured":"Turner, M., Budgen, D., Brereton, P.: Turning software into a service. Computer\u00a036(10), 38\u201344 (2003), doi:10.1109\/mc.2003.1236470","journal-title":"Computer"},{"key":"42_CR21","doi-asserted-by":"crossref","unstructured":"Lawton, G.: Developing software online with Platform-as-a-Service technology. Computer, 13\u201315 (2008), doi:10.1109\/mc.2008.185","DOI":"10.1109\/MC.2008.185"},{"key":"42_CR22","doi-asserted-by":"crossref","unstructured":"Buyya, R., Yeo, C.S., Venugopal, S., Broberg, J., Brandic, I.: Cloud computing and emerging IT platforms: Vision, hype, and reality for delivering computing as the 5th utility. Future Generation Computer Systems, 599\u2013616 (2009), doi:10.1016\/j.future.2008.12.001","DOI":"10.1016\/j.future.2008.12.001"},{"key":"42_CR23","doi-asserted-by":"crossref","unstructured":"Dillon, T., Chen, W., Chang, E.: Cloud Computing: Issues and Challenges. In: 24th IEEE International Conference on Advanced Information Networking and Applications, AINA, pp. 27\u201333 (2010)","DOI":"10.1109\/AINA.2010.187"},{"key":"42_CR24","unstructured":"Wang, C., Wang, Q., Ren, K., Lou, W.: Ensuring data storage security in cloud computing. Cryptology ePrint archive, report 2009\/081 (2009)"},{"key":"42_CR25","doi-asserted-by":"publisher","first-page":"23","DOI":"10.1109\/MITP.2009.40","volume":"11","author":"R.L. Grossman","year":"2009","unstructured":"Grossman, R.L.: The case for cloud computing. IT Professional\u00a011, 23\u201327 (2009)","journal-title":"IT Professional"},{"key":"42_CR26","unstructured":"Grossman, R.L., Gu, Y.: On the varieties of clouds for data intensive computing (2009)"},{"key":"42_CR27","doi-asserted-by":"crossref","unstructured":"Pearson, S.: Taking account of privacy when designing cloud computing services. In: 2009 ICSE Workshop on Software Engineering Challenges of Cloud Computing, CLOUD 2009, Vancouver, BC, Canada, May 23 (2009)","DOI":"10.1109\/CLOUD.2009.5071532"},{"key":"42_CR28","unstructured":"Anthony, T.V., Toby, J.V., Robert, E.: Cloud computing: A practical approach. McGraw-Hill (2010)"},{"key":"42_CR29","doi-asserted-by":"crossref","unstructured":"Llanos, D.R.: Review of grid computing security by anirban chakrabarti, pp. 45\u201345. Springer (2007) ISBN: 3540444920.45-45, doi:10.1145\/1317394.1317406","DOI":"10.1145\/1317394.1317406"},{"key":"42_CR30","doi-asserted-by":"crossref","unstructured":"Szefer, J., Keller, E., Lee, R.B., Rexford, J.: Eliminating the hypervisor attack surface for a more secure cloud. In: 18th ACM Conference on Computer and Communications Security, CCS 2011, Chicago, IL, United states, October 17-21 (2011)","DOI":"10.1145\/2046707.2046754"},{"key":"42_CR31","doi-asserted-by":"crossref","unstructured":"Tolnai, A., Von Solms, S.H.: Securing the cloud\u2019s core virtual infrastructure. In: 5th International Conference on Broadband Wireless Computing, Communication and Applications, BWCCA 2010, Fukuoka, Japan, November 4-6 (2010)","DOI":"10.1109\/BWCCA.2010.112"},{"key":"42_CR32","unstructured":"Klein, G., Elphinstone, K., Heiser, G., Andronick, J., Cock, D., Derrin, P., Elkaduwe, D., Engelhardt, K., Kolanski, R., Norrish, M., Sewell, T., Tuch, H., Winwood, S.: Formal verification of an OS kernel. In: 22nd ACM SIGOPS Symposium on Operating Systems Principles, SOSP 2009, Big Sky, MT, United states, October 11-14 (2009)"},{"key":"42_CR33","doi-asserted-by":"crossref","unstructured":"Barham, P., Dragovic, B., Fraser, K., Hand, S., Harris, T., Ho, A., Neugebauer, R., Pratt, I., Warfield, A.: Xen and the art of virtualization. In: SOSP 2003: Proceedings of the 19th ACM Symposium on Operating Systems Principles, Lake George, NY, United states, October 19-22 (2003)","DOI":"10.1145\/945445.945462"},{"key":"42_CR34","unstructured":"Nishikiori, M.: Server virtualization with VMware vSphere 4. Fujitsu Scientific and Technical Journal, 356\u2013361 (2011)"},{"key":"42_CR35","doi-asserted-by":"crossref","unstructured":"Muthu, R.: Component-based development for cloud computing architectures. In: Cloud Computing for Enterprise Architectures, pp. 91\u2013113. Springer (2011)","DOI":"10.1007\/978-1-4471-2236-4_5"},{"key":"42_CR36","unstructured":"dos Santos Ramos, J.C.C.: Security challenges with virtualization. universidade de lisboa (2009)"},{"key":"42_CR37","unstructured":"Larry, D.: Virtualization: What are the security risks? ZDnet (2008), \n                    http:\/\/www.zdnet.com\/blog\/security\/virtualization-what-are-the-security-risks\/821\n                   (accessed January 22)"},{"key":"42_CR38","doi-asserted-by":"crossref","unstructured":"Garfinkel, T., Pfaff, B., Chow, J., Rosenblum, M., Boneh, D.: Terra: a virtual machine-based platform for trusted computing. In: Proceedings of the Nineteenth ACM Symposium on Operating Systems Principles, Bolton Landing, NY, USA (2003)","DOI":"10.1145\/945445.945464"},{"key":"42_CR39","unstructured":"Joel, K.: Virtual machine security guidelines (September 2007)"},{"key":"42_CR40","doi-asserted-by":"crossref","unstructured":"Janbeglou, M., Zamani, M., Ibrahim, S.: Redirecting outgoing DNS requests toward a fake DNS server in a LAN. In: 2010 IEEE International Conference on Software Engineering and Service Sciences, ICSESS 2010, Beijing, China, July 16-18 (2010)","DOI":"10.1109\/ICSESS.2010.5552339"},{"key":"42_CR41","doi-asserted-by":"crossref","unstructured":"Nourian, A., Maheswaran, M.: Privacy and security requirements of data intensive computing in clouds. In: Handbook of Data Intensive Computing. Springer Science and Business Media (2011), doi:10.1007\/978-1-4614-1415-5 19","DOI":"10.1007\/978-1-4614-1415-5_19"},{"key":"42_CR42","unstructured":"Rittinghouse, J.W., Ransome, J.F.: Cloud computing: implementation, management, and security. CRC Press (2009)"},{"key":"42_CR43","doi-asserted-by":"crossref","unstructured":"Basak, D., Toshniwal, R., Maskalik, S., Sequeira, A.: Virtualizing networking and security in the cloud, pp. 86\u201394 (2010), doi:10.1145\/1899928.1899939","DOI":"10.1145\/1899928.1899939"},{"key":"42_CR44","doi-asserted-by":"crossref","unstructured":"Ferguson, P., Senie, D.: Network ingress filtering: Defeating denial of service attacks which employ IP source address spoofing. RFC 2827 (2000)","DOI":"10.17487\/rfc2827"},{"key":"42_CR45","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"239","DOI":"10.1007\/11593980_18","volume-title":"Information Systems Security","author":"V. Ramachandran","year":"2005","unstructured":"Ramachandran, V., Nandi, S.: Detecting ARP Spoofing: An Active Technique. In: Jajodia, S., Mazumdar, C. (eds.) ICISS 2005. LNCS, vol.\u00a03803, pp. 239\u2013250. Springer, Heidelberg (2005)"},{"key":"42_CR46","unstructured":"Thawatchai, C.: Sniffing packets on LAN without ARP spoofing. In: 3rd International Conference on Convergence and Hybrid Information Technology, ICCIT 2008, Busan, Republic of Korea, November 11-13 (2008)"},{"key":"42_CR47","doi-asserted-by":"crossref","unstructured":"Pu, X., Liu, M., Jin, J., Cao, Y.: A modeling of network I\/O efficiency in Xen virtualized clouds. In: International Conference on Electronics, Communications and Control, ICECC 2011, Ningbo, China, September 9-11 (2011)","DOI":"10.1109\/ICECC.2011.6067679"},{"key":"42_CR48","doi-asserted-by":"publisher","first-page":"298","DOI":"10.1007\/978-3-642-21444-8\\_26","volume-title":"Challenges for cloud networking security mobile networks and management","author":"P. Schoo","year":"2011","unstructured":"Schoo, P., Fusenig, V., Souza, V., Melo, M., Murray, P., Debar, H., Medhioub, H., Zeghlache, D.: Challenges for cloud networking security mobile networks and management, pp. 298\u2013313. Springer, Heidelberg (2011), doi:10.1007\/978-3-642-21444-8_26"},{"key":"42_CR49","unstructured":"Wu, H., Ding, Y., Yao, L., Winer, C.: Network security for virtual machine in cloud computing. In: 5th International Conference on Computer Sciences and Convergence Information Technology, ICCIT 2010, Seoul, Republic of Korea, November 30-December 2 (2010)"},{"key":"42_CR50","unstructured":"Man, N.D., Huh, E.-N.: A collaborative intrusion detection system framework for cloud computing. In: International Conference on IT Convergence and Security 2011, ICITCS 2011, Suwon, Republic of Korea, December 14-16 (2012)"},{"key":"42_CR51","unstructured":"Masayuki, O., Tetsuo, S., Takuya, S.: Security architectures for cloud computing, fujitso (2010)"}],"container-title":["Advances in Intelligent Systems and Computing","7th International Conference on Knowledge Management in Organizations: Service and Cloud Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-30867-3_42","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,30]],"date-time":"2023-01-30T17:07:28Z","timestamp":1675098448000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-642-30867-3_42"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642308666","9783642308673"],"references-count":51,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-30867-3_42","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2013]]}}}