{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T13:19:24Z","timestamp":1725455964651},"publisher-location":"Berlin, Heidelberg","reference-count":15,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642328725"},{"type":"electronic","value":"9783642328732"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-32873-2_11","type":"book-chapter","created":{"date-parts":[[2012,8,13]],"date-time":"2012-08-13T13:06:24Z","timestamp":1344863184000},"page":"156-161","source":"Crossref","is-referenced-by-count":2,"title":["Towards Enabling Behavioral Trust among Participating Cloud Forensic Data Center Agencies"],"prefix":"10.1007","author":[{"given":"Sean","family":"Thorpe","sequence":"first","affiliation":[]},{"given":"Tyrone","family":"Grandison","sequence":"additional","affiliation":[]},{"given":"Indrajit","family":"Ray","sequence":"additional","affiliation":[]},{"given":"Abbie","family":"Barbir","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"11_CR1","unstructured":"Mell, P., Grance, T.: NIST Definition of Cloud Computing, \n                    \n                      http:\/\/csrc.nist.gov\/publications\/nistpubs\/800-145\/SP800-145.pdf\n                    \n                    \n                   (retrieved from: September 2009)"},{"key":"11_CR2","volume-title":"Digital Evidence and Computer Crime","author":"E. Casey","year":"2004","unstructured":"Casey, E.: Digital Evidence and Computer Crime, 2nd edn. Academic Press, San Diego (2004)","edition":"2"},{"key":"11_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1007\/11590354_6","volume-title":"Grid and Cooperative Computing - GCC 2005","author":"E. Papalilo","year":"2005","unstructured":"Papalilo, E., Friese, T., Smith, M., Freisleben, B.: Trust Shaping: Adapting Trust Establishment and Management to Application Requirements in a Service-Oriented Grid Environment. In: Zhuge, H., Fox, G.C. (eds.) GCC 2005. LNCS, vol.\u00a03795, pp. 47\u201358. Springer, Heidelberg (2005)"},{"key":"11_CR4","unstructured":"GridSim, \n                    \n                      http:\/\/www.gridbus.org\/gridsim"},{"key":"11_CR5","unstructured":"Foster, I., Kesselman, C.: The Grid2: Blueprint for a New Computing Infrastructure. Morgan Kaufmann (2004)"},{"key":"11_CR6","unstructured":"Ali, A.S., Rana, O., Walker, D.W.: WS-QoC: Measuring Quality of Service Compliance. In: Proceeding of the Second International Conference on Service-Oriented Computing Short Papers (ICSOC), New York, USA, pp. 16\u201325 (2004)"},{"key":"11_CR7","unstructured":"Lindstrom, P.: Attacking and Defending Web Service (2004), \n                    \n                      http:\/\/www.forumsystems.com\/papers\/AttackingandDefending_WS.pdf"},{"key":"11_CR8","unstructured":"De Roure, D., Jennings, N., Shadbolt, N.: Research Agenda for the Semantic Grid: A Future E-Science Infrastructure (2001), \n                    \n                      http:\/\/www.semanticgrid.org\/v1.9\/semgrid.pdf"},{"key":"11_CR9","unstructured":"Foster, I., Kishimoto, H., Savva, A., Berry, D., Djaoui, A., Grimshaw, A., Horn, B., Maciel, F., Siebenlist, F., Subramaniam, R., Treadwell, J., Von Reich, J.: The Open Grid Services Architecture (2005), \n                    \n                      http:\/\/www.gridforum.org\/documents\/GWD-I-E\/GFDI.030.pdf"},{"key":"11_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1264","DOI":"10.1007\/978-3-540-76843-2_8","volume-title":"On the Move to Meaningful Internet Systems 2007: CoopIS, DOA, ODBASE, GADA, and IS","author":"E. Papalilo","year":"2007","unstructured":"Papalilo, E., Freisleben, B.: Combining Incomparable Public Session Keys and Certificateless Public Key Cryptography for Securing the Communication Between Grid Participants. In: Meersman, R., Tari, Z. (eds.) OTM 2007, Part II. LNCS, vol.\u00a04804, pp. 1264\u20131279. Springer, Heidelberg (2007)"},{"key":"11_CR11","doi-asserted-by":"crossref","unstructured":"Thorpe, S.: Modeling Trust in a Cloud Computing Context. In: Proceedings of the ACM CIKM\/PIKM (October 2010)","DOI":"10.1145\/1871902.1871921"},{"key":"11_CR12","unstructured":"Thorpe, S., Ray, I.: Detecting Temporal Inconsistency in Virtual Machine Activity Timelines. Proceedings of Journal of Information Assurance and Security (JIAS)\u00a07(1) (May 2012)"},{"issue":"2","key":"11_CR13","first-page":"495","volume":"6","author":"S. Thorpe","year":"2011","unstructured":"Thorpe, S., Ray, I.: File Timestamps in a Cloud Digital Investigation. Journal of Information Assurance and Security\u00a06(2), 495\u2013502 (2011) ISSN1554-1010","journal-title":"Journal of Information Assurance and Security"},{"key":"11_CR14","doi-asserted-by":"crossref","unstructured":"Grandison, T., Sloman, M.: A survey of trust in Internet applications. IEEE Communications Surveys& Tutorials\u00a03(4) (2000)","DOI":"10.1109\/COMST.2000.5340804"},{"key":"11_CR15","unstructured":"Riley, D., Wren, C., Berry, T.: Cloud Forensic Challenges for Law Enforcement proceedings. In: Proceedings of the International Conference for Internet Technology and Secured Transactions, London, UK (November 2010)"}],"container-title":["Lecture Notes in Computer Science","Secure Data Management"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-32873-2_11.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,4]],"date-time":"2021-05-04T12:18:57Z","timestamp":1620130737000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-32873-2_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642328725","9783642328732"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-32873-2_11","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2012]]}}}