{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T15:31:29Z","timestamp":1725723089916},"publisher-location":"Berlin, Heidelberg","reference-count":23,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642374364"},{"type":"electronic","value":"9783642374371"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-37437-1_6","type":"book-chapter","created":{"date-parts":[[2013,4,20]],"date-time":"2013-04-20T04:37:06Z","timestamp":1366432626000},"page":"61-72","source":"Crossref","is-referenced-by-count":7,"title":["A Cloud Provider Description Schema for Meeting Legal Requirements in Cloud Federation Scenarios"],"prefix":"10.1007","author":[{"given":"George","family":"Kousiouris","sequence":"first","affiliation":[]},{"given":"George","family":"Vafiadis","sequence":"additional","affiliation":[]},{"given":"Marcelo","family":"Corrales","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"unstructured":"COM 11 final. Proposal for a Regulation of the European Parliament and of the Council on the protection of individuals with regard to the processing of personal data and on the free movement of such data (General Data Protection Regulation), pp. 1\u20132 (2012), \n                    \n                      http:\/\/ec.europa.eu\/justice\/data-protection\/document\/review2012\/com_2012_11_en.pdf","key":"6_CR1"},{"unstructured":"OPTIMIS Project Deliverable D.7.2.1.3 \u201cCloud Legal Guidelines: Technical Implementation of Legal Requirements, Exploitation of the Toolkit in Use Cases and Component Licenses\u201d, pp. 23\u201333","key":"6_CR2"},{"key":"6_CR3","doi-asserted-by":"publisher","first-page":"85","DOI":"10.1145\/1655008.1655020","volume-title":"Proceedings of the 2009 ACM Workshop on Cloud Computing Security (CCSW 2009)","author":"R. Chow","year":"2009","unstructured":"Chow, R., Golle, P., Jakobsson, M., Shi, E., Staddon, J., Masuoka, R., Molina, J.: Controlling data in the cloud: outsourcing computation without outsourcing control. In: Proceedings of the 2009 ACM Workshop on Cloud Computing Security (CCSW 2009), pp. 85\u201390. ACM, New York (2009)"},{"key":"6_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"131","DOI":"10.1007\/978-3-642-10665-1_12","volume-title":"Cloud Computing","author":"S. Pearson","year":"2009","unstructured":"Pearson, S., Charlesworth, A.: Accountability as a Way Forward for Privacy Protection in the Cloud. In: Jaatun, M.G., Zhao, G., Rong, C. (eds.) CloudCom. LNCS, vol.\u00a05931, pp. 131\u2013144. Springer, Heidelberg (2009)"},{"issue":"4","key":"6_CR5","doi-asserted-by":"publisher","first-page":"12","DOI":"10.1147\/JRD.2009.5429058","volume":"53","author":"B. Rochwerger","year":"2009","unstructured":"Rochwerger, B., Breitgand, D., Levy, E., Galis, A., Nagin, K., Llorente, I.M., Montero, R., Wolfsthal, Y., Elmroth, E., Caceres, J., Ben-Yehuda, M., Emmerich, W., Galan, F.: The Reservoir model and architecture for open federated cloud computing. IBM Journal of Research and Development\u00a053(4), 4:1-4:11 (2009)","journal-title":"IBM Journal of Research and Development"},{"key":"6_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1007\/978-3-642-13119-6_2","volume-title":"Algorithms and Architectures for Parallel Processing","author":"R. Buyya","year":"2010","unstructured":"Buyya, R., Ranjan, R., Calheiros, R.N.: InterCloud: Utility-oriented federation of cloud computing environments for scaling of application services. In: Hsu, C.-H., Yang, L.T., Park, J.H., Yeo, S.-S. (eds.) ICA3PP 2010, Part I. LNCS, vol.\u00a06081, pp. 13\u201331. Springer, Heidelberg (2010)"},{"unstructured":"Article 29 Working Party, WP 74, Transfer of Personal Data to Third Countries: Applying Article 26 (2) of the EU Data Protection Directive to Binding Corporate Rules for International Data Transfers","key":"6_CR7"},{"unstructured":"European Commission, Commission Decisions on the Adequacy of the Protection of Personal Data in Third Countries, \n                    \n                      http:\/\/ec.europa.eu\/justice\/data-protection\/document\/international-transfers\/adequacy\/index_en.htm","key":"6_CR8"},{"unstructured":"http:\/\/www.kyotoprotocol.com\/","key":"6_CR9"},{"unstructured":"OPTIMIS Project Deliverable 7.2.1.1 Cloud Legal Guidelines, pp. 91\u201393","key":"6_CR10"},{"doi-asserted-by":"crossref","unstructured":"Kousiouris, G., Vafiadis, G., Varvarigou, T.: A Front-end Hadoop based Data Management Service for Efficient Federated Clouds. In: 2011 IEEE Third International Conference on Cloud Computing Technology and Science (CloudCom), November 29-December 1, pp. 511\u2013516 (2011)","key":"6_CR11","DOI":"10.1109\/CloudCom.2011.76"},{"unstructured":"Ferrer, A., et al.: OPTIMIS: A holistic approach to cloud service provisioning. Future Generation Computer Systems\u00a028(1), 66\u201377 (2012) ISSN 0167-739X, 10.1016\/j.future.2011.05.022","key":"6_CR12"},{"unstructured":"Barnitzke, B., et al.: Legal Restraints and Security Requirements on Per-sonal Data and Their Technical Implementation in Clouds. In: Workshop for E-contracting for Clouds, eChallenges (2011)","key":"6_CR13"},{"unstructured":"http:\/\/eur-lex.europa.eu\/LexUriServ\/LexUriServ.do?uri=OJ:L:2010:039:0005:0018:EN:PDF","key":"6_CR14"},{"key":"6_CR15","first-page":"51","volume-title":"Proceedings of the 13th International Conference on Artificial Intelligence and Law (ICAIL 2011)","author":"T.F. Gordon","year":"2011","unstructured":"Gordon, T.F.: Analyzing open source license compatibility issues with Carneades. In: Proceedings of the 13th International Conference on Artificial Intelligence and Law (ICAIL 2011), pp. 51\u201355. ACM, New York (2011)"},{"unstructured":"http:\/\/www.google.com\/intl\/en\/policies\/terms\/","key":"6_CR16"},{"unstructured":"Brandtzg, E., Parastoo, M., Mosser, S.: Towards a Domain-Specic Language to Deploy Applications in the Clouds. In: Third International Conference on Cloud Computing, GRIDs, and Virtualization (CLOUD COMPUTING 2012), Nice, France, pp. 1\u20136 (July 2012)","key":"6_CR17"},{"issue":"1983","key":"6_CR18","doi-asserted-by":"publisher","first-page":"20120075","DOI":"10.1098\/rsta.2012.0075","volume":"371","author":"Djemame","year":"2012","unstructured":"Djemame, et al.: Legal issues in clouds: towards a risk inventory. Phil. Trans. R. Soc. A\u00a0371(1983), 5, 20120075 (2013) (December 10, 2012) doi:10.1098\/rsta.2012.0075","journal-title":"Trans. R. Soc. A"},{"doi-asserted-by":"crossref","unstructured":"Toosi, A.N., Calheiros, R.N., Thulasiram, R.K., Buyya, R.: Resource Provisioning Policies to Increase IaaS Provider\u2019s Profit in a Federated Cloud Environment. In: 2011 IEEE 13th International Conference on High Performance Computing and Communications (HPCC), September 2-4, pp. 279\u2013287 (2011)","key":"6_CR19","DOI":"10.1109\/HPCC.2011.44"},{"doi-asserted-by":"crossref","unstructured":"Zhang, Z., Zhang, X.: A load balancing mechanism based on ant colony and complex network theory in open cloud computing federation. In: 2010 2nd International Conference on Industrial Mechatronics and Automation (ICIMA), May 30-31, vol.\u00a02, pp. 240\u2013243 (2010)","key":"6_CR20","DOI":"10.1109\/ICINDMA.2010.5538385"},{"unstructured":"OASIS LegalDocumentML TC, \n                    \n                      https:\/\/www.oasis-open.org\/committees\/tc_home.php?wg_abbrev=legaldocml","key":"6_CR21"},{"unstructured":"OASIS LegalRuleML TC, \n                    \n                      https:\/\/www.oasis-open.org\/committees\/tc_home.php?wg_abbrev=legalruleml#technical","key":"6_CR22"},{"unstructured":"OASIS LegalXMLeContracts TC, \n                    \n                      https:\/\/www.oasis-open.org\/committees\/tc_home.php?wg_abbrev=legalxml-econtracts#technical","key":"6_CR23"}],"container-title":["IFIP Advances in Information and Communication Technology","Collaborative, Trusted and Privacy-Aware e\/m-Services"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-37437-1_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,12]],"date-time":"2019-05-12T09:11:59Z","timestamp":1557652319000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-37437-1_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642374364","9783642374371"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-37437-1_6","relation":{},"ISSN":["1868-4238","1868-422X"],"issn-type":[{"type":"print","value":"1868-4238"},{"type":"electronic","value":"1868-422X"}],"subject":[],"published":{"date-parts":[[2013]]}}}