{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,18]],"date-time":"2025-10-18T10:41:26Z","timestamp":1760784086052,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":18,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783662486153"},{"type":"electronic","value":"9783662486160"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-662-48616-0_5","type":"book-chapter","created":{"date-parts":[[2015,11,24]],"date-time":"2015-11-24T16:18:43Z","timestamp":1448381923000},"page":"71-86","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":11,"title":["Runtime Model-Based Privacy Checks of Big Data Cloud Services"],"prefix":"10.1007","author":[{"given":"Eric","family":"Schmieders","sequence":"first","affiliation":[]},{"given":"Andreas","family":"Metzger","sequence":"additional","affiliation":[]},{"given":"Klaus","family":"Pohl","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,11,25]]},"reference":[{"issue":"9","key":"5_CR1","doi-asserted-by":"publisher","first-page":"2093","DOI":"10.1016\/j.comnet.2013.04.001","volume":"57","author":"G Aceto","year":"2013","unstructured":"Aceto, G., Botta, A., de Donato, W., Pescap\u00e8, A.: Cloud monitoring: A survey. Comput. Netw. 57(9), 2093\u20132115 (2013). http:\/\/www.sciencedirect.com\/science\/article\/pii\/S1389128613001084","journal-title":"Comput. Netw."},{"key":"5_CR2","doi-asserted-by":"crossref","unstructured":"Brosig, F., Huber, N., Kounev, S.: Automated extraction of architecture-level performance models of distributed component-based systems. In: 2011 26th IEEE\/ACM International Conference on Automated Software Engineering (ASE) (2011)","DOI":"10.1109\/ASE.2011.6100052"},{"issue":"4","key":"5_CR3","doi-asserted-by":"crossref","first-page":"1165","DOI":"10.2307\/41703503","volume":"36","author":"H Chen","year":"2012","unstructured":"Chen, H., Chiang, R.H., Storey, V.C.: Business intelligence and analytics: From big data to big impact. MIS Q. 36(4), 1165\u20131188 (2012)","journal-title":"MIS Q."},{"key":"5_CR4","series-title":"Monographs in Theoretical Computer Science. An EATCS Series","volume-title":"Fundamentals of Algebraic Graph Transformation","author":"H Ehrig","year":"2006","unstructured":"Ehrig, H., Ehrig, K., Prange, U., Taentzer, G.: Fundamentals of Algebraic Graph Transformation. Monographs in Theoretical Computer Science. An EATCS Series. Springer-Verlag New York Inc., Secaucus (2006)"},{"key":"5_CR5","doi-asserted-by":"crossref","unstructured":"Epifani, I., Ghezzi, C., Mirandola, R., Tamburrelli, G.: Model evolution by run-time parameter adaptation. In: 31st International Conference on Software Engineering (ICSE) (2009)","DOI":"10.1109\/ICSE.2009.5070513"},{"key":"5_CR6","unstructured":"e Ghazia, U., Masood, R., Shibli, M.: Comparative analysis of access control systems on cloud. In: 2012 13th ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel Distributed Computing (SNPD) (2012)"},{"key":"5_CR7","doi-asserted-by":"crossref","unstructured":"Gondree, M., Peterson, Z.N.: Geolocation of data in the cloud. In: Proceedings of the third ACM Conference on Data and Application Security and Privacy, CODASPY 2013. ACM, New York (2013)","DOI":"10.1145\/2435349.2435353"},{"key":"5_CR8","doi-asserted-by":"crossref","unstructured":"Huber, N., Brosig, F., Kounev, S.: Modeling dynamic virtualized resource landscapes. In: Proceedings of the 8th International ACM SIGSOFT Conference on Quality of Software Architectures (2012)","DOI":"10.1145\/2304696.2304711"},{"key":"5_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"62","DOI":"10.1007\/978-3-642-25535-9_5","volume-title":"Service-Oriented Computing","author":"D Ivanovi\u0107","year":"2011","unstructured":"Ivanovi\u0107, D., Carro, M., Hermenegildo, M.: Constraint-based runtime prediction of SLA violations in service orchestrations. In: Kappel, G., Maamar, Z., Motahari-Nezhad, H.R. (eds.) Service Oriented Computing. LNCS, vol. 7084, pp. 62\u201376. Springer, Heidelberg (2011)"},{"issue":"2","key":"5_CR10","doi-asserted-by":"publisher","first-page":"64","DOI":"10.1145\/2408776.2408793","volume":"56","author":"A Juels","year":"2013","unstructured":"Juels, A., Oprea, A.: New approaches to security and availability for cloud data. Commun. ACM 56(2), 64\u201373 (2013)","journal-title":"Commun. ACM"},{"key":"5_CR11","doi-asserted-by":"crossref","unstructured":"Mao, M., Humphrey, M.: A performance study on the VM startup time in the cloud. In: 2012 IEEE 5th International Conference on Cloud Computing (CLOUD), pp. 423\u2013430","DOI":"10.1109\/CLOUD.2012.103"},{"issue":"10","key":"5_CR12","doi-asserted-by":"publisher","first-page":"28","DOI":"10.1109\/MC.2009.336","volume":"42","author":"S Maoz","year":"2009","unstructured":"Maoz, S.: Using model-based traces as runtime models. Computer 42(10), 28\u201336 (2009)","journal-title":"Computer"},{"key":"5_CR13","doi-asserted-by":"crossref","unstructured":"Park, S., Chung, S.: Privacy-preserving attribute distribution mechanism for access control in a grid. In: 21st International Conference on Tools with Artificial Intelligence (2009)","DOI":"10.1109\/ICTAI.2009.128"},{"key":"5_CR14","series-title":"Lecture Notes in Computer Science","volume-title":"The Common Component Modelling Example (CoCoME)","year":"2011","unstructured":"Rausch, A., Reussner, R., Mirandola, R., Plasil, F. (eds.): The Common Component Modelling Example (CoCoME). LNCS, vol. 5153. Springer, Heidelberg (2011)"},{"key":"5_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"194","DOI":"10.1007\/978-3-642-24755-2_19","volume-title":"Towards a Service-Based Internet","author":"E Schmieders","year":"2011","unstructured":"Schmieders, E., Metzger, A.: Preventing performance violations of service compositions using assumption-based run-time verification. In: Abramowicz, W., Llorente, I.M., Surridge, M., Zisman, A., Vayssi\u00e8re, J. (eds.) ServiceWave 2011. LNCS, vol. 6994, pp. 194\u2013205. Springer, Heidelberg (2011)"},{"key":"5_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"306","DOI":"10.1007\/978-3-662-45391-9_21","volume-title":"Service-Oriented Computing","author":"E Schmieders","year":"2014","unstructured":"Schmieders, E., Metzger, A., Pohl, K.: A runtime model approach for data geo-location checks of cloud services. In: Franch, X., Ghose, A.K., Lewis, G.A., Bhiri, S. (eds.) ICSOC 2014. LNCS, vol. 8831, pp. 306\u2013320. Springer, Heidelberg (2014)"},{"key":"5_CR17","doi-asserted-by":"crossref","unstructured":"Schmieders, E., Metzger, A., Pohl, K.: Architectural runtime models for privacy checks of cloud applications. In: Proceedings of the 7th International Workshop on Principles of Engineering Service-Oriented and Cloud Systems, PESOS 2015, ACM, New York (2015)","DOI":"10.1109\/PESOS.2015.11"},{"key":"5_CR18","doi-asserted-by":"crossref","unstructured":"Szvetits, M., Zdun, U.: Systematic literature review of the objectives, techniques, kinds, and architectures of models at runtime. Softw. Syst. Model., Dec 2013","DOI":"10.1007\/s10270-013-0394-9"}],"container-title":["Lecture Notes in Computer Science","Service-Oriented Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-662-48616-0_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,26]],"date-time":"2020-11-26T01:06:03Z","timestamp":1606352763000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-662-48616-0_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783662486153","9783662486160"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-662-48616-0_5","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]},"assertion":[{"value":"25 November 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}