{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T18:35:28Z","timestamp":1743014128986,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":41,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783662595398"},{"type":"electronic","value":"9783662595404"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-662-59540-4_2","type":"book-chapter","created":{"date-parts":[[2019,6,20]],"date-time":"2019-06-20T13:09:36Z","timestamp":1561036176000},"page":"32-51","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Enabling Custom Security Controls as Plugins in Service Oriented Environments"],"prefix":"10.1007","author":[{"given":"Dimosthenis","family":"Kyriazis","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,6,21]]},"reference":[{"key":"2_CR1","unstructured":"Cloud Security Alliance: State of Cloud Adoption (2016)"},{"key":"2_CR2","doi-asserted-by":"crossref","unstructured":"Zardari, S., Bahsoon, R.: Cloud adoption: a goal-oriented requirements engineering approach. In: Proceedings of the 2nd International Workshop on Software Engineering for Cloud Computing, pp. 29\u201335. ACM (2011)","DOI":"10.1145\/1985500.1985506"},{"key":"2_CR3","unstructured":"Cloud adoption a goal oriented requirements engineering approach.pdf"},{"key":"2_CR4","unstructured":"Cloud Security Alliance: The Treacherous Twelve (2017)"},{"key":"2_CR5","unstructured":"Hewlett Packard Enterprise: 5 ways cloud security is like data center security and 5 ways it\u2019s not. \nhttps:\/\/www.hpe.com\/us\/en\/insights\/articles\/5-ways-cloud-security-is-just-like-data-center-security-and-5-ways-its-different-1701.html"},{"issue":"4","key":"2_CR6","doi-asserted-by":"publisher","first-page":"289","DOI":"10.1504\/IJGUC.2018.095433","volume":"9","author":"E Kuada","year":"2018","unstructured":"Kuada, E.: Trust modelling for opportunistic cloud services. Int. J. Grid Util. Comput. 9(4), 289\u2013306 (2018)","journal-title":"Int. J. Grid Util. Comput."},{"key":"2_CR7","unstructured":"Open Cloud Manifesto: \nhttps:\/\/gevaperry.typepad.com\/Open%20Cloud%20Manifesto%20v1.0.9.pdf\n\n. Accessed 23 July 2018"},{"key":"2_CR8","doi-asserted-by":"publisher","first-page":"40","DOI":"10.1145\/1341312.1341321","volume":"42","author":"S Berger","year":"2008","unstructured":"Berger, S., et al.: TVDc: managing security in the trusted virtual datacenter. ACM Oper. Syst. Rev. 42, 40\u201347 (2008)","journal-title":"ACM Oper. Syst. Rev."},{"key":"2_CR9","unstructured":"Amazon Virtual Private Cloud: \nhttp:\/\/aws.amazon.com\/vpc\/\n\n. Accessed 23 July 2018"},{"key":"2_CR10","first-page":"12","volume":"2","author":"FJ Corbat\u00f3","year":"1992","unstructured":"Corbat\u00f3, F.J., Vyssotsky, V.A.: Introduction and overview of the multics system. IEEE Ann. Hist. Comput. 2, 12\u201313 (1992)","journal-title":"IEEE Ann. Hist. Comput."},{"key":"2_CR11","doi-asserted-by":"publisher","first-page":"388","DOI":"10.1145\/361011.361067","volume":"17","author":"JH Saltzer","year":"1978","unstructured":"Saltzer, J.H.: Protection and the control of information sharing in multics. ACM Commun. 17, 388\u2013402 (1978)","journal-title":"ACM Commun."},{"key":"2_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"157","DOI":"10.1007\/978-3-642-24016-4_9","volume-title":"Transactions on Computational Collective Intelligence V","author":"T Lettmann","year":"2011","unstructured":"Lettmann, T., Baumann, M., Eberling, M., Kemmerich, T.: Modeling agents and agent systems. In: Nguyen, N.T. (ed.) Transactions on Computational Collective Intelligence V. LNCS, vol. 6910, pp. 157\u2013181. Springer, Heidelberg (2011). \nhttps:\/\/doi.org\/10.1007\/978-3-642-24016-4_9"},{"key":"2_CR13","unstructured":"Sentronex Infographic: \nhttp:\/\/www.sentronex.com\/wp-content\/uploads\/2014\/03\/Data-Secruity-Risk-Prevention-for-Financial-Services-in-20141.pdf\n\n. Accessed 23 July 2018"},{"key":"2_CR14","doi-asserted-by":"publisher","first-page":"871","DOI":"10.1016\/j.compeleceng.2016.05.012","volume":"56","author":"XA Wang","year":"2016","unstructured":"Wang, X.A., Xhafa, F., Cai, W., Ma, J., Wei, F.: Efficient privacy preserving predicate encryption with fine-grained searchable capability for Cloud storage. Comput. Electr. Eng. 56, 871\u2013883 (2016)","journal-title":"Comput. Electr. Eng."},{"key":"2_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1007\/978-3-642-10665-1_7","volume-title":"Cloud Computing","author":"W Li","year":"2009","unstructured":"Li, W., Ping, L.: Trust model to enhance security and interoperability of cloud environment. In: Jaatun, M.G., Zhao, G., Rong, C. (eds.) CloudCom 2009. LNCS, vol. 5931, pp. 69\u201379. Springer, Heidelberg (2009). \nhttps:\/\/doi.org\/10.1007\/978-3-642-10665-1_7"},{"issue":"1","key":"2_CR16","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1109\/MSP.2010.45","volume":"8","author":"T Jaeger","year":"2010","unstructured":"Jaeger, T., Schiffman, J.: Outlook: cloudy with a chance of security challenges and improvements. IEEE Secur. Priv. 8(1), 77\u201380 (2010)","journal-title":"IEEE Secur. Priv."},{"key":"2_CR17","doi-asserted-by":"crossref","unstructured":"Ristenpart, T., Tromer, E., Shacham, H., Savage, S.: Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds. In: 16th ACM Conference on Computer and Communications Security (2009)","DOI":"10.1145\/1653662.1653687"},{"key":"2_CR18","unstructured":"Song, D.X., Wagner, D., Tian, X.: Timing analysis of keystrokes and timing attacks on SSH. In: 10th Conference on USENIX Security Symposium (2001)"},{"key":"2_CR19","doi-asserted-by":"publisher","first-page":"85","DOI":"10.1007\/s11416-012-0168-x","volume":"8","author":"P Ranjith","year":"2012","unstructured":"Ranjith, P., Chandran, P., Kaleeswaran, S.: On covert channels between virtual machines. J. Comput. Virol. 8, 85\u201397 (2012)","journal-title":"J. Comput. Virol."},{"key":"2_CR20","doi-asserted-by":"crossref","unstructured":"Bezemer, C-P., Zaidman, A.: Multi-tenant SaaS applications: maintenance dream or nightmare?. In: Joint ERCIM Workshop on Software Evolution (EVOL) and International Workshop on Principles of Software Evolution (IWPSE), Antwerp, Belgium. ACM, New York, USA (2010)","DOI":"10.1145\/1862372.1862393"},{"key":"2_CR21","doi-asserted-by":"crossref","unstructured":"Jansen, W.: Cloud hooks: security and privacy issues in cloud computing. In: 44th International Conference on System Sciences, Koloa, Kauai, HI. IEEE Computer Society, Washington, DC, USA, pp. 1\u201310 (2010)","DOI":"10.1109\/HICSS.2011.103"},{"key":"2_CR22","unstructured":"European Network and Information Security Agency: Cloud Computing Benefits, risks and recommendations for information security (2012)"},{"key":"2_CR23","doi-asserted-by":"crossref","unstructured":"Kandukuri, B., Paturi, V., Rakshit, A.: Cloud security issues. In: IEEE International Conference on Services Computing (2009)","DOI":"10.1109\/SCC.2009.84"},{"issue":"2","key":"2_CR24","doi-asserted-by":"publisher","first-page":"128","DOI":"10.1504\/IJGUC.2018.091719","volume":"9","author":"V Casola","year":"2018","unstructured":"Casola, V., De Benedictis, A., Modic, J., Rak, M., Villano, U.: Per-service security SLAs for cloud security management: model and implementation. Int. J. Grid Util. Comput. 9(2), 128\u2013138 (2018)","journal-title":"Int. J. Grid Util. Comput."},{"key":"2_CR25","unstructured":"Roth, D., Small, K.: The role of semantic information in learning question classifiers. In: Proceedings of the Conference First International Joint Conference on Natural Language Processing (2004)"},{"key":"2_CR26","first-page":"15","volume":"41","author":"C Varun","year":"2009","unstructured":"Varun, C., Banerjee, A., Kumar, V.: Anomaly detection: a survey. ACM Comput. Surv. 41, 15 (2009)","journal-title":"ACM Comput. Surv."},{"key":"2_CR27","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1007\/978-3-662-49017-4_5","volume-title":"Transactions on Computational Collective Intelligence XIX","author":"XA Wang","year":"2015","unstructured":"Wang, X.A., Ma, J., Yang, X., Wei, Y.: Security analysis of two identity based proxy re-encryption schemes in multi-user networks. In: Nguyen, N.T., Kowalczyk, R., Xhafa, F. (eds.) Transactions on Computational Collective Intelligence XIX. LNCS, vol. 9380, pp. 69\u201388. Springer, Heidelberg (2015). \nhttps:\/\/doi.org\/10.1007\/978-3-662-49017-4_5"},{"key":"2_CR28","doi-asserted-by":"crossref","unstructured":"Paredes-Oliva, I., Dimitropoulos, X., Molina, M., Barlet-Ros, P., Brauckhoff, D.: Automating root-cause analysis of network anomalies using frequent itemset mining. In: ACM SIGCOMM 2010 Conference, New Delhi, India (2010)","DOI":"10.1145\/1851182.1851267"},{"key":"2_CR29","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","DOI":"10.1007\/11790754_2","volume-title":"Detection of Intrusions and Malware & Vulnerability Assessment","author":"M Egele","year":"2006","unstructured":"Egele, M., Szydlowski, M., Kirda, E., Kruegel, C.: Using static program analysis to aid intrusion detection. In: B\u00fcschkes, R., Laskov, P. (eds.) DIMVA 2006. LNCS, vol. 4064. Springer, Heidelberg (2006). \nhttps:\/\/doi.org\/10.1007\/11790754_2"},{"issue":"1","key":"2_CR30","doi-asserted-by":"publisher","first-page":"44","DOI":"10.1504\/IJWGS.2018.088394","volume":"14","author":"XA Wang","year":"2018","unstructured":"Wang, X.A., Xhafa, F., Ma, J., Barolli, L., Ge, Y.: PRE+: dual of proxy re-encryption for secure cloud data sharing service. Int. J. Web Grid Serv. 14(1), 44\u201369 (2018)","journal-title":"Int. J. Web Grid Serv."},{"key":"2_CR31","doi-asserted-by":"publisher","first-page":"104","DOI":"10.1016\/j.future.2016.01.022","volume":"74","author":"M Ficco","year":"2017","unstructured":"Ficco, M., Di Martino, B., Pietrantuono, R., Russo, S.: Optimized task allocation on private cloud for hybrid simulation of large-scale critical systems. Futur. Gener. Comput. Syst. 74, 104\u2013118 (2017)","journal-title":"Futur. Gener. Comput. Syst."},{"key":"2_CR32","series-title":"Advanced Information and Knowledge Processing","doi-asserted-by":"publisher","first-page":"7","DOI":"10.1007\/1-84628-137-7_2","volume-title":"Evolutionary Multiobjective Optimization","author":"C Coello","year":"2005","unstructured":"Coello, C.: Recent trends in evolutionary multiobjective optimization. In: Abraham, A., Jain, L., Goldberg, R. (eds.) Evolutionary Multiobjective Optimization. Advanced Information and Knowledge Processing, pp. 7\u201332. Springer, London (2005). \nhttps:\/\/doi.org\/10.1007\/1-84628-137-7_2"},{"key":"2_CR33","doi-asserted-by":"publisher","first-page":"369","DOI":"10.1007\/s00158-003-0368-6","volume":"26","author":"T Marler","year":"2004","unstructured":"Marler, T., Jasbir, A.: Survey of multi-objective optimization methods for engineering. Struct. Multidiscip. Optim. 26, 369\u2013395 (2004)","journal-title":"Struct. Multidiscip. Optim."},{"key":"2_CR34","unstructured":"Talbi, A., Matthieu, B., Nebro, E.: Metaheuristics for Multiobjective Combinatorial Optimization Problems: Review and recent issues (2006)"},{"key":"2_CR35","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"494","DOI":"10.1007\/3-540-36970-8_35","volume-title":"Evolutionary Multi-Criterion Optimization","author":"S Bleuler","year":"2003","unstructured":"Bleuler, S., Laumanns, M., Thiele, L., Zitzler, E.: PISA\u2014a platform and programming language independent interface for search algorithms. In: Fonseca, Carlos M., Fleming, Peter J., Zitzler, E., Thiele, L., Deb, K. (eds.) EMO 2003. LNCS, vol. 2632, pp. 494\u2013508. Springer, Heidelberg (2003). \nhttps:\/\/doi.org\/10.1007\/3-540-36970-8_35"},{"key":"2_CR36","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"247","DOI":"10.1007\/978-3-642-13800-3_27","volume-title":"Learning and Intelligent Optimization","author":"M Kronfeld","year":"2010","unstructured":"Kronfeld, M., Planatscher, H., Zell, A.: The EvA2 optimization framework. In: Blum, C., Battiti, R. (eds.) LION 2010. LNCS, vol. 6073, pp. 247\u2013250. Springer, Heidelberg (2010). \nhttps:\/\/doi.org\/10.1007\/978-3-642-13800-3_27"},{"key":"2_CR37","doi-asserted-by":"crossref","unstructured":"Lukasiewycz, M.: Opt4J: a modular framework for meta-heuristic optimization. In: Proceedings of the 13th Annual Conference on Genetic and Evolutionary Computation (2011)","DOI":"10.1145\/2001576.2001808"},{"key":"2_CR38","doi-asserted-by":"crossref","unstructured":"Durillo, J., Nebro, A., Alba, E.: The jMetal framework for multi-objective optimization: design and architecture. In: IEEE Congress on Evolutionary Computation (2010)","DOI":"10.1109\/CEC.2010.5586354"},{"key":"2_CR39","unstructured":"A Java-based Evolutionary Computation Research System: \nhttp:\/\/cs.gmu.edu\/~eclab\/projects\/ecj\n\n. Accessed 23 July 2018"},{"issue":"1","key":"2_CR40","doi-asserted-by":"publisher","first-page":"7","DOI":"10.1504\/IJGUC.2017.082133","volume":"8","author":"T Xue","year":"2017","unstructured":"Xue, T., Ying, S., Wu, Q., Jia, X., Hu, X., Zhai, X., Zhang, T.: Verifying integrity of exception handling in service-oriented software. Int. J. Grid Util. Comput. 8(1), 7\u201321 (2017)","journal-title":"Int. J. Grid Util. Comput."},{"issue":"1","key":"2_CR41","doi-asserted-by":"publisher","first-page":"74","DOI":"10.1109\/MCC.2014.1","volume":"1","author":"B Martino Di","year":"2014","unstructured":"Di Martino, B.: Applications portability and services interoperability among multiple clouds. IEEE Cloud Comput. 1(1), 74\u201377 (2014)","journal-title":"IEEE Cloud Comput."}],"container-title":["Lecture Notes in Computer Science","Transactions on Computational Collective Intelligence XXXIII"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-662-59540-4_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,4,29]],"date-time":"2020-04-29T01:02:42Z","timestamp":1588122162000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-662-59540-4_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783662595398","9783662595404"],"references-count":41,"URL":"https:\/\/doi.org\/10.1007\/978-3-662-59540-4_2","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"21 June 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}