{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,5]],"date-time":"2026-03-05T16:14:35Z","timestamp":1772727275923,"version":"3.50.1"},"publisher-location":"New Delhi","reference-count":24,"publisher":"Springer India","isbn-type":[{"value":"9788132219873","type":"print"},{"value":"9788132219880","type":"electronic"}],"license":[{"start":{"date-parts":[[2014,8,27]],"date-time":"2014-08-27T00:00:00Z","timestamp":1409097600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2014,8,27]],"date-time":"2014-08-27T00:00:00Z","timestamp":1409097600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-81-322-1988-0_3","type":"book-chapter","created":{"date-parts":[[2014,8,26]],"date-time":"2014-08-26T08:45:57Z","timestamp":1409042757000},"page":"39-52","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Service Insurance: A New Approach in Cloud Brokerage"],"prefix":"10.1007","author":[{"given":"Adrija","family":"Bhattacharya","sequence":"first","affiliation":[]},{"given":"Sankhayan","family":"Choudhury","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,8,27]]},"reference":[{"key":"3_CR1","unstructured":"Lawler, C.M.: Cloud service broker model-sustainable governance for efficient cloud utilization. Green IT Cloud Summit, Washington, D.C, Sheraton Premier, Tysons Corner, 18 Apr 2012"},{"key":"3_CR2","doi-asserted-by":"publisher","first-page":"669","DOI":"10.1007\/s12243-010-0184-0","volume":"65","author":"MM Hassan","year":"2010","unstructured":"Hassan, M.M., Song, B., Huh, E.N.: A market-oriented dynamic collaborative cloud services platform. Ann. Telecommun. 65, 669\u2013688 (2010). doi:10.1007\/s12243-010-0184-0","journal-title":"Ann. Telecommun."},{"key":"3_CR3","unstructured":"Cloud computing vulnerability incidents: a statistical overview. Cloud Vulnerabilities Working Group, Cloud Security Alliance (2013)"},{"key":"3_CR4","doi-asserted-by":"crossref","unstructured":"Pearson, S., Benameur, A.: Privacy, security and trust issues arising from cloud computing. IEEE Second International Conference on Cloud Computing Technology and Science (CloudCom). IEEE (2010)","DOI":"10.1109\/CloudCom.2010.66"},{"key":"3_CR5","unstructured":"Cloud computing-benefits, risks and recommendations for information security. European Network and Information Security Agency, December 2012"},{"key":"3_CR6","doi-asserted-by":"crossref","unstructured":"Gmach, D., Roliat, J., Cherkasovat, L., Belrose, G., Turicchi, T., Kemper; A.: An integrated approach to resource pool management: policies, efficiency and quality metrics. In: International Conference on Dependable Systems & Networks: An-chorage, IEEE, Alaska, 24\u201327 June 2008","DOI":"10.1109\/DSN.2008.4630101"},{"key":"3_CR7","doi-asserted-by":"crossref","unstructured":"Toosi, A.N., Calheiros, R.N., Thulasiram, R.K., Buyya, R.: Re-source provisioning policies to increase IaaS provider\u2019s profit in a federated cloud environment. In: IEEE International Conference on High Performance Computing and Communications 2011","DOI":"10.1109\/HPCC.2011.44"},{"issue":"4","key":"3_CR8","doi-asserted-by":"publisher","first-page":"334","DOI":"10.1080\/10580530.2010.514248","volume":"27","author":"BT Ward","year":"2010","unstructured":"Ward, B.T., Sipior, J.C.: The Internet jurisdiction risk of cloud computing. Inf. Syst. Manag. 27(4), 334\u2013339 (2010)","journal-title":"Inf. Syst. Manag."},{"issue":"6","key":"3_CR9","first-page":"310","volume":"19","author":"R Farrell","year":"2010","unstructured":"Farrell, R.: Securing the cloud\u2014governance, risk, and compliance issues reign supreme. Inf. Secur. J.: A Global Perspect. 19(6), 310\u2013319 (2010)","journal-title":"Inf. Secur. J.: A Global Perspect."},{"key":"3_CR10","unstructured":"Cidon, A., et al.: Copysets: reducing the frequency of data loss in cloud storage. Presented as part of the 2013 USENIX Annual Technical Conference. USENIX, (2013)"},{"key":"3_CR11","doi-asserted-by":"crossref","unstructured":"Wang, C., et al.: Privacy-preserving public auditing for data storage security in cloud computing. INFOCOM, Proceedings IEEE, (2010)","DOI":"10.1109\/INFCOM.2010.5462173"},{"key":"3_CR12","doi-asserted-by":"crossref","unstructured":"Jensen, M., et al.: On technical security issues in cloud computing. IEEE International Conference on Cloud Computing. CLOUD\u201909. IEEE (2009)","DOI":"10.1109\/CLOUD.2009.60"},{"issue":"4","key":"3_CR13","first-page":"2672","volume":"3","author":"D Jamil","year":"2011","unstructured":"Jamil, D., Zaki, H.: Security issues in cloud computing and countermeasures. Int. J. Eng. Sci. Technol 3(4), 2672\u20132676 (2011)","journal-title":"Int. J. Eng. Sci. Technol"},{"key":"3_CR14","doi-asserted-by":"crossref","unstructured":"Fortis, T.F., Munteanu, V.I., Negru, V.: Steps towards cloud governance. a survey. In: Proceedings of the ITI 2012 34th International Conference on Information Technology Interfaces (ITI), IEEE (2012)","DOI":"10.2498\/iti.2012.0374"},{"key":"3_CR15","doi-asserted-by":"crossref","unstructured":"Bezuidenhout, M., Mouton, F., Venter, H.S.: Social engineering attack detection model: SEADM. Information Security for South Africa (ISSA). IEEE (2010)","DOI":"10.1109\/ISSA.2010.5588500"},{"key":"3_CR16","doi-asserted-by":"crossref","unstructured":"Raj, H., et al.: Resource management for isolation enhanced cloud services. In: Proceedings of the ACM workshop on Cloud computing security. ACM (2009)","DOI":"10.1145\/1655008.1655019"},{"key":"3_CR17","doi-asserted-by":"crossref","unstructured":"Bakshi, A., Yogesh, B.: Securing cloud from ddos attacks using intrusion detection system in virtual machine. In: Second International Conference on Communication Software and Networks. ICCSN\u201910, IEEE (2010)","DOI":"10.1109\/ICCSN.2010.56"},{"key":"3_CR18","unstructured":"http:\/\/searchcloudcomputing.techtarget.com\/feature\/Cloud-computing-licensing-Buyer-beware"},{"key":"3_CR19","unstructured":"Cordell N.: Intellectual property in the cloud. Allen &Overy LLP, May 2013"},{"issue":"4","key":"3_CR20","first-page":"14","volume":"5","author":"M Vrable","year":"2009","unstructured":"Vrable, M., Savage, S., Voelker, G.M.: Cumulus: filesystem backup to the cloud. ACM Trans. Storage (TOS) 5(4), 14 (2009)","journal-title":"ACM Trans. Storage (TOS)"},{"key":"3_CR21","doi-asserted-by":"crossref","unstructured":"Marinos, A., Briscoe, G.: Community cloud computing. Cloud computing, pp. 472\u2013484. Springer, Berlin (2009)","DOI":"10.1007\/978-3-642-10665-1_43"},{"issue":"2.40","key":"3_CR22","first-page":"2","volume":"2","author":"C Evangelinos","year":"2008","unstructured":"Evangelinos, C., Hill, C.: Cloud computing for parallel scientific HPC applications: feasibility of running coupled atmosphere-ocean climate models on amazon\u2019s EC2. Ratio 2(2.40), 2\u201334 (2008)","journal-title":"Ratio"},{"key":"3_CR23","doi-asserted-by":"crossref","unstructured":"Niu, D., et al.: Quality-assured cloud bandwidth auto-scaling for video-on-demand applications. INFOCOM, IEEE (2012)","DOI":"10.1109\/INFCOM.2012.6195785"},{"key":"3_CR24","unstructured":"Crowe, H., Chan, W., Leung, H., Pili, H.: Enterprise risk management for cloud computing. Committee of Sponsoring Organizations of the Treadway Commission, June 2012. http:\/\/www.coso.org\/documents\/Cloud%20Computing%20Thought%20Paper.pdf"}],"container-title":["Advances in Intelligent Systems and Computing","Applied Computation and Security Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-81-322-1988-0_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,20]],"date-time":"2023-02-20T08:29:20Z","timestamp":1676881760000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-81-322-1988-0_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,8,27]]},"ISBN":["9788132219873","9788132219880"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-81-322-1988-0_3","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"value":"2194-5357","type":"print"},{"value":"2194-5365","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014,8,27]]},"assertion":[{"value":"27 August 2014","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}