{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T18:16:15Z","timestamp":1725905775454},"publisher-location":"Singapore","reference-count":21,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811054266"},{"type":"electronic","value":"9789811054273"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-981-10-5427-3_11","type":"book-chapter","created":{"date-parts":[[2017,7,21]],"date-time":"2017-07-21T05:43:15Z","timestamp":1500615795000},"page":"102-111","source":"Crossref","is-referenced-by-count":1,"title":["Development of Secured Trust SLA Model from SLA Life Cycle Phases"],"prefix":"10.1007","author":[{"given":"Manjula","family":"Shanbhog","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Krista","family":"Chaudhary","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Mayank","family":"Singh","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Shailendra","family":"Mishra","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2017,7,22]]},"reference":[{"issue":"8","key":"11_CR50","first-page":"463","volume":"3","author":"HR Abadi","year":"2011","unstructured":"Abadi, H.R., Hafshejani, S.N., Zadeh, F.K.: Considering factors that affect users\u2019 online purchase intentions with using structural equation modeling. Interdisc. J. Contemp. Res. Bus. 3(8), 463\u2013471 (2011)","journal-title":"Interdisc. J. Contemp. Res. Bus."},{"issue":"1","key":"11_CR1","first-page":"25","volume":"6","author":"M Ahmed","year":"2014","unstructured":"Ahmed, M., Hossain, M.A.: Cloud computing and security issues in the cloud. Int. J. Netw. Secur. Appl. (IJNSA) 6(1), 25\u201336 (2014)","journal-title":"Int. J. Netw. Secur. Appl. (IJNSA)"},{"issue":"2","key":"11_CR2","doi-asserted-by":"crossref","first-page":"15","DOI":"10.5121\/ijcses.2014.5202","volume":"5","author":"SY Ameen","year":"2014","unstructured":"Ameen, S.Y., Nourildean, S.W.: Firewall and VPN investigation on cloud computing performance. Int. J. Comput. Sci. Eng. Surv. (IJCSES) 5(2), 15\u201325 (2014)","journal-title":"Int. J. Comput. Sci. Eng. Surv. (IJCSES)"},{"key":"11_CR3","unstructured":"Data Integrity, November 2010. https:\/\/en.wikipedia.org"},{"issue":"1","key":"11_CR4","first-page":"123","volume":"2","author":"RS George","year":"2013","unstructured":"George, R.S., Sabitha, S.: Survey on data integrity in cloud computing. Int. J. Adv. Res. Comput. Eng. Technol. (IJARCET) 2(1), 123\u2013125 (2013)","journal-title":"Int. J. Adv. Res. Comput. Eng. Technol. (IJARCET)"},{"key":"11_CR5","volume-title":"Data Communications and Computer Networks","author":"PC Gupta","year":"2011","unstructured":"Gupta, P.C.: Data Communications and Computer Networks. PHI, New Delhi (2011)"},{"issue":"2","key":"11_CR6","first-page":"2240","volume":"6","author":"I Hussain","year":"2014","unstructured":"Hussain, I., Ashraf, I.: Security issues in cloud computing - a review. Int. J. Adv. Netw. Appl. 6(2), 2240\u20132243 (2014)","journal-title":"Int. J. Adv. Netw. Appl."},{"key":"11_CR7","doi-asserted-by":"crossref","first-page":"270","DOI":"10.1016\/j.clsr.2009.03.001","volume":"25","author":"A Joint","year":"2009","unstructured":"Joint, A., Baker, E., Eccles, E.: Hey, you, get off of that cloud? Comput. Law Secur. Rev. 25, 270\u2013274 (2009)","journal-title":"Comput. Law Secur. Rev."},{"issue":"5","key":"11_CR8","first-page":"570","volume":"3","author":"C Kant","year":"2013","unstructured":"Kant, C., Sharma, Y.: Enhanced security architecture for cloud data security. Int. J. Adv. Res. Comput. Sci. Softw. Eng. 3(5), 570\u2013575 (2013)","journal-title":"Int. J. Adv. Res. Comput. Sci. Softw. Eng."},{"key":"11_CR9","doi-asserted-by":"crossref","first-page":"833","DOI":"10.1016\/j.future.2012.01.006","volume":"28","author":"T Khorshed","year":"2012","unstructured":"Khorshed, T., Ali, A., Wasimi, S.: A survey on gaps, threat remediation challenges and some thoughts for proactive attack detection in cloud computing. Future Gener. Comput. Syst. 28, 833\u2013851 (2012)","journal-title":"Future Gener. Comput. Syst."},{"issue":"2","key":"11_CR10","first-page":"53","volume":"1","author":"A Kumar","year":"2012","unstructured":"Kumar, A.: World of cloud computing & security. Int. J. Cloud Comput. Serv. Sci. 1(2), 53\u201358 (2012)","journal-title":"Int. J. Cloud Comput. Serv. Sci."},{"issue":"8","key":"11_CR11","first-page":"629","volume":"4","author":"D Panse","year":"2014","unstructured":"Panse, D., Haritha, P.: Multi-factor authentication in cloud computing for data storage security. Int. J. Adv. Res. Comput. Sci. Softw. Eng. 4(8), 629\u2013634 (2014)","journal-title":"Int. J. Adv. Res. Comput. Sci. Softw. Eng."},{"key":"11_CR12","doi-asserted-by":"crossref","unstructured":"Rao, S., Gujrathi, S., Sanghvi, M., Shah, S.: Analysis on data integrity in cloud environment. IOSR J. Comput. Eng. (IOSR-JCE), 16(5) (2014). E-Issn: 2278-0661, P-Issn: 2278-8727","DOI":"10.9790\/0661-16597176"},{"issue":"3","key":"11_CR13","first-page":"585","volume":"3","author":"S Rawat","year":"2013","unstructured":"Rawat, S., Chowdhary, R., Bansal, D.A.: Data integrity of Cloud Data Storages (CDSs) in cloud. Int. J. Adv. Res. Comput. Sci. Softw. Eng. 3(3), 585\u2013592 (2013)","journal-title":"Int. J. Adv. Res. Comput. Sci. Softw. Eng."},{"key":"11_CR51","unstructured":"Ron, S., Aliko, P.: Service level agreements. Internet NG. Internet NG project (1999\u20132001) (2001). http:\/\/ing.ctit.utwente.nl\/WU2\/"},{"key":"11_CR14","unstructured":"Rubach, P.: Optimal resource allocation in federated metacomputing environments. Ph.D. thesis. Warsaw University of Technology, Electronics and Information Technology, Warsaw (2010)"},{"key":"11_CR15","doi-asserted-by":"crossref","first-page":"513","DOI":"10.1016\/j.clsr.2012.07.002","volume":"28","author":"P Ryan","year":"2012","unstructured":"Ryan, P., Falvey, S.: Trust in the clouds. Comput. Law Secur. Rev. 28, 513\u2013521 (2012)","journal-title":"Comput. Law Secur. Rev."},{"issue":"4","key":"11_CR16","doi-asserted-by":"crossref","first-page":"11","DOI":"10.14257\/ijgdc.2014.7.4.02","volume":"7","author":"AA Soofi","year":"2014","unstructured":"Soofi, A.A., Khan, M., Fazal-E-Amin: Encryption techniques for cloud data confidentiality. Int. J. Grid Distrib. Comput. 7(4), 11\u201320 (2014)","journal-title":"Int. J. Grid Distrib. Comput."},{"key":"11_CR17","unstructured":"Subramanyam, K.J., Hari, K.K.: The Proceedings of the International Conference on Information Engineering, Management and Security (2014)"},{"key":"11_CR18","first-page":"118","volume":"6","author":"A Talib","year":"2015","unstructured":"Talib, A.: Ensuring security, confidentiality and fine-grained data access control of cloud data storage implementation environment. J. Inf. Secur. 6, 118\u2013130 (2015)","journal-title":"J. Inf. Secur."},{"issue":"3","key":"11_CR19","first-page":"145","volume":"11","author":"S Ziyad","year":"2014","unstructured":"Ziyad, S., Rehman, S.: Critical review of authentication mechanisms in cloud computing. IJCSI Int. J. Comput. Sci. Issues 11(3), 145\u2013149 (2014)","journal-title":"IJCSI Int. J. Comput. Sci. Issues"}],"container-title":["Communications in Computer and Information Science","Advances in Computing and Data Sciences"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-10-5427-3_11","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,1]],"date-time":"2019-10-01T03:14:51Z","timestamp":1569899691000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-981-10-5427-3_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9789811054266","9789811054273"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-981-10-5427-3_11","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2017]]}}}