{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,10]],"date-time":"2024-09-10T12:53:48Z","timestamp":1725972828932},"publisher-location":"Singapore","reference-count":23,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811088896"},{"type":"electronic","value":"9789811088902"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-981-10-8890-2_4","type":"book-chapter","created":{"date-parts":[[2018,3,27]],"date-time":"2018-03-27T11:54:25Z","timestamp":1522151665000},"page":"45-54","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["A Hierarchical Framework for Evaluation of Cloud Service Qualities"],"prefix":"10.1007","author":[{"given":"Qi","family":"Wang","sequence":"first","affiliation":[]},{"given":"MingWei","family":"Liu","sequence":"additional","affiliation":[]},{"given":"KaiQu","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Yu","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Jing","family":"Zheng","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,3,28]]},"reference":[{"issue":"11","key":"4_CR1","doi-asserted-by":"crossref","first-page":"126","DOI":"10.1109\/MCOM.2007.4378332","volume":"45","author":"Y Xiao","year":"2007","unstructured":"Xiao, Y., Du, X., Zhang, J., Hu, F., Guizani, S.: Internet protocol television (IPTV): the killer application for the next-generation internet. IEEE Commun. Mag. 45(11), 126\u2013134 (2007)","journal-title":"IEEE Commun. Mag."},{"issue":"2","key":"4_CR2","doi-asserted-by":"crossref","first-page":"603","DOI":"10.1109\/TNET.2014.2304439","volume":"23","author":"Z Wu","year":"2015","unstructured":"Wu, Z., Xu, Z., Wang, H.: Whispers in the hyper-space: high-bandwidth and reliable covert channel attacks inside the cloud. IEEE\/ACM Trans. Netw. 23(2), 603\u2013615 (2015)","journal-title":"IEEE\/ACM Trans. Netw."},{"issue":"4","key":"4_CR3","doi-asserted-by":"crossref","first-page":"52","DOI":"10.1109\/MCOM.2015.7081075","volume":"53","author":"Q Yan","year":"2015","unstructured":"Yan, Q., Yu, F.R.: Distributed denial of service attacks in software-defined networking with cloud computing. IEEE Commun. Mag. 53(4), 52\u201359 (2015)","journal-title":"IEEE Commun. Mag."},{"key":"4_CR4","doi-asserted-by":"crossref","unstructured":"Green, M.: The Threat in the Cloud. IEEE Educational Activities Department (2013)","DOI":"10.1109\/MSP.2013.20"},{"key":"4_CR5","doi-asserted-by":"crossref","unstructured":"Hei, X., Du, X., Wu, J., Hu, F.: Defending resource depletion attacks on implantable medical devices. In: IEEE Global Telecommunications Conference (GLOBECOM 2010), pp. 1\u20135, December 2010","DOI":"10.1109\/GLOCOM.2010.5685228"},{"key":"4_CR6","doi-asserted-by":"crossref","unstructured":"Wang, M.C., Wu, X., Zhang, W., Ding, F.Q., Zhou, J., Pei, G.C.: A conceptual platform of SLA in cloud computing. In: IEEE Ninth International Conference on Dependable, Autonomic and Secure Computing, pp. 1131\u20131135 (2011)","DOI":"10.1109\/DASC.2011.184"},{"key":"4_CR7","doi-asserted-by":"crossref","unstructured":"Alhamad, M., Dillon, T., Chang, E.: SLA-based trust model for cloud computing. In: 13th International Conference on Network-Based Information Systems (NBiS), pp. 321\u2013324. IEEE (2010)","DOI":"10.1109\/NBiS.2010.67"},{"key":"4_CR8","unstructured":"Hogben, G., Dekker, M.: Procure secure: a guide to monitoring of security service levels in cloud contracts. Technical report, European Network and Information Security Agency (ENISA) (2012)"},{"key":"4_CR9","doi-asserted-by":"crossref","unstructured":"Gunter, D., Tierney, B., Crowley, B., Holding, M., Lee, J.: NetLogger: a toolkit for distributed system performance analysis. In: Proceedings of the 8th International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems (Cat. No. PR00728), pp. 267\u2013273 (2000)","DOI":"10.1109\/MASCOT.2000.876548"},{"key":"4_CR10","doi-asserted-by":"crossref","unstructured":"Emeakaroha, V.C., Brandic, I., Maurer, M., Dustdar, S.: Low level metrics to high level SLAs - LoM2HiS framework: bridging the gap between monitored metrics and SLA parameters in cloud environments. In: International Conference on High Performance Computing Simulation, pp. 48\u201354, June 2010","DOI":"10.1109\/HPCS.2010.5547150"},{"issue":"10","key":"4_CR11","doi-asserted-by":"crossref","first-page":"2551","DOI":"10.1360\/jos182551","volume":"18","author":"J Shou-Xu","year":"2007","unstructured":"Shou-Xu, J., Jian-Zhong, L.: A reputation-based trust mechanism for P2P E-commerce systems. J. Softw. 18(10), 2551\u20132563 (2007)","journal-title":"J. Softw."},{"issue":"4","key":"4_CR12","doi-asserted-by":"crossref","first-page":"60","DOI":"10.1109\/MWC.2008.4599222","volume":"15","author":"X Du","year":"2008","unstructured":"Du, X., Chen, H.: Security in wireless sensor networks. IEEE Wirel. Commun. 15(4), 60\u201366 (2008)","journal-title":"IEEE Wirel. Commun."},{"issue":"11","key":"4_CR13","doi-asserted-by":"crossref","first-page":"2314","DOI":"10.1016\/j.comcom.2007.04.009","volume":"30","author":"Y Xiao","year":"2007","unstructured":"Xiao, Y., Rayi, V.K., Sun, B., Du, X., Hu, F., Galloway, M.: A survey of key management schemes in wireless sensor networks. Comput. Commun. 30(11), 2314\u20132341 (2007). Special issue on security on wireless ad hoc and sensor networks","journal-title":"Comput. Commun."},{"issue":"5","key":"4_CR14","first-page":"80","volume":"37","author":"P Zhao","year":"2013","unstructured":"Zhao, P., Han, Z., He, Y.: SLA-based dynamic trust evaluation for cloud computing. J. Beijing Jiaotong Univ. 37(5), 80\u201387 (2013)","journal-title":"J. Beijing Jiaotong Univ."},{"key":"4_CR15","doi-asserted-by":"crossref","unstructured":"Alhamad, M., Dillon, T., Chang, E.: Conceptual SLA framework for cloud computing. In: IEEE International Conference on Digital Ecosystems and Technologies, pp. 606\u2013610 (2010)","DOI":"10.1109\/DEST.2010.5610586"},{"issue":"8","key":"4_CR16","first-page":"28","volume":"38","author":"Y-L Gao","year":"2012","unstructured":"Gao, Y.-L., Shen, B.-J., Kong, H.-F.: Trust model for cloud computing based on SLA and user ratings. Comput. Eng. 38(8), 28\u201330 (2012)","journal-title":"Comput. Eng."},{"key":"4_CR17","unstructured":"Emeakaroha, V.C., Calheiros, R.N., Netto, M.A.S., Brandic, I., Rose, C.A.F.D.: DeSVi: an architecture for detecting SLA violations in cloud computing infrastructures. In: Proceedings of the 2nd International ICST Conference on Cloud Computing (CloudComp 2010) (2010)"},{"issue":"1","key":"4_CR18","doi-asserted-by":"crossref","first-page":"24","DOI":"10.1016\/j.adhoc.2006.05.012","volume":"5","author":"X Du","year":"2007","unstructured":"Du, X., Xiao, Y., Guizani, M., Chen, H.H.: An effective key management scheme for heterogeneous sensor networks. Ad Hoc Netw. 5(1), 24\u201334 (2007). Security Issues in Sensor and Ad Hoc Networks","journal-title":"Ad Hoc Netw."},{"issue":"3","key":"4_CR19","doi-asserted-by":"crossref","first-page":"1223","DOI":"10.1109\/TWC.2009.060598","volume":"8","author":"X Du","year":"2009","unstructured":"Du, X., Guizani, M., Xiao, Y., Chen, H.H.: A routing-driven elliptic curve cryptography based key management scheme for heterogeneous sensor networks. IEEE Trans. Wirel. Commun. 8(3), 1223\u20131229 (2009)","journal-title":"IEEE Trans. Wirel. Commun."},{"issue":"4","key":"4_CR20","doi-asserted-by":"crossref","first-page":"2387","DOI":"10.1109\/TVT.2007.912327","volume":"57","author":"X Du","year":"2008","unstructured":"Du, X., Guizani, M., Xiao, Y., Chen, H.H.: Secure and efficient time synchronization in heterogeneous sensor networks. IEEE Trans. Veh. Technol. 57(4), 2387\u20132394 (2008)","journal-title":"IEEE Trans. Veh. Technol."},{"issue":"3","key":"4_CR21","doi-asserted-by":"crossref","first-page":"375","DOI":"10.1002\/wcm.402","volume":"6","author":"X Du","year":"2006","unstructured":"Du, X., Xiao, Y., Chen, H.H., Wu, Q.: Secure cell relay routing protocol for sensor networks. Wirel. Commun. Mob. Comput. 6(3), 375\u2013391 (2006)","journal-title":"Wirel. Commun. Mob. Comput."},{"key":"4_CR22","doi-asserted-by":"crossref","unstructured":"Hei, X., Du, X.: Biometric-based two-level secure access control for implantable medical devices during emergencies. In: 2011 Proceedings of IEEE INFOCOM, 346\u2013350, April 2011","DOI":"10.1109\/INFCOM.2011.5935179"},{"issue":"10","key":"4_CR23","doi-asserted-by":"crossref","first-page":"3693","DOI":"10.1109\/JSEN.2013.2266116","volume":"13","author":"X Yao","year":"2013","unstructured":"Yao, X., Han, X., Du, X., Zhou, X.: A lightweight multicast authentication mechanism for small scale iot applications. IEEE Sens. J. 13(10), 3693\u20133701 (2013)","journal-title":"IEEE Sens. J."}],"container-title":["Communications in Computer and Information Science","Mobile Ad-hoc and Sensor Networks"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-10-8890-2_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,13]],"date-time":"2019-10-13T14:00:47Z","timestamp":1570975247000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-981-10-8890-2_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9789811088896","9789811088902"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-981-10-8890-2_4","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2018]]}}}