{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T20:42:37Z","timestamp":1743021757432,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":28,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811617805"},{"type":"electronic","value":"9789811617812"}],"license":[{"start":{"date-parts":[[2021,9,10]],"date-time":"2021-09-10T00:00:00Z","timestamp":1631232000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,9,10]],"date-time":"2021-09-10T00:00:00Z","timestamp":1631232000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-981-16-1781-2_40","type":"book-chapter","created":{"date-parts":[[2021,9,9]],"date-time":"2021-09-09T15:05:30Z","timestamp":1631199930000},"page":"439-458","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Cloud Accountability Method: Towards Accountable Cloud Service-Level Agreements"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-9680-3646","authenticated-orcid":false,"given":"David Ebo","family":"Adjepon-Yamoah","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,9,10]]},"reference":[{"key":"40_CR1","doi-asserted-by":"publisher","unstructured":"Abawajy J (2011) Establishing trust in hybrid cloud computing environments. In: 2011 IEEE 10th international conference on trust, security and privacy in computing and communications, pp 118\u2013125. https:\/\/doi.org\/10.1109\/TrustCom.2011.18","DOI":"10.1109\/TrustCom.2011.18"},{"key":"40_CR2","doi-asserted-by":"publisher","unstructured":"Adjepon Yamoah D, Wen Z (2016) Assuring dependable cloud-based system engineering: a cloud accountability method. In: 12th European dependable computing conference (EDCC 2016). IEEE, Vasteras, Sweden, pp 181\u2013184. https:\/\/doi.org\/10.1109\/EDCC.2016.20","DOI":"10.1109\/EDCC.2016.20"},{"key":"40_CR3","doi-asserted-by":"publisher","unstructured":"Adjepon-Yamoah D, Romanovsky A, Iliasov A (2015) A reactive aarchitecture for cloud-based system engineering. In: Proceedings of the 2015 international conference on software and system process, ICSSP 2015. ACM, New York, NY, USA, pp 77\u201381. https:\/\/doi.org\/10.1145\/2785592.2785611. http:\/\/doi.acm.org\/10.1145\/2785592.2785611","DOI":"10.1145\/2785592.2785611"},{"key":"40_CR4","doi-asserted-by":"crossref","unstructured":"Armbrust M, Fox A, Griffith R, Joseph AD, Katz RH, Konwinski A, Lee G, Patterson DA, Rabkin A, Zaharia M (2009) Above the clouds: a berkeley view of cloud computing. Technical Report, Electrical Engineering and Computer Sciences; University of California at Berkeley; UC Berkeley Reliable Adaptive Distributed Systems Laboratory","DOI":"10.1145\/1721654.1721672"},{"key":"40_CR5","unstructured":"AWS (2020) Amazon EC2 service level agreement. http:\/\/aws.amazon.com\/ec2\/sla\/"},{"issue":"1","key":"40_CR6","doi-asserted-by":"publisher","first-page":"40","DOI":"10.1109\/TST.2013.6449406","volume":"18","author":"Z Chen","year":"2013","unstructured":"Chen Z, Han F, Cao J, Jiang X, Chen S (2013) Cloud computing-based forensic analysis for collaborative network security management system. Tsinghua Sci Technol 18(1):40\u201350","journal-title":"Tsinghua Sci Technol"},{"key":"40_CR7","doi-asserted-by":"publisher","unstructured":"Chiregi M, Navimipour NJ (2016) A new method for trust and reputation evaluation in the cloud environments using the recommendations of opinion leaders\u2019 entities and removing the effect of troll entities. Comput Hum Behav 60:280\u2013292. https:\/\/doi.org\/10.1016\/j.chb.2016.02.029. http:\/\/www.sciencedirect.com\/science\/article\/pii\/S0747563216300814","DOI":"10.1016\/j.chb.2016.02.029"},{"key":"40_CR8","doi-asserted-by":"publisher","unstructured":"Fan W, Perros H (2014) A novel trust management framework for multi-cloud environments based on trust service providers. Knowl Based Syst 70:392\u2013406. https:\/\/doi.org\/10.1016\/j.knosys.2014.07.018. http:\/\/www.sciencedirect.com\/science\/article\/pii\/S0950705114002755","DOI":"10.1016\/j.knosys.2014.07.018"},{"key":"40_CR9","doi-asserted-by":"publisher","unstructured":"Habib SM, Ries S, Muhlhauser M (2010) Cloud computing landscape and research challenges regarding trust and reputation. In: Symposia and workshops on ubiquitous, autonomic and trusted computing, UIC-ATC \u201910. IEEE Computer Society, Washington, DC, USA, pp 410\u2013415. https:\/\/doi.org\/10.1109\/UIC-ATC.2010.48","DOI":"10.1109\/UIC-ATC.2010.48"},{"key":"40_CR10","doi-asserted-by":"publisher","unstructured":"Hande S, Mane S (2015) An analysis on data accountability and security in cloud. In: 2015 International conference on industrial instrumentation and control (ICIC), Pune, India, pp 713\u2013717. https:\/\/doi.org\/10.1109\/IIC.2015.7150835","DOI":"10.1109\/IIC.2015.7150835"},{"key":"40_CR11","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1007\/978-1-4419-7320-7_5","volume-title":"Grids and service-oriented architectures for service level agreements","author":"IU Haq","year":"2010","unstructured":"Haq IU, Alnemr R, Paschke A, Schikuta E, Boley H, Meinel C (2010) Distributed trust management for validating sla choreographies. In: Wieder P, Yahyapour R, Ziegler W (eds) Grids and service-oriented architectures for service level agreements. Springer, US, Boston, MA, pp 45\u201355"},{"key":"40_CR12","doi-asserted-by":"publisher","unstructured":"Huang J, Nicol DM (2013) Trust mechanisms for cloud computing. J Cloud Comput Adv Syst Appl 2(1):9. https:\/\/doi.org\/10.1186\/2192-113X-2-9","DOI":"10.1186\/2192-113X-2-9"},{"key":"40_CR13","doi-asserted-by":"publisher","unstructured":"Hwang K, Kulkareni S, Hu Y (2009) Cloud security with virtualized defense and reputation-based trust mangement. In: 2009 Eighth IEEE international conference on dependable, autonomic and secure computing, pp 717\u2013722. https:\/\/doi.org\/10.1109\/DASC.2009.149","DOI":"10.1109\/DASC.2009.149"},{"key":"40_CR14","doi-asserted-by":"publisher","unstructured":"Jayathilaka H, Krintz C, Wolski R (2015) Response time service level agreements for cloud-hosted web applications. In: Proceedings of the sixth ACM symposium on cloud computing, SoCC \u201915. ACM, New York, NY, USA, pp 315\u2013328. https:\/\/doi.org\/10.1145\/2806777.2806842. http:\/\/doi.acm.org\/10.1145\/2806777.2806842","DOI":"10.1145\/2806777.2806842"},{"key":"40_CR15","doi-asserted-by":"crossref","unstructured":"Kent K, Chevalier S, Grance T, Dang H (2006) Guide to integrating forensic techniques into incident response. Technical Report, SP 800-86, Gaithersburg, MD, United States","DOI":"10.6028\/NIST.SP.800-86"},{"key":"40_CR16","doi-asserted-by":"publisher","unstructured":"Kourai K, Nakamura K (2014) Efficient VM introspection in KVM and performance comparison with Xen. In: Proceedings of the 2014 IEEE 20th pacific rim international symposium on dependable computing, PRDC \u201914. IEEE Computer Society, Washington, DC, USA, pp 192\u2013202. https:\/\/doi.org\/10.1109\/PRDC.2014.33","DOI":"10.1109\/PRDC.2014.33"},{"key":"40_CR17","doi-asserted-by":"publisher","unstructured":"Lansing J, Sunyaev A (2016) Trust in cloud computing: conceptual typology and trust-building antecedents. SIGMIS Database 47(2):58\u201396. https:\/\/doi.org\/10.1145\/2963175.2963179. http:\/\/doi.acm.org\/10.1145\/2963175.2963179","DOI":"10.1145\/2963175.2963179"},{"key":"40_CR18","doi-asserted-by":"publisher","unstructured":"Lee M, Park S, Song Y, Eom YI (2019) Introspection of virtual machine memory resource in the virtualized systems. In: 2019 IEEE international conference on big data and smart computing (BigComp), pp 1\u20134. https:\/\/doi.org\/10.1109\/BIGCOMP.2019.8679210","DOI":"10.1109\/BIGCOMP.2019.8679210"},{"key":"40_CR19","doi-asserted-by":"publisher","unstructured":"Mart\u00ednez SD, Fern\u00e1ndez FAC, Collado JV (2019) Generation expansion planning based on positive net present value. In: 2019 16th international conference on the European energy market (EEM), pp 1\u20136. https:\/\/doi.org\/10.1109\/EEM.2019.8916509","DOI":"10.1109\/EEM.2019.8916509"},{"key":"40_CR20","doi-asserted-by":"publisher","unstructured":"Mohite M, Ardhapurkar S (2015) Overcast: developing digital forensic tool in cloud computing environment. In: 2015 International conference on innovations in information, embedded and communication systems (ICIIECS). Coimbatore, India, pp 1\u20134. https:\/\/doi.org\/10.1109\/ICIIECS.2015.7193220","DOI":"10.1109\/ICIIECS.2015.7193220"},{"issue":"1","key":"40_CR21","doi-asserted-by":"publisher","first-page":"34","DOI":"10.1016\/j.diin.2013.02.004","volume":"10","author":"K Ruan","year":"2013","unstructured":"Ruan K, Carthy J, Kechadi T, Baggili I (2013) Cloud forensics definitions and critical criteria for cloud forensic capability: an overview of survey results. Digit Investig 10(1):34\u201343. https:\/\/doi.org\/10.1016\/j.diin.2013.02.004","journal-title":"Digit Investig"},{"key":"40_CR22","doi-asserted-by":"publisher","unstructured":"Sharevski F (2013) Digital forensic investigation in cloud computing environment: impact on privacy. In: Eighth international workshop on systematic approaches to digital forensic engineering (SADFE). Pok Fu Lam, Hong Kong, pp 1\u20136. https:\/\/doi.org\/10.1109\/SADFE.2013.6911542","DOI":"10.1109\/SADFE.2013.6911542"},{"key":"40_CR23","unstructured":"Standard Performance Evaluation Corporation (2016) SPEC\u2122 Cloud IaaS 2016. http:\/\/www.spec.org\/cloud_iaas2016\/index.html"},{"key":"40_CR24","doi-asserted-by":"publisher","unstructured":"Tang M, Dai X, Liu J, Chen J (2017) Towards a trust evaluation middleware for cloud service selection. Future Gener Comput Syst 74:302\u2013312. https:\/\/doi.org\/10.1016\/j.future.2016.01.009. http:\/\/www.sciencedirect.com\/science\/article\/pii\/S0167739X1600011X","DOI":"10.1016\/j.future.2016.01.009"},{"key":"40_CR25","doi-asserted-by":"publisher","unstructured":"Utomo AP, Winarno I, Syarif I, (2019) Detecting hang on the virtual machine using LibVMI. In: 2019 International electronics symposium (IES), pp 618\u2013621. https:\/\/doi.org\/10.1109\/ELECSYM.2019.8901677","DOI":"10.1109\/ELECSYM.2019.8901677"},{"issue":"3","key":"40_CR26","doi-asserted-by":"publisher","first-page":"2321","DOI":"10.1016\/j.eswa.2011.08.048","volume":"39","author":"W Wang","year":"2012","unstructured":"Wang W, Zeng G, Tang D, Yao J (2012) Cloud-DLS: dynamic trusted scheduling for cloud computing. Expert Syst Appl 39(3):2321\u20132329. https:\/\/doi.org\/10.1016\/j.eswa.2011.08.048","journal-title":"Expert Syst Appl"},{"key":"40_CR27","volume-title":"Clusters for high availability: a primer of HP solutions","author":"PS Weygant","year":"2001","unstructured":"Weygant PS (2001) Clusters for high availability: a primer of HP solutions, 2nd edn. Prentice Hall PTR, Upper Saddle River, NJ, USA","edition":"2"},{"key":"40_CR28","doi-asserted-by":"publisher","unstructured":"Zou J, Wang Y, Lin KJ (2010) A formal service contract model for accountable saas and cloud services. In: IEEE international conference on services computing, Miami, Florida, USA, pp 73\u201380. https:\/\/doi.org\/10.1109\/SCC.2010.85","DOI":"10.1109\/SCC.2010.85"}],"container-title":["Lecture Notes in Networks and Systems","Proceedings of Sixth International Congress on Information and Communication Technology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-16-1781-2_40","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,2,8]],"date-time":"2022-02-08T17:01:02Z","timestamp":1644339662000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-16-1781-2_40"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,9,10]]},"ISBN":["9789811617805","9789811617812"],"references-count":28,"URL":"https:\/\/doi.org\/10.1007\/978-981-16-1781-2_40","relation":{},"ISSN":["2367-3370","2367-3389"],"issn-type":[{"type":"print","value":"2367-3370"},{"type":"electronic","value":"2367-3389"}],"subject":[],"published":{"date-parts":[[2021,9,10]]},"assertion":[{"value":"10 September 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}