{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,11]],"date-time":"2026-04-11T14:01:14Z","timestamp":1775916074405,"version":"3.50.1"},"reference-count":97,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2012,12,30]],"date-time":"2012-12-30T00:00:00Z","timestamp":1356825600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Computing"],"published-print":{"date-parts":[[2013,6]]},"DOI":"10.1007\/s00607-012-0248-2","type":"journal-article","created":{"date-parts":[[2012,12,29]],"date-time":"2012-12-29T02:16:28Z","timestamp":1356747388000},"page":"493-535","source":"Crossref","is-referenced-by-count":143,"title":["How to adapt applications for the Cloud environment"],"prefix":"10.1007","volume":"95","author":[{"given":"Vasilios","family":"Andrikopoulos","sequence":"first","affiliation":[]},{"given":"Tobias","family":"Binz","sequence":"additional","affiliation":[]},{"given":"Frank","family":"Leymann","sequence":"additional","affiliation":[]},{"given":"Steve","family":"Strauch","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2012,12,30]]},"reference":[{"key":"248_CR1","unstructured":"Adler B (2011) Building scalable applications in the Cloud: reference architecture and best practices. RightScale Inc. http:\/\/www.rightscale.com\/info_center\/white-papers\/building-scalable-applications-in-the-cloud.php"},{"key":"248_CR2","volume-title":"A pattern language: towns, buildings, construction","author":"C Alexander","year":"1977","unstructured":"Alexander C et al (1977) A pattern language: towns, buildings, construction. Oxford University Press, Oxford"},{"key":"248_CR3","unstructured":"Alexandrov A, Folkerts E, Sachs K, Iosup A, Markl V, Tosun C (2012) Benchmarking in the Cloud: what it should, can, and cannot be. In: 4th TPC Technology Conference on Performance Evaluation and Benchmarking (TPCTC), VLDB 2012"},{"key":"248_CR4","unstructured":"Amazon Web Services (2012) How AWS pricing works. http:\/\/aws.amazon.com\/whitepapers\/"},{"key":"248_CR5","unstructured":"Amazon.com, Inc. AWS case study: Alexa. http:\/\/aws.amazon.com\/solutions\/case-studies\/alexa\/"},{"key":"248_CR6","unstructured":"Anand S (2010) Netflix\u2019s transition to high-availability storage systems. https:\/\/sites.google.com\/site\/practicalcloudcomputing\/index\/Netflix%E2%80%99sTransitiontoaKey_v3.1.pdf?attredirects=0&d=1"},{"key":"248_CR7","doi-asserted-by":"crossref","unstructured":"Anstett T, Leymann F, Mietzner R, Strauch S (2009) Towards BPEL in the Cloud: exploiting different delivery models for the execution of business processes. In: Proceedings of the international workshop on Cloud services (IWCS 2009) in conjunction with the 7th IEEE international conference on Web aervices (ICWS 2009), pp. 670\u2013677. http:\/\/dx.doi.org\/10.1109\/SERVICES-I.2009.32","DOI":"10.1109\/SERVICES-I.2009.32"},{"key":"248_CR8","unstructured":"Armbrust M et al (2009) Above the Clouds: a Berkeley view of Cloud computing. Technical Report, UCB\/EECS-2009-28, EECS Department, University of California, Berkeley"},{"key":"248_CR9","doi-asserted-by":"crossref","unstructured":"Arnold W, Eilam T, Kalantar M, Konstantinou AV, Totok AA (2007) Pattern based SOA deployment. In: Proceedings of the $$5^{\\rm th}$$ international onference on service-oriented computing. http:\/\/dx.doi.org\/10.1007\/978-3-540-74974-5_1","DOI":"10.1007\/978-3-540-74974-5_1"},{"key":"248_CR10","doi-asserted-by":"crossref","unstructured":"Badger L, Grance T, Patt-Corner R, Voas J (2012) Cloud computing synopsis and recommendations. Recommendations of the National Institute of Standards and Technology. NIST Special, Publication, pp. 800\u2013146","DOI":"10.6028\/NIST.SP.800-146"},{"key":"248_CR11","doi-asserted-by":"crossref","unstructured":"Binz T, Breiter G, Leymann F, Spatzier T (2012) Portable cloud services using TOSCA. IEEE Internet Comput 16(03):80\u201385. http:\/\/doi.ieeecomputersociety.org\/10.1109\/MIC.2012.43","DOI":"10.1109\/MIC.2012.43"},{"key":"248_CR12","doi-asserted-by":"crossref","unstructured":"Binz T, Fehling C, Leymann F, Nowak A, Schumm D (2012) Formalizing the Cloud through enterprise topology graphs. In: Proceedings of 2012 IEEE international conference on Cloud computing. IEEE Computer Society Conference Publishing Services","DOI":"10.1109\/CLOUD.2012.143"},{"key":"248_CR13","doi-asserted-by":"crossref","unstructured":"Binz T, Leymann F, Nowak A, Schumm D (2012) Improving the manageability of enterprise topologies through segmentation, graph transformation, and analysis strategies. In: Proceedings of 2012 enterprise distributed object computing conference (EDOC). IEEE Computer Society Conference Publishing Services","DOI":"10.1109\/EDOC.2012.17"},{"key":"248_CR14","doi-asserted-by":"crossref","unstructured":"Binz T, Leymann F, Schumm D (2011) CMotion: a framework for migration of applications into and between Clouds. In: Proceedings of the 2011 IEEE international conference on service-oriented computing and applications (SOCA). IEEE Computer Society Conference Publishing Services. http:\/\/dx.doi.org\/10.1109\/SOCA.2011.6166250","DOI":"10.1109\/SOCA.2011.6166250"},{"key":"248_CR15","doi-asserted-by":"crossref","unstructured":"Brandic I (2009) Towards self-manageable Cloud services. In: Computer software and applications conference, 2009. COMPSAC \u201909. 33rd Annual IEEE International, vol 2, pp 128\u2013133. http:\/\/dx.doi.org\/10.1109\/COMPSAC.2009.126","DOI":"10.1109\/COMPSAC.2009.126"},{"key":"248_CR16","doi-asserted-by":"crossref","unstructured":"Brebner P (2012) Is your cloud elastic enough?: performance modelling the elasticity of infrastructure as a service (IaaS) cloud applications. In: Third joint WOSP\/SIPEW international conference on performance engineering, ICPE\u201912. ACM, pp 263\u2013266","DOI":"10.1145\/2188286.2188334"},{"key":"248_CR17","unstructured":"Brebner P, Liu A (2010) Performance and cost assessment of cloud services. In: Michael EM, Rossi G, Yuan S, Ludwig H, Fantinato M (eds). Proceedings of the 2010 international conference on Service-oriented computing (ICSOC\u201910), Springer-Verlag, Berlin, Heidelberg, pp 39-50. http:\/\/dl.acm.org\/citation.cfm?id=1987684.1987690"},{"key":"248_CR18","unstructured":"Buckl S, Ernst A, Lankes J, Matthes F, Schweda C (2009) State of the art in enterprise architecture management. Techical report, Technische Universitt Mnchen, Chair for Informatics 19 (sebis)"},{"key":"248_CR19","volume-title":"Data replication: tools and techniques for managing distributed information","author":"M Buretta","year":"1997","unstructured":"Buretta M (1997) Data replication: tools and techniques for managing distributed information. Wiley, London"},{"key":"248_CR20","doi-asserted-by":"crossref","unstructured":"Caracas A, Kind A, Gantenbein D, Fussenegger S, Dechouniotis D (2008) Mining semantic relations using netflow. In: BDIM\u201908, pp 110\u2013111","DOI":"10.1109\/BDIM.2008.4540082"},{"key":"248_CR21","first-page":"431","volume":"80","author":"F Cate","year":"1994","unstructured":"Cate F (1994) The EU data protection directive, information privacy, and the public interest. Iowa L. Rev. 80:431","journal-title":"Iowa L. Rev."},{"issue":"2","key":"248_CR22","doi-asserted-by":"crossref","first-page":"120","DOI":"10.1080\/1019678032000067217","volume":"13","author":"S Chandrasekaran","year":"2003","unstructured":"Chandrasekaran S, Miller JA, Silver GA, Arpinar IB, Sheth AP (2003) Performance analysis and simulation of composite web services. Electronic Markets 13(2):120\u2013132","journal-title":"Electronic Markets"},{"key":"248_CR23","unstructured":"Curino C, Jones E, Popa R, Malviya N, Wu E, Madden S, Balakrishnan H, Zeldovich N et al. (2011) Relational cloud: a database service for the cloud. In: 5th biennial conference on innovative data systems research. Asilomar, CA"},{"key":"248_CR24","doi-asserted-by":"crossref","unstructured":"Decker G, Kopp O, Barros A (2008) An introduction to service choreographies. Inform Technol 50(2):122\u2013127. http:\/\/dx.doi.org\/10.1524\/itit.2008.0473","DOI":"10.1524\/itit.2008.0473"},{"key":"248_CR25","doi-asserted-by":"crossref","unstructured":"Durkee D (2010) Why Cloud computing will never be free. Queue 8(4), 20:20\u201320:29. http:\/\/doi.acm.org\/10.1145\/1755884.1772130","DOI":"10.1145\/1735223.1735242"},{"key":"248_CR26","volume-title":"Patterns of enterprise application architecture","author":"M Fowler","year":"2002","unstructured":"Fowler M et al (2002) Patterns of enterprise application architecture. Addison-Wesley Professional, Reading"},{"key":"248_CR27","doi-asserted-by":"crossref","unstructured":"Gentry C (2009) Fully homomorphic encryption using ideal lattices. In: Proceedings of the 41st annual ACM symposium on Theory of computing. ACM, pp 169\u2013178","DOI":"10.1145\/1536414.1536440"},{"key":"248_CR28","doi-asserted-by":"crossref","unstructured":"Gray J (2008) Distributed computing economics. Queue 6(3):63\u201368. http:\/\/doi.acm.org\/10.1145\/1394127.1394131","DOI":"10.1145\/1394127.1394131"},{"key":"248_CR29","doi-asserted-by":"crossref","unstructured":"Guo C, Sun W, Huang Y, Wang Z, Gao B (2007) A framework for native multi-tenancy application development and management. In: Proceedings of the 9th IEEE international conference on E-commerce technology and the 4th IEEE international conference on enterprise computing, E-Commerce, and E-Services (CEC\/EEE\u201907). IEEE","DOI":"10.1109\/CEC-EEE.2007.4"},{"key":"248_CR30","doi-asserted-by":"crossref","unstructured":"Hajjat M, Sun X, Sung Y, Maltz D, Rao S, Sripanidkulchai K, Tawarmalani M (2010) Cloudward bound: planning for beneficial migration of enterprise applications to the cloud. In: ACM SIGCOMM Computer Communication Review, vol 40. ACM, pp 243\u2013254","DOI":"10.1145\/1851275.1851212"},{"key":"248_CR31","doi-asserted-by":"crossref","unstructured":"H\u00f6fer C, Karagiannis G (2011) Cloud computing services: taxonomy and comparison. J Internet Serv Appl 2(2):81\u201394. http:\/\/dx.doi.org\/10.1007\/s13174-011-0027-x","DOI":"10.1007\/s13174-011-0027-x"},{"key":"248_CR32","volume-title":"Enterprise integration patterns: designing, building, and deploying messaging solutions","author":"G Hohpe","year":"2003","unstructured":"Hohpe G, Woolf B (2003) Enterprise integration patterns: designing, building, and deploying messaging solutions. Addison-Wesley, Reading"},{"key":"248_CR33","doi-asserted-by":"crossref","unstructured":"Iosup A, Yigitbasi N, Epema D (2011) On the performance variability of production cloud services. In: 11th IEEE\/ACM international symposium on Cluster, cloud and grid computing (CCGrid). IEEE, pp 104\u2013113","DOI":"10.1109\/CCGrid.2011.22"},{"key":"248_CR34","unstructured":"Mendel Jean-Pierre Garbani Thomas, ER, (2010) The Writing on IT\u2019s Complexity Wall. Technical report Forrester Research, Inc"},{"key":"248_CR35","doi-asserted-by":"crossref","unstructured":"Joukov N, Pfitzmann B, Ramasamy HV, Devarakonda MV (2010) Application-storage discovery. In: Proceedings of the 3rd annual Haifa experimental systems conference, SYSTOR \u201910, pp 19:1\u201319:14. ACM, New York, NY, USA. http:\/\/doi.acm.org\/10.1145\/1815695.1815720","DOI":"10.1145\/1815695.1815720"},{"key":"248_CR36","doi-asserted-by":"crossref","unstructured":"Joukov N, Tarasov V, Ossher J, Pfitzmann B, Chicherin S, Pistoia M, Tateishi T (2011) Static discovery and remediation of code-embedded resource dependencies. In: 2011 IFIP\/IEEE international symposium on integrated network management (IM), pp 233\u2013240. http:\/\/dx.doi.org\/10.1109\/INM.2011.5990696","DOI":"10.1109\/INM.2011.5990696"},{"key":"248_CR37","volume-title":"Making scientific applications on the grid reliable through flexibility approaches borrowed from service compositions, handbook of research on P2P and grid systems for service-Oriented computing: models, methodologies and applications","author":"D Karastoyanova","year":"2009","unstructured":"Karastoyanova D, Leymann F (2009) Making scientific applications on the grid reliable through flexibility approaches borrowed from service compositions, handbook of research on P2P and grid systems for service-Oriented computing: models, methodologies and applications. Information Science Publishing, UK"},{"key":"248_CR38","doi-asserted-by":"crossref","unstructured":"Kephart J, Chess D (2003) The vision of autonomic computing. Computer 36(1):41\u201350. http:\/\/dx.doi.org\/10.1109\/MC.2003.1160055","DOI":"10.1109\/MC.2003.1160055"},{"issue":"4","key":"248_CR39","doi-asserted-by":"crossref","first-page":"447","DOI":"10.1002\/spe.1072","volume":"42","author":"A Khajeh-Hosseini","year":"2012","unstructured":"Khajeh-Hosseini A, Greenwood D, Smith JW, Sommerville I (2012) The cloud adoption toolkit: supporting cloud adoption decisions in the enterprise. Software: Practice and Experience 42(4):447\u2013465","journal-title":"Software: Practice and Experience"},{"key":"248_CR40","doi-asserted-by":"crossref","unstructured":"Khajeh-Hosseini A, Sommerville I, Bogaerts J, Teregowda P (2011) Decision support tools for cloud migration in the enterprise. In: 2011 IEEE international conference on cloud computing (CLOUD). IEEE, pp 541\u2013548","DOI":"10.1109\/CLOUD.2011.59"},{"key":"248_CR41","doi-asserted-by":"crossref","unstructured":"Khalaf R, Leymann F (2006) Role-based decomposition of business processes using BPEL. In: International conference on web services (ICWS 2006). IEEE Computer Society, pp 770\u2013780. http:\/\/dx.doi.org\/10.1109\/ICWS.2006.56","DOI":"10.1109\/ICWS.2006.56"},{"key":"248_CR42","doi-asserted-by":"crossref","unstructured":"Klems M, Nimis J, Tai S (2009) Do clouds compute? a framework for estimating the value of cloud computing. Designing E-Business Systems. Markets, Services and Networks, pp 110\u2013123","DOI":"10.1007\/978-3-642-01256-3_10"},{"key":"248_CR43","doi-asserted-by":"crossref","unstructured":"Kopp O, Khalaf R, Leymann F (2008) Deriving explicit data links in WS-BPEL processes. In: Proceedings of the international conference on services computing, SCC 2008. IEEE Computer Society Press, Honolulu, Hawaii, USA, pp 367\u2013376. http:\/\/dx.doi.org\/10.1109\/SCC.2008.122","DOI":"10.1109\/SCC.2008.122"},{"issue":"3","key":"248_CR44","doi-asserted-by":"crossref","first-page":"121","DOI":"10.1007\/s13222-010-0033-3","volume":"10","author":"D Kossmann","year":"2010","unstructured":"Kossmann D, Kraska T (2010) Data management in the cloud: promises, state-of-the-art, and open questions. Datenbank Spektrum 10(3):121\u2013129","journal-title":"Datenbank Spektrum"},{"key":"248_CR45","unstructured":"Krebs R, Momm C, Konev S (2012) Architectural concerns in multi-tenant SaaS applications. In: Proceedings of the 2nd international conference on cloud computing and service science (CLOSER\u201912). SciTePress"},{"key":"248_CR46","doi-asserted-by":"crossref","unstructured":"Krebs R, Momm C, Kounev S (2012) Metrics and techniques for quantifying performance isolation in Cloud environments. In: Buhnova B, Vallecillo A (eds) Proceedings of the 8th international ACM SIGSOFT conference on the quality of software architectures, CBSE\u201912. ACM Press, New York, USA, pp 91\u2013100","DOI":"10.1145\/2304696.2304713"},{"key":"248_CR47","doi-asserted-by":"crossref","unstructured":"Laszewski T, Nauduri P (2011) Migrating to the Cloud: Oracle Client\/Server Modernization. Syngress","DOI":"10.1016\/B978-1-59749-647-6.00001-6"},{"key":"248_CR48","doi-asserted-by":"crossref","unstructured":"Leitner P, Wetzstein B, Karastoyanova D, Hummer W, Dustdar S, Leymann F (2010) Preventing SLA violations in service compositions using aspect-based fragment substitution. In Maglio PP, Weske M, Yang J, Fantinato M (eds) Service-Oriented Computing. Springer, Berlin, Heidelberg 365\u2013380. http:\/\/dx.doi.org\/10.1007\/978-3-642-17358-5_25","DOI":"10.1007\/978-3-642-17358-5_25"},{"key":"248_CR49","doi-asserted-by":"crossref","unstructured":"Li A, Yang X, Kandula S, Zhang M (2010) CloudCmp: comparing public cloud providers. In: Proceedings of the 10th annual conference on internet measurement, IMC \u201910. ACM, New York, NY, USA, pp 1\u201314. http:\/\/doi.acm.org\/10.1145\/1879141.1879143","DOI":"10.1145\/1879141.1879143"},{"key":"248_CR50","doi-asserted-by":"crossref","unstructured":"Lloyd W, Pallickara S, David O, Lyon J, Arabi M, Rojas K (2011) Migration of multi-tier applications to infrastructure-as-a-service Clouds: an investigation using Kernel-based virtual machines. In: Proceedings of the 12th IEEE\/ACM international conference on grid computing (GRID 2011). IEEE, pp 137\u2013144","DOI":"10.1109\/Grid.2011.26"},{"issue":"4","key":"248_CR51","doi-asserted-by":"crossref","first-page":"6","DOI":"10.1109\/MS.2010.109","volume":"27","author":"P Louridas","year":"2010","unstructured":"Louridas P (2010) Up in the air: moving your applications to the Cloud. Software IEEE 27(4):6\u201311","journal-title":"Software IEEE"},{"key":"248_CR52","doi-asserted-by":"crossref","unstructured":"Machiraju V, Dekhil M, Wurster K, Garg P, Griss M, Holland J (2000) Towards generic application auto-discovery. In: IEEE\/IFIP network operations and management symposium. http:\/\/dx.doi.org\/10.1109\/NOMS.2000.830376","DOI":"10.1109\/NOMS.2000.830376"},{"key":"248_CR53","doi-asserted-by":"crossref","unstructured":"Martin D, Wutke D, Leymann F (2008) A novel approach to decentralized workflow enactment. In: Proceedings of the 12th international IEEE enterprise distributed object computing conference (EDOC 2008). Munich, Germany, September 15\u201319, 2008. IEEE Computer Society, pp 127\u2013136","DOI":"10.1109\/EDOC.2008.22"},{"key":"248_CR54","volume-title":"Cloud computing definition","author":"P Mell","year":"2009","unstructured":"Mell P, Grance T (2009) Cloud computing definition. National Institute of Standards and Technology (NIST), Gaithersburg"},{"key":"248_CR55","doi-asserted-by":"crossref","unstructured":"Menzel M, Ranjan R (2012) CloudGenius: decision support for web server cloud migration. In: Proceedings of the 21st international conference on World Wide Web, WWW \u201912. ACM, New York, NY, USA, pp 979\u2013988. http:\/\/doi.acm.org\/10.1145\/2187836.2187967","DOI":"10.1145\/2187836.2187967"},{"key":"248_CR56","unstructured":"Mietzner R, Fehling C, Karastoyanova D, Leymann F (2011) Combining horizontal and vertical composition of services. In: Service-oriented computing and applications (SOCA), 2010 IEEE International Conference on. IEEE, pp 1\u20138"},{"key":"248_CR57","doi-asserted-by":"crossref","unstructured":"Mietzner R, Unger T, Leymann F (2009) Cafe: a generic configurable customizable composite cloud application framework. In: Meersman R, Dillon T, Herrero P (eds) CoopIS 2009 (OTM 2009), Lecture notes in computer science, vol 5870, Springer-Verlag, Berlin, Heidelberg, pp 357\u2013364","DOI":"10.1007\/978-3-642-05148-7_24"},{"key":"248_CR58","doi-asserted-by":"crossref","unstructured":"Mietzner R, et al. (2009) Combining different multi-tenancy patterns in service-oriented applications. EDOC\u201909. IEEE","DOI":"10.1109\/EDOC.2009.13"},{"key":"248_CR59","unstructured":"Motahari-Nezhad HR, Stephenson B, Singha S (2009) Outsourcing business to cloud computing services: opportunities and challenges. IEEE IT Professional, Special Issue on cloud computing 11"},{"key":"248_CR60","unstructured":"Nguyen DK, Taher Y, Papazoglou MP, van den Heuvel WJ (2012) Service-based application development on the cloud\u2014state of the art and shortcomings analysis. In: Proceedings of the 2nd international conference on cloud computing and service science (CLOSER\u201912). SciTePress"},{"key":"248_CR61","doi-asserted-by":"crossref","unstructured":"Nowak A, Binz T, Fehling C, Kopp O, Leymann F, Wagner S (2012) Pattern-driven green adaptation of process-based applications and their runtime infrastructure. Computing, pp 1\u201325. http:\/\/dx.doi.org\/10.1007\/s00607-012-0188-x","DOI":"10.1007\/s00607-012-0188-x"},{"key":"248_CR62","unstructured":"OASIS (2007) Web services business process execution language Version 2.0 - OASIS Standard"},{"key":"248_CR63","unstructured":"OASIS (2012) Topology and orchestration specification for cloud applications Version 1.0 Working Draft 06. http:\/\/www.tosca-open.org"},{"key":"248_CR64","unstructured":"Object Management Group (OMG) (2011) Business process model and notation (BPMN) version 2.0. http:\/\/www.omg.org\/spec\/BPMN\/2.0\/ . OMG Document Number: formal\/2011-01-03"},{"key":"248_CR65","unstructured":"OMG (2011) Unified modeling language (UML). http:\/\/www.omg.org\/spec\/UML"},{"key":"248_CR66","unstructured":"OpenCrowd: Cloud computing vendors taxonomy. http:\/\/cloudtaxonomy.opencrowd.com\/"},{"key":"248_CR67","doi-asserted-by":"crossref","unstructured":"Papazoglou MP, Traverso P, Dustdar S, Leymann F (2007) Service-oriented omputing: state of the art and research challenges. Computer 40:38\u201345. http:\/\/doi.ieeecomputersociety.org\/10.1109\/MC.2007.400","DOI":"10.1109\/MC.2007.400"},{"key":"248_CR68","unstructured":"Patel P, Ranabahu A, Sheth A (2009) Service level agreement in cloud computing. In: Cloud Workshops at OOPSLA"},{"issue":"3","key":"248_CR69","doi-asserted-by":"crossref","first-page":"48","DOI":"10.1145\/1394127.1394128","volume":"6","author":"D Pritchett","year":"2008","unstructured":"Pritchett D (2008) BASE: an ACID alternative. Queue 6(3):48\u201355","journal-title":"Queue"},{"key":"248_CR70","unstructured":"Reese G (2009) Cloud application architectures. O\u2019Reilly Media, Inc., Sebastopol"},{"key":"248_CR71","doi-asserted-by":"crossref","unstructured":"Ristenpart T, Tromer E, Shacham H, Savage S (2009) Hey, you, get off of my Cloud: exploring information leakage in third-party compute Clouds. In: Proceedings of the 16th ACM Conference on Computer and Communications Security (CCS), pp 199\u2013212","DOI":"10.1145\/1653662.1653687"},{"issue":"1\u20132","key":"248_CR72","doi-asserted-by":"crossref","first-page":"460","DOI":"10.14778\/1920841.1920902","volume":"3","author":"J Schad","year":"2010","unstructured":"Schad J, Dittrich J, Quian\u00e9-Ruiz J (2010) Runtime measurements in the Cloud: observing, analyzing, and reducing variance. Proc VLDB Endo 3(1\u20132):460\u2013471","journal-title":"Proc VLDB Endo"},{"key":"248_CR73","unstructured":"Schuler C, Weber R, Schuldt H, Schek HJ (2003) PeertoPeer Process execution with osiris. In: Orlowska M, Weerawarana S, Papazoglou M, Yang J (eds). Service-oriented computing, ICSOC 2003, Lecture notes in computer science, vol 2910. Springer Berlin\/Heidelberg, pp.483\u2013498"},{"issue":"1 and 2","key":"248_CR74","first-page":"91","volume":"5","author":"M Sonntag","year":"2012","unstructured":"Sonntag M, Karastoyanova D (2012) Ad hoc iteration and re-execution of activities in workflows. Int J Adv Softw 5(1 and 2):91\u2013109","journal-title":"Int J Adv Softw"},{"key":"248_CR75","unstructured":"SPEC open systems group, cloud computing working group (2012) Report on Cloud computing to the OSG steering committee. http:\/\/www.spec.org\/osgcloud\/docs\/osgcloudwgreport20120410.pdf"},{"key":"248_CR76","doi-asserted-by":"crossref","unstructured":"Edlich S (2011) List of NoSQL databases. http:\/\/nosql-database.org","DOI":"10.3139\/9783446428553.fm"},{"key":"248_CR77","unstructured":"Strauch C (2011) NoSQL databases. http:\/\/www.christof-strauch.de\/nosqldbs.pdf"},{"key":"248_CR78","doi-asserted-by":"crossref","unstructured":"Strauch S, Andrikopoulos V, Breitenb\u00fccher U, Kopp O, Leymann F (2012) Non-functional data layer patterns for Cloud applications. In: Proceedings of the 4th IEEE international conference on Cloud computing technology and science (CloudCom\u201912). IEEE Computer Society Press","DOI":"10.1109\/CloudCom.2012.6427478"},{"key":"248_CR79","doi-asserted-by":"crossref","unstructured":"Strauch S, Andrikopoulos V, G\u00f3mez S\u00e1ez S, Leymann F, Muhler D (2012) Enabling tenant-aware administration and management for JBI environments. In: Proceedings of the 5th international conference on service-oriented computing and applications (SOCA\u201912). IEEE Computer Society Conference Publishing Services","DOI":"10.1109\/SOCA.2012.6449463"},{"key":"248_CR80","unstructured":"Strauch S, Breitenb\u00fccher U, Kopp O, Leymann F, Unger T (2012) Cloud data patterns for confidentiality. In: Proceedings of the 2nd international conference on Cloud computing and service science (CLOSER\u201912). SciTePress"},{"key":"248_CR81","doi-asserted-by":"crossref","unstructured":"Strauch S, Kopp O, Leymann F, Unger T (2011) A taxonomy for Cloud data hosting solutions. In: Proceedings of the international conference on Cloud and green computing (CGC \u201911). IEEE Computer Society. http:\/\/dx.doi.org\/10.1109\/DASC.2011.106","DOI":"10.1109\/DASC.2011.106"},{"issue":"1","key":"248_CR82","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.jnca.2010.07.006","volume":"34","author":"S Subashini","year":"2011","unstructured":"Subashini S, Kavitha V (2011) A survey on security issues in service delivery models of cloud computing. J Netw Comput Appl 34(1):1\u201311","journal-title":"J Netw Comput Appl"},{"key":"248_CR83","unstructured":"Suleiman B, Sakr S, Jeffery R, Liu A (2011) On understanding the economics and elasticity challenges of deploying business applications on public cloud infrastructure. J Internet Serv Appl 1:1\u201321"},{"key":"248_CR84","unstructured":"Sun Microsystems (2007) JSR 154: Java Servlet specification, Version 2.5. http:\/\/jcp.org\/en\/jsr\/detail?id=154"},{"key":"248_CR85","unstructured":"System Virtualization, Partitioning and Clustering Working Group (2009) Open virtualization format specification (DSP0243), Distributed Management Task Force"},{"key":"248_CR86","unstructured":"Tak B, Urgaonkar B, Sivasubramaniam A (2011) To move or not to move: the economics of Cloud computing. In: Third USENIX Workshop on Hot Topics in Cloud Computing (HOTCLOUD 2011)"},{"key":"248_CR87","unstructured":"Hoff T (2011) 35+ use cases for choosing your next NoSQL database. http:\/\/highscalability.com\/blog\/2011\/6\/20\/35-use-cases-for-choosing-your-next-nosql-database.html"},{"key":"248_CR88","unstructured":"US Congress (2001) Uniting and strengthening America by providing appropriate tools required to intercept and obstruct terrorism (USA PATRIOT Act) Act of 2001. Enrolled Bill (Final as Passed Both House and Senate)\u2014ENR. http:\/\/thomas.loc.gov\/cgi-bin\/t2GPO\/ ; http:\/\/www.gpo.gov\/fdsys\/pkg\/BILLS-107hr3162enr\/pdf\/BILLS-107hr3162enr.pdf"},{"issue":"1","key":"248_CR89","doi-asserted-by":"crossref","first-page":"45","DOI":"10.1145\/1925861.1925869","volume":"41","author":"L Vaquero","year":"2011","unstructured":"Vaquero L, Rodero-Merino L, Buyya R (2011) Dynamically scaling applications in the Cloud. ACM SIGCOMM Comput Commun Rev 41(1):45\u201352","journal-title":"ACM SIGCOMM Comput Commun Rev"},{"key":"248_CR90","doi-asserted-by":"crossref","unstructured":"Vogels W (2009) Eventually consistent. Commun ACM 52(1):40\u201344. http:\/\/portal.acm.org\/citation.cfm?id=1435432","DOI":"10.1145\/1435417.1435432"},{"key":"248_CR91","doi-asserted-by":"crossref","unstructured":"Wagner S, Kopp O, Leymann F (2011) Towards choreography-based process distribution in the Cloud. In: Proceedings of the 2011 IEEE international conference on Cloud computing and intelligence systems. IEEE Xplore, Bejing, China, pp 490\u2013494. http:\/\/dx.doi.org\/10.1109\/CCIS.2011.6045116","DOI":"10.1109\/CCIS.2011.6045116"},{"issue":"4","key":"248_CR92","doi-asserted-by":"crossref","first-page":"35","DOI":"10.1109\/MC.2009.135","volume":"42","author":"E Walker","year":"2009","unstructured":"Walker E (2009) The real cost of a CPU hour. Computer 42(4):35\u201341","journal-title":"Computer"},{"key":"248_CR93","doi-asserted-by":"crossref","unstructured":"Walraven S, et al (2011) A middleware layer for flexible and cost-efficient multi-tenant applications. Middleware\u201911","DOI":"10.1007\/978-3-642-25821-3_19"},{"key":"248_CR94","doi-asserted-by":"crossref","unstructured":"Wetzstein B, Leitner P, Rosenberg F, Brandic I, Dustdar S, Leymann F (2009) Monitoring and analyzing influential factors of business process performance. In: Proceedings of the IEEE international enterprise distributed object computing conference (EDOC \u201909), pp 141\u2013150. http:\/\/dx.doi.org\/10.1109\/EDOC.2009.18","DOI":"10.1109\/EDOC.2009.18"},{"key":"248_CR95","unstructured":"Winter K, Buckl S, Matthes F, Schweda CM (2010) Investigating the state-of-the-art in enterprise architecture management methods in literature and practice. In: MCIS, p 90"},{"key":"248_CR96","doi-asserted-by":"crossref","unstructured":"Winter R, Fischer R (2006) Essential layers, artifacts, and dependencies of enterprise architecture. In: Proceedings of the 10th IEEE on international enterprise distributed object computing conference workshops, EDOCW \u201906, pp. 30-. IEEE Computer Society, Washington, DC, USA. http:\/\/dx.doi.org\/10.1109\/EDOCW.2006.33","DOI":"10.1109\/EDOCW.2006.33"},{"key":"248_CR97","volume-title":"High performance MySQL: optimization, backups, replication, load-balancing, and more","author":"J Zawodny","year":"2004","unstructured":"Zawodny J, Balling D (2004) High performance MySQL: optimization, backups, replication, load-balancing, and more. O\u2019Reilly & Associates, Inc., Sebastopol"}],"container-title":["Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00607-012-0248-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s00607-012-0248-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00607-012-0248-2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,7,7]],"date-time":"2019-07-07T13:55:35Z","timestamp":1562507735000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s00607-012-0248-2"}},"subtitle":["Challenges and solutions in migrating applications to the Cloud"],"short-title":[],"issued":{"date-parts":[[2012,12,30]]},"references-count":97,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2013,6]]}},"alternative-id":["248"],"URL":"https:\/\/doi.org\/10.1007\/s00607-012-0248-2","relation":{},"ISSN":["0010-485X","1436-5057"],"issn-type":[{"value":"0010-485X","type":"print"},{"value":"1436-5057","type":"electronic"}],"subject":[],"published":{"date-parts":[[2012,12,30]]}}}