{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,16]],"date-time":"2026-03-16T10:06:39Z","timestamp":1773655599741,"version":"3.50.1"},"reference-count":19,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2013,4,24]],"date-time":"2013-04-24T00:00:00Z","timestamp":1366761600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Ann Oper Res"],"published-print":{"date-parts":[[2015,10]]},"DOI":"10.1007\/s10479-013-1380-x","type":"journal-article","created":{"date-parts":[[2013,4,30]],"date-time":"2013-04-30T21:31:05Z","timestamp":1367357465000},"page":"281-292","source":"Crossref","is-referenced-by-count":141,"title":["A trust model of cloud computing based on Quality of Service"],"prefix":"10.1007","volume":"233","author":[{"given":"Paul","family":"Manuel","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2013,4,24]]},"reference":[{"issue":"5","key":"1380_CR1","doi-asserted-by":"crossref","first-page":"1073","DOI":"10.1016\/j.compeleceng.2012.06.006","volume":"38","author":"I. M. Abbadi","year":"2012","unstructured":"Abbadi, I. M., & Alawneh, M. (2012). A framework for establishing trust in the cloud. Computers & Electrical Engineering, 38(5), 1073\u20131087.","journal-title":"Computers & Electrical Engineering"},{"issue":"1","key":"1380_CR2","first-page":"23","volume":"41","author":"R. N. Calheiros","year":"2011","unstructured":"Calheiros, R. N., Ranjan, R., Beloglazov, A., De Rose, C. A. F., & Buyya, R. (2011). CloudSim: a toolkit for modeling and simulation of cloud computing environments and evaluation of resource provisioning algorithms. Software: Practice and Experience (SPE), 41(1), 23\u201350.","journal-title":"Software: Practice and Experience (SPE)"},{"key":"1380_CR3","series-title":"Lecture notes in computer science","doi-asserted-by":"crossref","first-page":"289","DOI":"10.1007\/978-3-642-30767-6_25","volume-title":"Advances in grid and pervasive computing","author":"A. Chandrasekar","year":"2012","unstructured":"Chandrasekar, A., Chandrasekar, K., Mahadevan, M., & Varalakshmi, P. (2012). QoS monitoring and dynamic trust establishment in the cloud. In Lecture notes in computer science: Vol.\u00a07296. Advances in grid and pervasive computing (pp. 289\u2013301)."},{"key":"1380_CR4","doi-asserted-by":"crossref","first-page":"140","DOI":"10.1007\/978-3-642-35795-4_18","volume":"320","author":"Z. Chen","year":"2013","unstructured":"Chen, Z., Yao, W., & Wang, C. (2013). Security and trust model for data disaster-recovery service on the cloud, trustworthy computing and services. Communications in Computer and Information Science, 320, 140\u2013147.","journal-title":"Communications in Computer and Information Science"},{"issue":"02","key":"1380_CR5","doi-asserted-by":"crossref","first-page":"24","DOI":"10.4038\/icter.v4i2.4674","volume":"04","author":"M. Firdhous","year":"2011","unstructured":"Firdhous, M., Ghazali, O., & Hassan, S. (2011). Trust management in cloud computing: a critical review. International Journal on Advances in ICT for Emerging Regions (ICTer), 04(02), 24\u201336.","journal-title":"International Journal on Advances in ICT for Emerging Regions (ICTer)"},{"key":"1380_CR6","doi-asserted-by":"crossref","unstructured":"Grandison, T., & Sloman, M. (2000). A survey of trust in Internet applications. IEEE Communications Survey and Tutorials. Fourth quarter.","DOI":"10.1109\/COMST.2000.5340804"},{"key":"1380_CR7","series-title":"Lecture notes in electrical engineering","doi-asserted-by":"crossref","first-page":"603","DOI":"10.1007\/978-1-4614-3363-7_72","volume-title":"Proceedings of the third international conference on trends in information, telecommunication and computing","author":"P. Gupta","year":"2013","unstructured":"Gupta, P., Kumar Goyal, M., Kumar, P., & Aggarwal, A. (2013). Trust and reliability based scheduling algorithm for cloud IaaS. In Lecture notes in electrical engineering: Vol.\u00a0150. Proceedings of the third international conference on trends in information, telecommunication and computing (pp. 603\u2013607)."},{"issue":"5","key":"1380_CR8","doi-asserted-by":"crossref","first-page":"14","DOI":"10.1109\/MIC.2010.86","volume":"14","author":"K. Hwang","year":"2010","unstructured":"Hwang, K., & Li, D. (2010). Trusted cloud computing with secure resources and data coloring, trust reputation management. IEEE Internet Computing, 14(5), 14\u201322.","journal-title":"IEEE Internet Computing"},{"key":"1380_CR9","volume-title":"IEEE standard computer dictionary: a\u00a0compilation of IEEE standard computer glossaries","author":"IEEE 90\u2014Institute of Electrical and Electronics Engineers","year":"1990","unstructured":"IEEE 90\u2014Institute of Electrical and Electronics Engineers (1990). IEEE standard computer dictionary: a\u00a0compilation of IEEE standard computer glossaries, New York."},{"key":"1380_CR10","series-title":"Communications in computer and information science","first-page":"432","volume-title":"Advances in computing and communications","author":"R. K. L. Ko","year":"2011","unstructured":"Ko, R. K. L., Lee, B. S., & Pearson, S. (2011). Towards achieving accountability, auditability and trust in cloud computing. In Communications in computer and information science: Vol.\u00a0193. Advances in computing and communications (pp. 432\u2013444)."},{"key":"1380_CR11","series-title":"Lecture notes in computer science","doi-asserted-by":"crossref","first-page":"211","DOI":"10.1007\/978-3-642-13869-0_14","volume-title":"Trust and trustworthy computing","author":"F. J. Krautheim","year":"2010","unstructured":"Krautheim, F. J., Phatak, D. S., & Sherman, A. T. (2010). Introducing the trusted virtual environment module: a new mechanism for rooting trust in cloud computing. In Lecture notes in computer science: Vol.\u00a06101. Trust and trustworthy computing (pp. 211\u2013227)."},{"key":"1380_CR12","first-page":"3","volume":"79","author":"P. D. Manuel","year":"2011","unstructured":"Manuel, P. D., Abd-El Barr, M. I., & Thamarai Selvi, S. (2011). A novel trust management system for cloud computing\u2014IaaS providers. Journal of Combinatorial Mathematics and Combinatorial Computing, 79, 3\u201322.","journal-title":"Journal of Combinatorial Mathematics and Combinatorial Computing"},{"key":"1380_CR13","doi-asserted-by":"crossref","first-page":"129","DOI":"10.1007\/978-3-642-32524-3_17","volume":"446","author":"F. Messina","year":"2013","unstructured":"Messina, F., Pappalardo, G., Rosaci, D., Santoro, C., & Sarn\u00e9, G. M. L. (2013). A trust-based approach for a competitive cloud\/grid computing scenario. Studies in Computational Intelligence, 446, 129\u2013138. Intelligent distributed computing VI.","journal-title":"Studies in Computational Intelligence"},{"key":"1380_CR14","series-title":"Lecture notes in computer science","doi-asserted-by":"crossref","first-page":"314","DOI":"10.1007\/978-3-642-24434-6_27","volume-title":"Web information system engineering\u2014WISE 2011","author":"T. H. Noor","year":"2011","unstructured":"Noor, T. H., & Sheng, Q. Z. (2011). Trust as a service: a framework for trust management in cloud environments. In Lecture notes in computer science: Vol.\u00a06997. Web information system engineering\u2014WISE 2011 (pp. 314\u2013321)."},{"key":"1380_CR15","doi-asserted-by":"crossref","unstructured":"Pearson, S. (2013). Privacy, security and trust in cloud computing, privacy and security for cloud computing. Computer Communications and Networks, 3\u201342.","DOI":"10.1007\/978-1-4471-4189-1_1"},{"key":"1380_CR16","doi-asserted-by":"crossref","first-page":"2852","DOI":"10.1016\/j.proeng.2011.08.537","volume":"15","author":"D. Sun","year":"2011","unstructured":"Sun, D., Chang, G., Sun, L., & Wang, X. (2011). Surveying and analyzing security, privacy and trust issues in cloud computing environments. Procedia Engineering, 15, 2852\u20132856.","journal-title":"Procedia Engineering"},{"issue":"6","key":"1380_CR17","doi-asserted-by":"crossref","first-page":"24","DOI":"10.1109\/MSP.2010.186","volume":"8","author":"H. Takabi","year":"2010","unstructured":"Takabi H., Joshi, J. B. D., & Ahn, G. (2010). Security and privacy challenges in cloud computing environments. IEEE Security & Privacy, 8(6), 24\u201331.","journal-title":"IEEE Security & Privacy"},{"key":"1380_CR18","unstructured":"Urquhart, J. (2009). The biggest cloud-computing issue of 2009 is trust. C-Net News, 7 Jan. 2009. http:\/\/news.cnet.com\/8301-19413_3-10133487-240.html ."},{"key":"1380_CR19","series-title":"Lecture notes in computer science","doi-asserted-by":"crossref","first-page":"146","DOI":"10.1007\/978-3-642-24403-2_12","volume-title":"Network and parallel computing","author":"Q. Zhou","year":"2011","unstructured":"Zhou, Q., Yu, J., & Yu, F. (2011). A trust-based defensive system model for cloud computing. In Lecture notes in computer science: Vol.\u00a06985. Network and parallel computing (pp. 146\u2013159)."}],"container-title":["Annals of Operations Research"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10479-013-1380-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10479-013-1380-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10479-013-1380-x","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,7,13]],"date-time":"2019-07-13T02:54:06Z","timestamp":1562986446000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10479-013-1380-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,4,24]]},"references-count":19,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2015,10]]}},"alternative-id":["1380"],"URL":"https:\/\/doi.org\/10.1007\/s10479-013-1380-x","relation":{},"ISSN":["0254-5330","1572-9338"],"issn-type":[{"value":"0254-5330","type":"print"},{"value":"1572-9338","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013,4,24]]}}}