{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,2]],"date-time":"2025-08-02T04:39:46Z","timestamp":1754109586698},"reference-count":25,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2016,4,6]],"date-time":"2016-04-06T00:00:00Z","timestamp":1459900800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"name":"Program for Changjiang Scholars and Innovative Research Team in University","award":["IRT1078"],"award-info":[{"award-number":["IRT1078"]}]},{"name":"The Key Program of NSFC-Guangdong Union Foundation","award":["U1135002"],"award-info":[{"award-number":["U1135002"]}]},{"name":"Major national S&T program","award":["2011ZX03005-002"],"award-info":[{"award-number":["2011ZX03005-002"]}]},{"DOI":"10.13039\/501100012226","name":"Fundamental Research Funds for the Central Universities","doi-asserted-by":"crossref","award":["JY0900120301"],"award-info":[{"award-number":["JY0900120301"]}],"id":[{"id":"10.13039\/501100012226","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cluster Comput"],"published-print":{"date-parts":[[2016,6]]},"DOI":"10.1007\/s10586-016-0560-2","type":"journal-article","created":{"date-parts":[[2016,4,6]],"date-time":"2016-04-06T06:40:28Z","timestamp":1459924828000},"page":"647-662","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":19,"title":["A limited-trust capacity model for mitigating threats of internal malicious services in cloud computing"],"prefix":"10.1007","volume":"19","author":[{"given":"Yichuan","family":"Wang","sequence":"first","affiliation":[]},{"given":"Santosh","family":"Chandrasekhar","sequence":"additional","affiliation":[]},{"given":"Mukesh","family":"Singhal","sequence":"additional","affiliation":[]},{"given":"Jianfeng","family":"Ma","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,4,6]]},"reference":[{"key":"560_CR1","unstructured":"Amazon EC2\u2014Virtual server hosting. https:\/\/aws.amazon.com\/ec2\/"},{"issue":"4","key":"560_CR2","doi-asserted-by":"crossref","first-page":"50","DOI":"10.1145\/1721654.1721672","volume":"53","author":"M Armbrust","year":"2010","unstructured":"Armbrust, M., Fox, A., Griffith, R., Joseph, A.D., Katz, R., Konwinski, A., Lee, G., Patterson, D., Rabkin, A., Stoica, I., Zaharia, M.: A view of cloud computing. Commun. ACM 53(4), 50\u201358 (2010)","journal-title":"Commun. ACM"},{"key":"560_CR3","volume-title":"Introduction to Algorithms","author":"TH Cormen","year":"2009","unstructured":"Cormen, T.H., Leiserson, C.E., Rivest, R.L., Stein, C.: Introduction to Algorithms, 3rd edn. The MIT Press, Cambridge (2009)","edition":"3"},{"issue":"2","key":"560_CR4","doi-asserted-by":"crossref","first-page":"113","DOI":"10.1007\/s10207-013-0208-7","volume":"13","author":"DAB Fernandes","year":"2014","unstructured":"Fernandes, D.A.B., Soares, L.F.B., Gomes, J.A.V.P., Freire, M.M., In\u00e1cio, P.R.M.: Security issues in cloud environments: a survey. Int. J. Inf. Sec. 13(2), 113\u2013170 (2014)","journal-title":"Int. J. Inf. Sec."},{"issue":"1","key":"560_CR5","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1137\/0116001","volume":"16","author":"E Gilbert","year":"1968","unstructured":"Gilbert, E., Pollak, H.: Steiner minimal trees. SIAM J. Appl. Math. 16(1), 1\u201329 (1968)","journal-title":"SIAM J. Appl. Math."},{"issue":"11","key":"560_CR6","doi-asserted-by":"crossref","first-page":"2185","DOI":"10.1002\/sec.748","volume":"7","author":"SM Habib","year":"2014","unstructured":"Habib, S.M., Ries, S., M\u00fchlh\u00e4user, M., Varikkattu, P.: Towards a trust management system for cloud computing marketplaces: using CAIQ as a trust information source. Secur. Commun. Netw. 7(11), 2185\u20132200 (2014)","journal-title":"Secur. Commun. Netw."},{"key":"560_CR7","unstructured":"IBM cloud. http:\/\/www.ibm.com\/cloud-computing\/"},{"key":"560_CR8","unstructured":"J\u00f8sang, A., Gray, E., Kinateder, M.: Analysing topologies of transitive trust. In: Proceedings of the First International Workshop on Formal Aspects in Security & Trust (FAST 2003), pp. 9\u201322. Pisa (2003)"},{"issue":"2","key":"560_CR9","doi-asserted-by":"crossref","first-page":"618","DOI":"10.1016\/j.dss.2005.05.019","volume":"43","author":"A J\u00f8sang","year":"2007","unstructured":"J\u00f8sang, A., Ismail, R., Boyd, C.: A survey of trust and reputation systems for online service provision. Decis. Support Syst. 43(2), 618\u2013644 (2007)","journal-title":"Decis. Support Syst."},{"key":"560_CR10","doi-asserted-by":"crossref","unstructured":"J\u00f8sang, A., Keser, C., Dimitrakos, T.: Can We Manage Trust? In: Herrmann, P., Issarny, V., Shiu, S. (eds.) Proceedings of iTrust, Third International Conference on Trust Management, Paris, LNCS, vol. 3477, pp. 93\u2013107. Springer May 23\u201326 (2005)","DOI":"10.1007\/11429760_7"},{"key":"560_CR11","doi-asserted-by":"crossref","unstructured":"J\u00f8sang, A., Presti, S.L.: Analysing the relationship between risk and trust. In: Jensen, C.D., Poslad, S., Dimitrakos, T. (eds.) Proceedings of iTrust, Second International Conference on Trust Management, Oxford, LNCS, vol. 2995, pp. 135\u2013145. Springer March 29\u2013April 1 (2004)","DOI":"10.1007\/978-3-540-24747-0_11"},{"key":"560_CR12","unstructured":"Levien, R.: An attack-resistant, scalable name service. http:\/\/www.levien.com\/fc.ps (2000)"},{"key":"560_CR13","unstructured":"Liu, J., Huang, W., Abali, B., Panda, D.K.: High performance VMM-bypass I\/O in virtual machines. Proceedings of the Annual Conference on USENIX. vol. 6, pp. 3 (2006)"},{"key":"560_CR14","doi-asserted-by":"crossref","unstructured":"Manchala, D.W.: Trust metrics, models and protocols for electronic commerce transactions. In: Proceedings of the 18th International Conference on Distributed Computing Systems, Amsterdam, pp. 312\u2013321. IEEE Computer Society, May 26\u201329 (1998)","DOI":"10.1109\/ICDCS.1998.679731"},{"key":"560_CR15","doi-asserted-by":"crossref","unstructured":"Mell, P., Grance, T.: The NIST definition of cloud computing. Special Publication 800\u2013145, National Institute of Standards and Technology, Gaithersburg (2011)","DOI":"10.6028\/NIST.SP.800-145"},{"issue":"1","key":"560_CR16","doi-asserted-by":"crossref","first-page":"42","DOI":"10.1016\/j.jnca.2012.05.003","volume":"36","author":"C Modi","year":"2013","unstructured":"Modi, C., Patel, D., Borisaniya, B., Patel, H., Patel, A., Rajarajan, M.: A survey of intrusion detection techniques in cloud. J. Netw. Comput. Appl. 36(1), 42\u201357 (2013)","journal-title":"J. Netw. Comput. Appl."},{"key":"560_CR17","doi-asserted-by":"crossref","unstructured":"Munoz, A., Mana, A.: Bridging the GAP between software certification and trusted computing for securing cloud computing. In: IEEE Ninth World Congress on Services (SERVICES), vol. 203, pp. 103\u2013110 (2013)","DOI":"10.1109\/SERVICES.2013.15"},{"issue":"1","key":"560_CR18","first-page":"12","volume":"46","author":"TH Noor","year":"2013","unstructured":"Noor, T.H., Sheng, Q.Z., Zeadally, S., Yu, J.: Trust management of services in cloud environments: obstacles and solutions. ACM Comput. Surv. 46(1), 12 (2013)","journal-title":"ACM Comput. Surv."},{"key":"560_CR19","unstructured":"Palo Alto Networks: The modern malware review: analysis of new and evasive malware in live enterprise networks, 1st edn. (2013). http:\/\/media.paloaltonetworks.com\/documents\/The-Modern-Malware-Review-March-2013.pdf"},{"key":"560_CR20","series-title":"SpringerBriefs in computer science","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4614-1460-5","volume-title":"Bootstrapping Trust in Modern Computers","author":"B Parno","year":"2011","unstructured":"Parno, B., McCune, J.M., Perrig, A.: Bootstrapping Trust in Modern Computers. SpringerBriefs in computer science, vol. 10. Springer, New York (2011)"},{"issue":"6","key":"560_CR21","doi-asserted-by":"crossref","first-page":"1389","DOI":"10.1002\/j.1538-7305.1957.tb01515.x","volume":"36","author":"RC Prim","year":"1957","unstructured":"Prim, R.C.: Shortest connection networks and some generalizations. Bell Syst. Tech. J. 36(6), 1389\u20131401 (1957)","journal-title":"Bell Syst. Tech. J."},{"key":"560_CR22","unstructured":"Robins, G., Zelikovsky, A.: Improved Steiner tree approximation in graphs. In: Proceedings of the eleventh annual ACM-SIAM symposium on Discrete algorithms, pp. 770\u2013779. Society for Industrial and Applied Mathematics (2000)"},{"issue":"1","key":"560_CR23","doi-asserted-by":"crossref","first-page":"122","DOI":"10.1137\/S0895480101393155","volume":"19","author":"G Robins","year":"2005","unstructured":"Robins, G., Zelikovsky, A.: Tighter bounds for graph Steiner tree approximation. SIAM J. Discr. Math. 19(1), 122\u2013134 (2005)","journal-title":"SIAM J. Discr. Math."},{"issue":"4","key":"560_CR24","doi-asserted-by":"crossref","first-page":"1369","DOI":"10.1007\/s10586-014-0388-6","volume":"17","author":"Y Wang","year":"2014","unstructured":"Wang, Y., Ma, J., Lu, D., Lu, X., Zhang, L.: From high-availability to collapse: quantitative analysis of \u201cCloud-Droplet-Freezing\u201d attack threats to virtual machine migration in cloud computing. Cluster Comput. 17(4), 1369\u20131381 (2014)","journal-title":"Cluster Comput."},{"issue":"3","key":"560_CR25","first-page":"125","volume":"41","author":"Y Wang","year":"2014","unstructured":"Wang, Y., Ma, J., Lu, D., Zang, L., Meng, X.: A novel DDoS attack in cloud computing\u2014the cloud droplets freezing attack. J. xidian Univ. 41(3), 125\u2013131 (2014)","journal-title":"J. xidian Univ."}],"container-title":["Cluster Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10586-016-0560-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-016-0560-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-016-0560-2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-016-0560-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,5,16]],"date-time":"2020-05-16T17:57:14Z","timestamp":1589651834000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10586-016-0560-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,4,6]]},"references-count":25,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2016,6]]}},"alternative-id":["560"],"URL":"https:\/\/doi.org\/10.1007\/s10586-016-0560-2","relation":{},"ISSN":["1386-7857","1573-7543"],"issn-type":[{"value":"1386-7857","type":"print"},{"value":"1573-7543","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,4,6]]}}}