{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,19]],"date-time":"2026-03-19T15:25:13Z","timestamp":1773933913164,"version":"3.50.1"},"reference-count":30,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2025,11,11]],"date-time":"2025-11-11T00:00:00Z","timestamp":1762819200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,11,11]],"date-time":"2025-11-11T00:00:00Z","timestamp":1762819200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cluster Comput"],"published-print":{"date-parts":[[2026,2]]},"DOI":"10.1007\/s10586-025-05775-2","type":"journal-article","created":{"date-parts":[[2025,11,11]],"date-time":"2025-11-11T20:32:59Z","timestamp":1762893179000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Hierarchical admission control in multi-cloud systems: integrating reinforcement learning, nash bargaining, and predictive state modeling"],"prefix":"10.1007","volume":"29","author":[{"given":"Xiao","family":"Peng","sequence":"first","affiliation":[]},{"given":"Zeng","family":"Saifeng","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,11,11]]},"reference":[{"key":"5775_CR1","doi-asserted-by":"publisher","first-page":"959","DOI":"10.1016\/j.future.2019.07.050","volume":"101","author":"AC Bakt\u0131r","year":"2019","unstructured":"Bakt\u0131r, A.C., Ahat, B., et al.: SLA-aware optimal resource allocation for service-oriented networks. Future Generation Computer Systems 101, 959\u2013974 (2019)","journal-title":"Future Generation Computer Systems"},{"issue":"9","key":"5775_CR2","doi-asserted-by":"publisher","first-page":"2413","DOI":"10.1002\/cpe.3171","volume":"27","author":"M Baruwal-Chhetri","year":"2015","unstructured":"Baruwal-Chhetri, M., Vo, Q.B., et al.: AutoSLAM - A policy-based framework for automated SLA establishment in cloud environments. Concurrency Comput. 27(9), 2413\u20132442 (2015)","journal-title":"Concurrency Comput."},{"key":"5775_CR3","doi-asserted-by":"publisher","first-page":"141","DOI":"10.1016\/j.compeleceng.2016.12.030","volume":"59","author":"CAB Carvalho","year":"2017","unstructured":"Carvalho, C.A.B., d., R.M.C., Andrade, et al.: State of the Art and challenges of security SLA for cloud computing. Comput. Electr. Eng. 59, 141\u2013152 (2017)","journal-title":"Comput. Electr. Eng."},{"issue":"3","key":"5775_CR4","doi-asserted-by":"publisher","first-page":"795","DOI":"10.1016\/j.comnet.2012.10.020","volume":"57","author":"E Casalicchio","year":"2013","unstructured":"Casalicchio, E., Silvestri, L.: Mechanisms for SLA provisioning in cloud-based service providers. Computer Networks 57(3), 795\u2013810 (2013)","journal-title":"Computer Networks"},{"issue":"1","key":"5775_CR5","doi-asserted-by":"publisher","first-page":"240","DOI":"10.1109\/TCC.2018.2849699","volume":"9","author":"M Dickinson","year":"2021","unstructured":"Dickinson, M., Debroy, S., et al.: Multi-Cloud performance and security driven federated workflow management. IEEE Trans. Cloud Comput. 9(1), 240\u2013257 (2021)","journal-title":"IEEE Trans. Cloud Comput."},{"issue":"7","key":"5775_CR6","doi-asserted-by":"publisher","first-page":"1700","DOI":"10.1016\/j.future.2012.03.025","volume":"29","author":"DC Erdil","year":"2013","unstructured":"Erdil, D.C.: Autonomic cloud resource sharing for intercloud federations. Future Generation Computer Systems 29(7), 1700\u20131708 (2013)","journal-title":"Future Generation Computer Systems"},{"key":"5775_CR7","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.future.2013.10.005","volume":"31","author":"A Garc\u00eda","year":"2014","unstructured":"Garc\u00eda, A., Blanquer Espert, I., et al.: SLA-driven dynamic cloud resource management. Future Generation Comput. Syst. 31, 1\u201311 (2014)","journal-title":"Future Generation Comput. Syst."},{"issue":"6","key":"5775_CR8","doi-asserted-by":"publisher","first-page":"708","DOI":"10.1016\/j.comcom.2012.08.007","volume":"36","author":"AJ Gonzalez","year":"2013","unstructured":"Gonzalez, A.J., Helvik, B.E.: SLA success probability assessment in networks with correlated failures. Computer Communications 36(6), 708\u2013717 (2013)","journal-title":"Computer Communications"},{"issue":"2","key":"5775_CR9","doi-asserted-by":"publisher","first-page":"475","DOI":"10.1109\/TCC.2018.2865737","volume":"9","author":"S Hadjres","year":"2021","unstructured":"Hadjres, S., Kara, N., et al.: An SLA-Aware cloud coalition formation approach for virtualized networks. IEEE Trans. Cloud Comput. 9(2), 475\u2013491 (2021)","journal-title":"IEEE Trans. Cloud Comput."},{"key":"5775_CR10","doi-asserted-by":"publisher","first-page":"464","DOI":"10.1016\/j.future.2018.06.041","volume":"89","author":"W Hussain","year":"2018","unstructured":"Hussain, W., Hussain, F.K., et al.: Comparing time series with machine learning-based prediction approaches for violation management in cloud SLAs. Future Generation Computer Systems 89, 464\u2013477 (2018)","journal-title":"Future Generation Computer Systems"},{"issue":"5","key":"5775_CR11","doi-asserted-by":"publisher","first-page":"1117","DOI":"10.1109\/TC.2021.3075625","volume":"71","author":"MT Islam","year":"2022","unstructured":"Islam, M.T., Wu, H., et al.: SLA-Based scheduling of spark jobs in hybrid cloud computing environments. IEEE Trans. Comput 71(5), 1117\u20131132 (2022)","journal-title":"IEEE Trans. Comput"},{"issue":"4","key":"5775_CR12","doi-asserted-by":"publisher","first-page":"1963","DOI":"10.1109\/JSYST.2024.3459596","volume":"18","author":"Y Jing","year":"2024","unstructured":"Jing, Y., Shen, L., et al.: HLEM-VMP: An effective virtual machine placement algorithm for minimizing SLA violations in cloud data centers. IEEE Systems Journal 18(4), 1963\u20131974 (2024)","journal-title":"IEEE Systems Journal"},{"key":"5775_CR13","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2022.103384","volume":"203","author":"X Li","year":"2022","unstructured":"Li, X., Pan, L., et al.: A survey of resource provisioning problem in cloud brokers. Journal of Network and Computer Applications 203, 103384 (2022)","journal-title":"Journal of Network and Computer Applications"},{"issue":"1","key":"5775_CR14","doi-asserted-by":"publisher","first-page":"605","DOI":"10.1109\/TNSM.2023.3292392","volume":"21","author":"AC Maroudis","year":"2024","unstructured":"Maroudis, A.C., Theodoropoulos, T., et al.: Leveraging graph neural networks for SLA violation prediction in cloud computing. IEEE Trans. Netw. Serv. Manage. 21(1), 605\u2013620 (2024)","journal-title":"IEEE Trans. Netw. Serv. Manage."},{"issue":"6","key":"5775_CR15","doi-asserted-by":"publisher","first-page":"3699","DOI":"10.1109\/TDSC.2021.3105340","volume":"19","author":"Y Mo","year":"2022","unstructured":"Mo, Y., Xing, L.: Efficient analysis of resource availability for cloud computing systems to reduce SLA violations. IEEE Transactions on Dependable and Secure Computing 19(6), 3699\u20133710 (2022)","journal-title":"IEEE Transactions on Dependable and Secure Computing"},{"key":"5775_CR16","doi-asserted-by":"publisher","first-page":"135256","DOI":"10.1109\/ACCESS.2019.2941145","volume":"7","author":"S Mustafa","year":"2019","unstructured":"Mustafa, S., Sattar, K., et al.: SLA-Aware best fit decreasing techniques for workload consolidation in clouds. IEEE Access 7, 135256\u2013135267 (2019)","journal-title":"IEEE Access"},{"key":"5775_CR17","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1016\/j.future.2022.03.020","volume":"134","author":"M Najm","year":"2022","unstructured":"Najm, M., Tamarapalli, V.: Towards cost-aware VM migration to maximize the profit in federated clouds. Future Generation Computer Systems 134, 53\u201365 (2022)","journal-title":"Future Generation Computer Systems"},{"key":"5775_CR18","doi-asserted-by":"publisher","first-page":"78","DOI":"10.1016\/j.future.2018.02.025","volume":"84","author":"F Nawaz","year":"2018","unstructured":"Nawaz, F., Janjua, N.K., et al.: Event-driven approach for predictive and proactive management of SLA violations in the cloud of things. Future Generation Computer Systems 84, 78\u201397 (2018)","journal-title":"Future Generation Computer Systems"},{"key":"5775_CR19","doi-asserted-by":"publisher","first-page":"26","DOI":"10.1016\/j.future.2018.12.034","volume":"95","author":"F Nawaz","year":"2019","unstructured":"Nawaz, F., Hussain, O., et al.: Proactive management of SLA violations by capturing relevant external events in a cloud of things environment. Future Generation Computer Systems 95, 26\u201344 (2019)","journal-title":"Future Generation Computer Systems"},{"key":"5775_CR20","doi-asserted-by":"publisher","first-page":"81787","DOI":"10.1109\/ACCESS.2022.3196240","volume":"10","author":"B Nikzad","year":"2022","unstructured":"Nikzad, B., Barzegar, B., et al.: SLA-Aware and Energy-Efficient virtual machine placement and consolidation in heterogeneous DVFS enabled cloud datacenter. IEEE Access 10, 81787\u201381804 (2022)","journal-title":"IEEE Access"},{"issue":"1","key":"5775_CR21","doi-asserted-by":"publisher","first-page":"400","DOI":"10.1109\/JSYST.2018.2805293","volume":"13","author":"IV Paputungan","year":"2019","unstructured":"Paputungan, I.V., Hani, A.F.M., et al.: Real-Time and proactive SLA renegotiation for a Cloud-Based system. IEEE Systems Journal 13(1), 400\u2013411 (2019)","journal-title":"IEEE Systems Journal"},{"key":"5775_CR22","doi-asserted-by":"publisher","first-page":"110230","DOI":"10.1109\/ACCESS.2024.3439617","volume":"12","author":"I Sekh","year":"2024","unstructured":"Sekh, I., Neh\u00e9z, K.: Intelligent SLA selection through the validation cloud broker system. IEEE Access 12, 110230\u2013110247 (2024)","journal-title":"IEEE Access"},{"key":"5775_CR23","doi-asserted-by":"publisher","first-page":"233","DOI":"10.1016\/j.future.2015.03.018","volume":"54","author":"D Serrano","year":"2016","unstructured":"Serrano, D., Bouchenak, S., et al.: SLA guarantees for cloud services. Future Generation Computer Systems 54, 233\u2013246 (2016)","journal-title":"Future Generation Computer Systems"},{"issue":"4","key":"5775_CR24","doi-asserted-by":"publisher","first-page":"1040","DOI":"10.1109\/TCC.2017.2648788","volume":"8","author":"S Singh","year":"2020","unstructured":"Singh, S., Chana, I., et al.: STAR: SLA-aware autonomic management of cloud resources. IEEE Trans. Cloud Comput 8(4), 1040\u20131053 (2020)","journal-title":"IEEE Trans. Cloud Comput"},{"issue":"2","key":"5775_CR25","doi-asserted-by":"publisher","first-page":"146","DOI":"10.1016\/j.jss.2015.08.006","volume":"116","author":"Y Sun","year":"2016","unstructured":"Sun, Y., White, J., et al.: ROAR: A QoS-oriented modeling framework for automated cloud resource allocation and optimization. J. Syst. Softw. 116(2), 146\u2013161 (2016)","journal-title":"J. Syst. Softw."},{"key":"5775_CR26","doi-asserted-by":"publisher","first-page":"193","DOI":"10.1016\/j.future.2016.06.004","volume":"72","author":"R Trapero","year":"2017","unstructured":"Trapero, R., Modic, J., et al.: A novel approach to manage cloud security SLA incidents. Future Generation Computer Systems 72, 193\u2013205 (2017)","journal-title":"Future Generation Computer Systems"},{"key":"5775_CR27","doi-asserted-by":"publisher","first-page":"194","DOI":"10.1016\/j.jss.2014.06.027","volume":"96","author":"Q Wu","year":"2014","unstructured":"Wu, Q., Zhu, Q., et al.: Broker-based SLA-aware composite service provisioning. Journal of Systems and Software 96, 194\u2013201 (2014)","journal-title":"Journal of Systems and Software"},{"issue":"4","key":"5775_CR28","doi-asserted-by":"publisher","first-page":"3199","DOI":"10.1007\/s10586-017-1047-5","volume":"20","author":"S Xue","year":"2017","unstructured":"Xue, S., Zhang, Y., et al.: QET: A QoS-based energy-aware task scheduling method in cloud environment. Cluster Comput. 20(4), 3199\u20133212 (2017)","journal-title":"Cluster Comput."},{"issue":"5","key":"5775_CR29","doi-asserted-by":"publisher","first-page":"746","DOI":"10.1109\/TC.2020.2995881","volume":"70","author":"X Zeng","year":"2021","unstructured":"Zeng, X., Garg, S., et al.: Detection of SLA violation for big data analytics applications in cloud. IEEE Trans. Comput 70(5), 746\u2013758 (2021)","journal-title":"IEEE Trans. Comput"},{"key":"5775_CR30","doi-asserted-by":"publisher","first-page":"836","DOI":"10.1016\/j.future.2017.07.048","volume":"86","author":"Z Zhou","year":"2018","unstructured":"Zhou, Z., Abawajy, J., et al.: Minimizing SLA violation and power consumption in cloud data centers using adaptive energy-aware algorithms. Future Generation Computer Systems 86, 836\u2013850 (2018)","journal-title":"Future Generation Computer Systems"}],"container-title":["Cluster Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-025-05775-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10586-025-05775-2","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-025-05775-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,19]],"date-time":"2026-03-19T13:07:33Z","timestamp":1773925653000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10586-025-05775-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,11,11]]},"references-count":30,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2026,2]]}},"alternative-id":["5775"],"URL":"https:\/\/doi.org\/10.1007\/s10586-025-05775-2","relation":{},"ISSN":["1386-7857","1573-7543"],"issn-type":[{"value":"1386-7857","type":"print"},{"value":"1573-7543","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,11,11]]},"assertion":[{"value":"6 March 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"8 June 2025","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"27 September 2025","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"11 November 2025","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}},{"value":"Not applicable.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}}],"article-number":"24"}}