{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,22]],"date-time":"2025-10-22T20:48:26Z","timestamp":1761166106165,"version":"build-2065373602"},"reference-count":148,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2018,10,1]],"date-time":"2018-10-01T00:00:00Z","timestamp":1538352000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Netw Syst Manage"],"published-print":{"date-parts":[[2019,4]]},"DOI":"10.1007\/s10922-018-9475-y","type":"journal-article","created":{"date-parts":[[2018,10,1]],"date-time":"2018-10-01T09:13:55Z","timestamp":1538385235000},"page":"489-540","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":19,"title":["Trust Establishment and Estimation in Cloud Services: A Systematic Literature Review"],"prefix":"10.1007","volume":"27","author":[{"given":"Kanwal","family":"Mahmud","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9828-0738","authenticated-orcid":false,"given":"Muhammad","family":"Usman","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,10,1]]},"reference":[{"issue":"6","key":"9475_CR1","doi-asserted-by":"publisher","first-page":"968","DOI":"10.1109\/TSC.2015.2426185","volume":"9","author":"M Mehdi","year":"2016","unstructured":"Mehdi, M., Bouguila, N., Bentahar, J.: Trust and reputation of web services through QoS correlation lens. IEEE Trans. Serv. Comput. 9(6), 968\u2013981 (2016)","journal-title":"IEEE Trans. Serv. Comput."},{"issue":"3","key":"9475_CR2","doi-asserted-by":"publisher","first-page":"369","DOI":"10.1109\/TSC.2015.2413111","volume":"8","author":"L Qu","year":"2015","unstructured":"Qu, L., Wang, Y., Orgun, M.A., Liu, L., Liu, H., Bouguettaya, A.: CCCloud: context-aware and credible cloud service selection based on subjective assessment and objective assessment. IEEE Trans. Serv. Comput. 8(3), 369\u2013383 (2015)","journal-title":"IEEE Trans. Serv. Comput."},{"issue":"1","key":"9475_CR3","doi-asserted-by":"publisher","first-page":"66","DOI":"10.1109\/TCC.2014.2328578","volume":"3","author":"N Ghosh","year":"2015","unstructured":"Ghosh, N., Ghosh, S.K., Das, S.K.: SelCSP: a framework to facilitate selection of cloud service providers. IEEE Trans. Cloud Comput. 3(1), 66\u201379 (2015)","journal-title":"IEEE Trans. Cloud Comput."},{"issue":"8","key":"9475_CR4","doi-asserted-by":"publisher","first-page":"3809","DOI":"10.1016\/j.eswa.2013.12.017","volume":"41","author":"A Jula","year":"2014","unstructured":"Jula, A., Sundararajan, E., Othman, Z.: Cloud computing service composition: a systematic literature review. Expert Syst. Appl. 41(8), 3809\u20133824 (2014)","journal-title":"Expert Syst. Appl."},{"key":"9475_CR5","doi-asserted-by":"publisher","first-page":"109","DOI":"10.1016\/j.future.2016.07.013","volume":"67","author":"S Singh","year":"2017","unstructured":"Singh, S., Sidhu, J.: Compliance-based Multi-dimensional Trust Evaluation System for determining trustworthiness of Cloud Service Providers. Future Gener. Comput. Syst. 67, 109\u2013132 (2017)","journal-title":"Future Gener. Comput. Syst."},{"issue":"1","key":"9475_CR6","doi-asserted-by":"publisher","first-page":"81","DOI":"10.1007\/s10723-016-9363-1","volume":"15","author":"J Sidhu","year":"2017","unstructured":"Sidhu, J., Singh, S.: Improved TOPSIS method based trust evaluation framework for determining trustworthiness of cloud service providers. J. Grid Comput. 15(1), 81\u2013105 (2017)","journal-title":"J. Grid Comput."},{"key":"9475_CR7","doi-asserted-by":"publisher","first-page":"71","DOI":"10.1016\/j.jss.2018.05.004","volume":"143","author":"L Lu","year":"2018","unstructured":"Lu, L., Yuan, Y.: A novel TOPSIS evaluation scheme for cloud service trustworthiness combining objective and subjective aspects. J Syst Softwe 143, 71\u201386 (2018)","journal-title":"J Syst Softwe"},{"key":"9475_CR8","doi-asserted-by":"crossref","unstructured":"Sun, M., Zang, T., Xu, X., Wang, R.: Consumer-centered cloud services selection using AHP. In: International Conference on Service Sciences (ICSS) pp. 1-6 (2013)","DOI":"10.1109\/ICSS.2013.26"},{"key":"9475_CR9","doi-asserted-by":"crossref","unstructured":"Garg, S. K., Versteeg, S., Buyya, R.: SMICloud: A framework for comparing and ranking cloud services. In: Proceedings\u20142011 4th IEEE International Conference on Utility and Cloud Computing, pp. 210\u2013218 (2011)","DOI":"10.1109\/UCC.2011.36"},{"key":"9475_CR10","doi-asserted-by":"publisher","first-page":"2852","DOI":"10.1016\/j.proeng.2011.08.537","volume":"15","author":"D Sun","year":"2011","unstructured":"Sun, D., Chang, G., Sun, L., Wang, X.: Surveying and analyzing security, privacy and trust issues in cloud computing environments. Procedia Eng. 15, 2852\u20132856 (2011)","journal-title":"Procedia Eng."},{"issue":"3\u20134","key":"9475_CR11","doi-asserted-by":"publisher","first-page":"89","DOI":"10.1016\/j.istr.2011.08.004","volume":"16","author":"PG Dorey","year":"2011","unstructured":"Dorey, P.G., Leite, A.: Commentary: cloud computing - A security problem or solution? Information Security Technical Report. 16(3\u20134), 89\u201396 (2011)","journal-title":"Information Security Technical Report."},{"key":"9475_CR12","doi-asserted-by":"crossref","unstructured":"Anakath, A. S., Rajakumar, S., Ambika, S.: Privacy preserving multi factor authentication using trust management. Cluster Comput., pp. 1\u20137 (2017)","DOI":"10.1007\/s10586-017-1181-0"},{"issue":"13","key":"9475_CR13","doi-asserted-by":"publisher","first-page":"5751","DOI":"10.1016\/j.eswa.2014.03.020","volume":"41","author":"R Rezaei","year":"2014","unstructured":"Rezaei, R., Chiew, T.K., Lee, S.P., Aliee, Z.S.: A semantic interoperability framework for software as a service system in cloud computing environments. Expert Syst. Appl. 41(13), 5751\u20135770 (2014)","journal-title":"Expert Syst. Appl."},{"key":"9475_CR14","doi-asserted-by":"crossref","unstructured":"Ko, R. K., Jagadpramana, P., Mowbray, M., Pearson, S., Kirchberg, M., Liang, Q., Lee, B. S.: TrustCloud: a framework for accountability and trust in cloud computing. 2011 IEEE World Congress on Services, pp. 584\u2013588 (2011)","DOI":"10.1109\/SERVICES.2011.91"},{"key":"9475_CR15","doi-asserted-by":"crossref","unstructured":"Mehdi, M., Bouguila, N., Bentahar, J.: Trustworthy web service selection using probabilistic models. In: Proceedings\u20142012 IEEE 19th International Conference on Web Services, ICWS 2012, pp. 17\u201324 (2012)","DOI":"10.1109\/ICWS.2012.17"},{"key":"9475_CR16","doi-asserted-by":"publisher","first-page":"380","DOI":"10.1016\/j.procs.2015.03.165","volume":"45","author":"R Shaikh","year":"2015","unstructured":"Shaikh, R., Sasikumar, M.: Trust model for measuring security strength of cloud computing. Procedia Procedia Comput. Sci. 45, 380\u2013389 (2015)","journal-title":"Procedia Procedia Comput. Sci."},{"key":"9475_CR17","doi-asserted-by":"crossref","unstructured":"Chakraborty, S., Roy, K.: An SLA-based framework for estimating trustworthiness of a cloud. In: IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications, pp. 937\u2013942 (2012)","DOI":"10.1109\/TrustCom.2012.84"},{"issue":"6","key":"9475_CR18","doi-asserted-by":"publisher","first-page":"1213","DOI":"10.1109\/TPDS.2012.285","volume":"24","author":"Z Zheng","year":"2013","unstructured":"Zheng, Z., Wu, X., Zhang, Y., Lyu, M.R., Wang, J.: QoS ranking prediction for cloud services. IEEE Trans. Parallel Distrib. Syst. 24(6), 1213\u20131222 (2013)","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"issue":"2","key":"9475_CR19","doi-asserted-by":"publisher","first-page":"140","DOI":"10.1109\/TSC.2010.52","volume":"4","author":"Z Zheng","year":"2011","unstructured":"Zheng, Z., Ma, H., Lyu, M.R., King, I.: QoS-aware web service recommendation by collaborative filtering. IEEE Trans. Serv. Comput. 4(2), 140\u2013152 (2011)","journal-title":"IEEE Trans. Serv. Comput."},{"key":"9475_CR20","doi-asserted-by":"crossref","unstructured":"Noor, T. H., Sheng, Q. Z., Ngu, A. H. H., Alfazi, A., Law, J.: Cloud Armor: a platform for credibility-based trust management of cloud services. In: Proceedings of the 22nd ACM International Conference on Information and Knowledge Management, pp. 2509\u20132512 (2013)","DOI":"10.1145\/2505515.2508204"},{"key":"9475_CR21","doi-asserted-by":"crossref","unstructured":"Machhi, S., Jethava, G. B.: Feedback based trust management for cloud environment. In: Proceedings of the Second International Conference on Information and Communication Technology for Competitive Strategies, pp. 114 (2016)","DOI":"10.1145\/2905055.2905330"},{"issue":"11","key":"9475_CR22","doi-asserted-by":"publisher","first-page":"2185","DOI":"10.1002\/sec.748","volume":"7","author":"SM Habib","year":"2014","unstructured":"Habib, S.M., Ries, S., M\u00fchlh\u00e4user, M., Varikkattu, P.: Towards a Trust Management System for Cloud Computing Marketplaces: using CAIQ as a Trust Information Source. Security and Communication Networks. 7(11), 2185\u20132200 (2014)","journal-title":"Security and Communication Networks."},{"key":"9475_CR23","doi-asserted-by":"crossref","unstructured":"Bedi, P., Kaur, H., Gupta, B.: Trustworthy service provider selection in cloud computing environment. In: Proceedings\u2014International Conference on Communication Systems and Network Technologies, pp. 714\u2013719 (2012)","DOI":"10.1109\/CSNT.2012.158"},{"key":"9475_CR24","doi-asserted-by":"crossref","unstructured":"Divakarla, U., Chandrasekaran, K.: Trusted path between two entities in cloud. In: 6th International Conference on Cloud System and Big Data Engineering (Confluence). pp. 157\u2013162 (2016)","DOI":"10.1109\/CONFLUENCE.2016.7508106"},{"issue":"7","key":"9475_CR25","doi-asserted-by":"publisher","first-page":"1080","DOI":"10.1016\/j.future.2011.08.017","volume":"28","author":"M Liu","year":"2012","unstructured":"Liu, M., Wang, M., Shen, W., Luo, N., Yan, J.: A quality of service (QoS)-aware execution plan selection approach for a service composition process. Future Gener. Comput. Syst. 28(7), 1080\u20131089 (2012)","journal-title":"Future Gener. Comput. Syst."},{"issue":"6","key":"9475_CR26","doi-asserted-by":"publisher","first-page":"599","DOI":"10.1016\/j.future.2008.12.001","volume":"25","author":"R Buyya","year":"2009","unstructured":"Buyya, R., Shin, C., Venugopal, S., Broberg, J., Brandic, I.: Cloud computing and emerging IT platforms: vision, hype, and reality for delivering computing as the 5th utility. Future Gener. Comput. Syst. 25(6), 599\u2013616 (2009)","journal-title":"Future Gener. Comput. Syst."},{"issue":"3","key":"9475_CR27","doi-asserted-by":"publisher","first-page":"203","DOI":"10.1016\/j.kijoms.2016.06.002","volume":"2","author":"M Chiregi","year":"2016","unstructured":"Chiregi, M., Navimipour, N.J.: Trusted services identification in the cloud environment using the topological metrics. Karbala Int. J. Mod. Sci. 2(3), 203\u2013210 (2016)","journal-title":"Karbala Int. J. Mod. Sci."},{"issue":"1","key":"9475_CR28","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1145\/1496091.1496100","volume":"39","author":"LM Vaquero","year":"2009","unstructured":"Vaquero, L.M., Rodero-Merino, L., Caceres, J., Lindner, M.: A break in the clouds: towards a cloud definition. ACM SIGCOMM Comput. Commun. Rev. 39(1), 50\u201355 (2009)","journal-title":"ACM SIGCOMM Comput. Commun. Rev."},{"key":"9475_CR29","first-page":"7","volume":"145","author":"P Mell","year":"2011","unstructured":"Mell, P., Grance, T.: The NIST definition of cloud computing. NIST Spec. Publ. 145, 7 (2011)","journal-title":"NIST Spec. Publ."},{"key":"9475_CR30","unstructured":"Muchahari, M. K., Sinha, S. K.: A survey on web services and trust in cloud computing environment. National Workshop on Network Security, Tezpur University, vol. 2, pp. 91\u2013102 (2013)"},{"key":"9475_CR31","volume-title":"Web services: Principles and Technology","author":"M Papazoglou","year":"2007","unstructured":"Papazoglou, M.: Web services: Principles and Technology. Prentice-Hall, New Jersey (2007)"},{"key":"9475_CR32","doi-asserted-by":"crossref","unstructured":"Heilig, L., Vo\u00df, S.: Decision analytics for cloud computing: a classification and literature review. In: Tutorials in Operations Research\u2014Bridging Data and Decisions, pp. 1\u201326 (2014)","DOI":"10.1287\/educ.2014.0124"},{"issue":"4","key":"9475_CR33","doi-asserted-by":"publisher","first-page":"291","DOI":"10.1016\/j.telpol.2015.08.003","volume":"40","author":"KC Haug","year":"2016","unstructured":"Haug, K.C., Kretschmer, T., Strobel, T.: Cloud adaptiveness within industry sectors\u2014measurement and observations. Telecommun. Policy 40(4), 291\u2013306 (2016)","journal-title":"Telecommun. Policy"},{"issue":"6","key":"9475_CR34","doi-asserted-by":"publisher","first-page":"533","DOI":"10.1016\/j.ijinfomgt.2012.04.001","volume":"32","author":"A Lin","year":"2012","unstructured":"Lin, A., Chen, N.C.: Cloud computing as an innovation: perception, attitude, and adoption. Int. J. Inf. Manag. 32(6), 533\u2013540 (2012)","journal-title":"Int. J. Inf. Manag."},{"issue":"1","key":"9475_CR35","doi-asserted-by":"publisher","first-page":"176","DOI":"10.1016\/j.dss.2010.12.006","volume":"51","author":"S Marston","year":"2011","unstructured":"Marston, S., Li, Z., Bandyopadhyay, S., Zhang, J., Ghalsasi, A.: Cloud computing\u2014the business perspective. Decis. Support Syst. 51(1), 176\u2013189 (2011)","journal-title":"Decis. Support Syst."},{"key":"9475_CR36","unstructured":"Sikeridis, D., Papapanagiotou, I., Rimal, B. P., Devetsikiotis, M.: A Comparative taxonomy and survey of public cloud infrastructure vendors. arXiv preprint arXiv:1710.01476 (2017)"},{"key":"9475_CR37","first-page":"61","volume":"1","author":"SM Ram","year":"2011","unstructured":"Ram, S.M., Vijayaraj, V.: Analysis of the characteristics and trusted security of cloud computing. Int. J. Cloud Comput. 1, 61\u201369 (2011)","journal-title":"Int. J. Cloud Comput."},{"key":"9475_CR38","doi-asserted-by":"crossref","unstructured":"El-Gazzar, R. F.: A literature review on cloud computing adoption issues in enterprises. In: Springer International Working Conference on Transfer and Diffusion of IT. pp. 214\u2013242 (2014)","DOI":"10.1007\/978-3-662-43459-8_14"},{"key":"9475_CR39","doi-asserted-by":"publisher","first-page":"167","DOI":"10.1016\/j.jss.2015.02.002","volume":"103","author":"N Phaphoom","year":"2015","unstructured":"Phaphoom, N., Wang, X., Samuel, S., Helmer, S., Abrahamsson, P.: A survey study on major technical barriers affecting the decision to adopt cloud services. J. Syst. Softw. 103, 167\u2013181 (2015)","journal-title":"J. Syst. Softw."},{"key":"9475_CR40","doi-asserted-by":"crossref","unstructured":"Smith, A., Bhogal, J., Sharma, M.: Cloud computing: adoption considerations for business and education. In: IEEE International Conference on Future Internet of Things and Cloud (FiCloud), pp. 302\u2013307 (2014)","DOI":"10.1109\/FiCloud.2014.54"},{"key":"9475_CR41","doi-asserted-by":"crossref","unstructured":"Zhang, S., Zhang, S., Chen, X., Huo, X.: Cloud computing research and development trend. In: IEEE Second International Conference on Future Networks. ICFN\u201910, pp. 93\u201397 (2010)","DOI":"10.1109\/ICFN.2010.58"},{"issue":"4","key":"9475_CR42","doi-asserted-by":"publisher","first-page":"474","DOI":"10.1016\/j.ijinfomgt.2014.04.006","volume":"34","author":"PF Hsu","year":"2014","unstructured":"Hsu, P.F., Ray, S., Li-Hsieh, Y.Y.: Examining cloud computing adoption intention, pricing mechanism, and deployment model. Int. J. Inf. Manag. 34(4), 474\u2013488 (2014)","journal-title":"Int. J. Inf. Manag."},{"issue":"2","key":"9475_CR43","doi-asserted-by":"publisher","first-page":"47","DOI":"10.5430\/jms.v8n2p47","volume":"8","author":"A Tarhini","year":"2017","unstructured":"Tarhini, A.: Masa\u2019deh RE, Al-Badi A, Almajali M, Alrabayaah SH (2017) Factors influencing employees\u2019 intention to use cloud computing. Journal of Management and Strategy 8(2), 47 (2017)","journal-title":"Journal of Management and Strategy"},{"issue":"3","key":"9475_CR44","doi-asserted-by":"publisher","first-page":"400","DOI":"10.1108\/JEIM-02-2014-0017","volume":"28","author":"F Safari","year":"2015","unstructured":"Safari, F., Safari, N., Hasanzadeh, A.: The adoption of software-as-a-service (SaaS): ranking the determinants. J. Enterp. Inf. Manag. 28(3), 400\u2013422 (2015)","journal-title":"J. Enterp. Inf. Manag."},{"issue":"5","key":"9475_CR45","doi-asserted-by":"publisher","first-page":"861","DOI":"10.1016\/j.ijinfomgt.2013.07.001","volume":"33","author":"P Gupta","year":"2013","unstructured":"Gupta, P., Seetharaman, A., Raj, J.R.: The usage and adoption of cloud computing by small and medium businesses. Int. J. Inf. Manag. 33(5), 861\u2013874 (2013)","journal-title":"Int. J. Inf. Manag."},{"key":"9475_CR46","doi-asserted-by":"crossref","unstructured":"Garg, R., Stiller, B.: Factors affecting cloud adoption and their interrelations. In: Closer, pp. 87\u201394 (2015)","DOI":"10.5220\/0005412300870094"},{"key":"9475_CR47","doi-asserted-by":"publisher","first-page":"64","DOI":"10.1016\/j.jss.2016.04.061","volume":"118","author":"R El-Gazzar","year":"2016","unstructured":"El-Gazzar, R., Hustad, E., Olsen, D.H.: Understanding cloud computing adoption issues: a Delphi study approach. J. Syst. Softw. 118, 64\u201384 (2016)","journal-title":"J. Syst. Softw."},{"key":"9475_CR48","doi-asserted-by":"crossref","unstructured":"Firdhous, M., Ghazali, O., Hassan, S.: Applying bees algorithm for trust management in cloud computing. In: Bio-Inspired Models of Networks, Information, and Computing Systems: 6th International ICST Conference, pp. 224\u2013229 (2011)","DOI":"10.1007\/978-3-642-32711-7_21"},{"key":"9475_CR49","doi-asserted-by":"crossref","unstructured":"Habib, S. M., Ries, S., Muhlhauser, M.: Towards a trust management system for cloud computing. In: 2011 IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications, pp. 933\u2013939 (2011)","DOI":"10.1109\/TrustCom.2011.129"},{"issue":"3","key":"9475_CR50","first-page":"289","volume":"16","author":"FZ Filali","year":"2015","unstructured":"Filali, F.Z., Yagoubi, B.: Classifying and filtering users by similarity measures for trust management in cloud environment. Scalable Comput. 16(3), 289\u2013302 (2015)","journal-title":"Scalable Comput."},{"issue":"30","key":"9475_CR51","doi-asserted-by":"publisher","first-page":"32","DOI":"10.12913\/22998624\/62703","volume":"10","author":"S Kumar","year":"2016","unstructured":"Kumar, S., Mittal, S., Singh, M.: Fuzzy based trust management system for cloud environment. Adv. Sci. Technol. Res. J. 10(30), 32\u201337 (2016)","journal-title":"Adv. Sci. Technol. Res. J."},{"key":"9475_CR52","doi-asserted-by":"crossref","unstructured":"Harbajanka, S., Saxena, P.: security issues and trust management in cloud computing. In: Proceedings of the ACM Symposium on Women in Research, pp. 1\u20133 (2016)","DOI":"10.1145\/2909067.2909068"},{"key":"9475_CR53","doi-asserted-by":"publisher","first-page":"1170","DOI":"10.1016\/j.procs.2013.05.149","volume":"17","author":"X Wu","year":"2013","unstructured":"Wu, X., Zhang, R., Zeng, B., Zhou, S.: A trust evaluation model for cloud computing. Procedia Comput. Sci. 17, 1170\u20131177 (2013)","journal-title":"Procedia Comput. Sci."},{"key":"9475_CR54","doi-asserted-by":"publisher","first-page":"233","DOI":"10.1016\/j.future.2015.03.018","volume":"54","author":"D Serrano","year":"2016","unstructured":"Serrano, D., Bouchenak, S., Kouki, Y., de Oliveira Jr, F.A., Ledoux, T., Lejeune, J., Sens, P.: SLA guarantees for cloud services. Future Gener. Comput. Syst. 54, 233\u2013246 (2016)","journal-title":"Future Gener. Comput. Syst."},{"issue":"4","key":"9475_CR55","doi-asserted-by":"publisher","first-page":"107","DOI":"10.14257\/ijdta.2016.9.4.10","volume":"9","author":"R Sahal","year":"2016","unstructured":"Sahal, R., Khafagy, M.H., Omara, F.A.: A survey on SLA management for cloud computing and cloud-hosted big data analytic applications. Int. J. Database Theory Appl. 9(4), 107\u2013118 (2016)","journal-title":"Int. J. Database Theory Appl."},{"key":"9475_CR56","doi-asserted-by":"crossref","unstructured":"Bianco, P., Lewis, G. A., Merson, P.: Service level agreements in service-oriented architecture environments. Carnegie-Mellon Univ Pittsburgh Pa Software Engineering Inst. No. CMU\/SEI-2008-TN-021 (2008)","DOI":"10.21236\/ADA528751"},{"issue":"5","key":"9475_CR57","doi-asserted-by":"publisher","first-page":"7","DOI":"10.14257\/ijgdc.2015.8.5.02","volume":"8","author":"E Aljoumah","year":"2015","unstructured":"Aljoumah, E., Al-Mousawi, F., Ahmad, I., Al-Shammri, M., Al-Jady, Z.: SLA in cloud computing architectures: a comprehensive study. Int. J. Grid Distrib. Comput. 8(5), 7\u201332 (2015)","journal-title":"Int. J. Grid Distrib. Comput."},{"issue":"1","key":"9475_CR58","first-page":"29","volume":"13","author":"NR Darwish","year":"2015","unstructured":"Darwish, N.R., Mohamed, R.E., Elsayed, D.H.: A proposed approach for monitoring quality of web services using service level agreement. Int. J. Comput. Sci. Inf. Secur. 13(1), 29 (2015)","journal-title":"Int. J. Comput. Sci. Inf. Secur."},{"key":"9475_CR59","unstructured":"Frey, S., Reich, C., L\u00fcthje, C.: Key performance indicators for cloud computing SLAs. In: The Fifth International Conference on Emerging Network Intelligence, EMERGING, pp. 60\u201364 (2013)"},{"issue":"1","key":"9475_CR60","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.compind.2013.09.001","volume":"65","author":"R Rezaei","year":"2014","unstructured":"Rezaei, R., Chiew, T.K., Lee, S.P., Aliee, Z.S.: Interoperability evaluation models: a systematic review. Comput. Ind. 65(1), 1\u201323 (2014)","journal-title":"Comput. Ind."},{"issue":"1","key":"9475_CR61","first-page":"40","volume":"10","author":"P Kaur","year":"2015","unstructured":"Kaur, P., Singh, H.: An analytical review of quality attributes of service-oriented architecture. Trends Inf. Manag. 10(1), 40\u201350 (2015)","journal-title":"Trends Inf. Manag."},{"issue":"3","key":"9475_CR62","first-page":"38","volume":"4","author":"L Burkon","year":"2013","unstructured":"Burkon, L.: Quality of service attributes for software as a service. J Syst. Integr. 4(3), 38 (2013)","journal-title":"J Syst. Integr."},{"key":"9475_CR63","doi-asserted-by":"crossref","unstructured":"Anisetti, M., Ardagna, C. A., Damiani, E., Gaudenzi, F., Veca, R.: Toward security and performance certification of open stack. In: IEEE 8th International Conference on Cloud Computing (CLOUD), pp. 564\u2013571 (2015)","DOI":"10.1109\/CLOUD.2015.81"},{"key":"9475_CR64","doi-asserted-by":"crossref","unstructured":"Cimato, S., Damiani, E., Zavatarelli, F., Menicocci, R.: Towards the certification of cloud services. In: IEEE Ninth World Congress on Services (SERVICES), pp. 92\u201397 (2013)","DOI":"10.1109\/SERVICES.2013.16"},{"issue":"9","key":"9475_CR65","doi-asserted-by":"publisher","first-page":"44","DOI":"10.1109\/MC.2011.223","volume":"44","author":"F Rocha","year":"2011","unstructured":"Rocha, F., Abreu, S., Correia, M.: The final frontier: confidentiality and privacy in the cloud. Computer 44(9), 44\u201350 (2011)","journal-title":"Computer"},{"key":"9475_CR66","unstructured":"Krotsiani, M., Spanoudakis, G., Mahbub, K.: Incremental certification of cloud services. In: SECURWARE7th International Conference on Emerging Security Information, Systems and Technologies, pp. 72\u201380 (2013)"},{"key":"9475_CR67","doi-asserted-by":"crossref","unstructured":"Anisetti, M., Ardagna, C. A., Damiani, E.: A certification-based trust model for autonomic cloud computing systems. In: IEEE International Conference on Cloud and Autonomic Computing (ICCAC), pp. 212\u2013219 (2014)","DOI":"10.1109\/ICCAC.2014.8"},{"issue":"2","key":"9475_CR68","doi-asserted-by":"publisher","first-page":"66","DOI":"10.1109\/MSP.2016.26","volume":"14","author":"S Lins","year":"2016","unstructured":"Lins, S., Grochol, P., Schneider, S., Sunyaev, A.: Dynamic certification of cloud services: trust, but verify! IEEE Secur. Priv. 14(2), 66\u201371 (2016)","journal-title":"IEEE Secur. Priv."},{"key":"9475_CR69","doi-asserted-by":"crossref","unstructured":"Katopodis, S., Spanoudakis, G., Mahbub, K.: Towards hybrid cloud service certification models. In: IEEE International Conference on Services Computing (SCC), pp. 394\u201399 (2014)","DOI":"10.1109\/SCC.2014.59"},{"key":"9475_CR70","doi-asserted-by":"crossref","unstructured":"Schneider, S., Lansing, J., Gao, F., Sunyaev, A.: A taxonomic perspective on certification schemes: development of a taxonomy for cloud service certification criteria. In: IEEE International Conference on System Sciences (HICSS), pp. 4998\u20135007 (2014)","DOI":"10.1109\/HICSS.2014.614"},{"key":"9475_CR71","doi-asserted-by":"crossref","unstructured":"Anisetti, M., Ardagna, C., Damiani, E., Gaudenzi, F.: A semi-automatic and trustworthy scheme for continuous cloud service certification. In: IEEE Transactions on Services Computing (2017)","DOI":"10.1109\/TSC.2017.2657505"},{"issue":"3","key":"9475_CR72","doi-asserted-by":"publisher","first-page":"118","DOI":"10.1177\/014107680309600304","volume":"96","author":"KS Khan","year":"2003","unstructured":"Khan, K.S., Kunz, R., Kleijnen, J., Antes, G.: Five steps to conducting a systematic review. J. R. Soc. Med. 96(3), 118\u2013121 (2003)","journal-title":"J. R. Soc. Med."},{"issue":"1","key":"9475_CR73","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1016\/0167-4048(95)97025-6","volume":"14","author":"MD Abrams","year":"1995","unstructured":"Abrams, M.D., Joyce, M.V.: Trusted system concepts. Comput. Secur. 14(1), 45\u201356 (1995)","journal-title":"Comput. Secur."},{"key":"9475_CR74","doi-asserted-by":"publisher","first-page":"505","DOI":"10.1007\/s10551-010-0603-1","volume":"90","author":"S Grabner- Kr\u00e4uter","year":"2009","unstructured":"Grabner- Kr\u00e4uter, S.: Web 2.0 social networks: the role of trust. J. Bus. Ethics 90, 505\u2013522 (2009)","journal-title":"J. Bus. Ethics"},{"issue":"1","key":"9475_CR75","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1080\/07360932.2013.781517","volume":"44","author":"S Grabner-Kr\u00e4uter","year":"2015","unstructured":"Grabner-Kr\u00e4uter, S., Bitter, S.: Trust in online social networks: a multifaceted perspective. Forum Soc. Econ. 44(1), 48\u201368 (2015)","journal-title":"Forum Soc. Econ."},{"issue":"5","key":"9475_CR76","doi-asserted-by":"publisher","first-page":"20","DOI":"10.1109\/MITP.2010.128","volume":"12","author":"KM Khan","year":"2010","unstructured":"Khan, K.M., Malluhi, Q.: Establishing trust in cloud computing. IT Prof. 12(5), 20\u201327 (2010)","journal-title":"IT Prof."},{"issue":"3\u20134","key":"9475_CR77","doi-asserted-by":"publisher","first-page":"108","DOI":"10.1016\/j.istr.2011.08.006","volume":"16","author":"IM Abbadi","year":"2011","unstructured":"Abbadi, I.M., Martin, A.: Trust in the cloud. Inf. Secur. Tech. Rep. 16(3\u20134), 108\u2013114 (2011)","journal-title":"Inf. Secur. Tech. Rep."},{"issue":"1","key":"9475_CR78","doi-asserted-by":"publisher","first-page":"9","DOI":"10.1186\/2192-113X-2-9","volume":"2","author":"J Huang","year":"2013","unstructured":"Huang, J., Nicol, D.M.: Trust mechanisms for cloud computing. J. Cloud Comput. Adv. Syst. Appl. 2(1), 9 (2013)","journal-title":"J. Cloud Comput. Adv. Syst. Appl."},{"key":"9475_CR79","doi-asserted-by":"crossref","unstructured":"Abdul-Rahman, A., Hailes, S.: Supporting trust in virtual communities. In\u00a0Proceedings of the 33rd Annual Hawaii International Conference on\u00a0System Sciences. 9 (2000)","DOI":"10.1109\/HICSS.2000.926814"},{"issue":"3","key":"9475_CR80","doi-asserted-by":"publisher","first-page":"52","DOI":"10.1109\/MPRV.2003.1228527","volume":"2","author":"V Cahill","year":"2003","unstructured":"Cahill, V., Gray, E., Seigneur, J.M., Jensen, C.D., Chen, Y., Shand, B., Wagealla, W.: Using trust for secure collaboration in uncertain environments. Pervasive Comput. 2(3), 52\u201361 (2003)","journal-title":"Pervasive Comput."},{"key":"9475_CR81","doi-asserted-by":"crossref","unstructured":"Carbone, M., Nielsen, M., Sassone, V.: A formal model for trust in dynamic networks. In: IEEE Proceedings First International Conference on Software Engineering and Formal Methods, pp. 54\u201361 (2003)","DOI":"10.1109\/SEFM.2003.1236207"},{"issue":"2","key":"9475_CR82","doi-asserted-by":"publisher","first-page":"618","DOI":"10.1016\/j.dss.2005.05.019","volume":"43","author":"A J\u00f8sang","year":"2007","unstructured":"J\u00f8sang, A., Ismail, R., Boyd, C.: A survey of trust and reputation systems for online service provision. Decis. Support Syst. 43(2), 618\u2013644 (2007)","journal-title":"Decis. Support Syst."},{"issue":"3","key":"9475_CR83","doi-asserted-by":"publisher","first-page":"225","DOI":"10.1007\/s10723-008-9101-4","volume":"6","author":"T Eymann","year":"2008","unstructured":"Eymann, T., K\u00f6nig, S., Matros, R.: A framework for trust and reputation in grid environments. J. Grid Comput. 6(3), 225\u2013237 (2008)","journal-title":"J. Grid Comput."},{"key":"9475_CR84","doi-asserted-by":"crossref","unstructured":"Manuel, P. D., Selvi, S. T., Abd-El Barr, M. I.: Trust management system for grid and cloud resources. In: IEEE First International Conference on Advanced Computing, ICAC, pp. 176\u2013181 (2009)","DOI":"10.1109\/ICADVC.2009.5378187"},{"issue":"2","key":"9475_CR85","doi-asserted-by":"publisher","first-page":"329","DOI":"10.1007\/s40815-016-0146-4","volume":"19","author":"A Selvaraj","year":"2017","unstructured":"Selvaraj, A., Sundararajan, S.: Evidence-Based Trust Evaluation System for Cloud Services Using Fuzzy Logic. Int. J. Fuzzy Syst. 19(2), 329\u2013337 (2017)","journal-title":"Int. J. Fuzzy Syst."},{"key":"9475_CR86","doi-asserted-by":"crossref","unstructured":"Guo, S., Xu, H.: A non-interactive secure outsourced computation scheme in multi-party cloud. In: Proceedings of the 2012 4th International Conference on Intelligent Networking and Collaborative Systems, pp. 15\u201319 (2012)","DOI":"10.1109\/iNCoS.2012.50"},{"issue":"5","key":"9475_CR87","doi-asserted-by":"publisher","first-page":"1073","DOI":"10.1016\/j.compeleceng.2012.06.006","volume":"38","author":"IM Abbadi","year":"2012","unstructured":"Abbadi, I.M., Alawneh, M.: A framework for establishing trust in the cloud. Comput. Electr. Eng. 38(5), 1073\u20131087 (2012)","journal-title":"Comput. Electr. Eng."},{"key":"9475_CR88","doi-asserted-by":"publisher","first-page":"439","DOI":"10.1016\/j.procs.2014.08.066","volume":"37","author":"J Sidhu","year":"2014","unstructured":"Sidhu, J., Singh, S.: Compliance based trustworthiness calculation mechanism in cloud environment. Procedia Comput. Sci. 37, 439\u2013446 (2014)","journal-title":"Procedia Comput. Sci."},{"key":"9475_CR89","doi-asserted-by":"crossref","unstructured":"Abdallah, E. G., Zulkernine, M., Gu, Y. X., Liem, C.: TRUST-CAP: A Trust Model for Cloud-Based Applications. In: IEEE 41st Annual Computer Software and Applications Conference (COMPSAC), vol. 2, pp. 584\u2013589 (2017)","DOI":"10.1109\/COMPSAC.2017.256"},{"issue":"2","key":"9475_CR90","first-page":"1","volume":"2","author":"A Rashidi","year":"2012","unstructured":"Rashidi, A., Movahhedinia, N.: A Model for User Trust in Cloud Computing. Int. J. Cloud Comput. Serv. Archit. 2(2), 1\u20138 (2012)","journal-title":"Int. J. Cloud Comput. Serv. Archit."},{"issue":"1","key":"9475_CR91","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1049\/iet-ifs.2012.0232","volume":"7","author":"X Li","year":"2013","unstructured":"Li, X., Du, J.: Adaptive and attribute-based trust model for service level agreement guarantee in cloud computing. Inf. Secur. IET 7(1), 39\u201350 (2013)","journal-title":"Inf. Secur. IET"},{"key":"9475_CR92","doi-asserted-by":"crossref","unstructured":"Fan, W., Perros, H.: A reliability-based trust management mechanism for cloud services. In: Proceedings\u201412th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013, pp. 1581\u20131586 (2013)","DOI":"10.1109\/TrustCom.2013.194"},{"key":"9475_CR93","doi-asserted-by":"crossref","first-page":"941","DOI":"10.1016\/j.amc.2014.09.058","volume":"247","author":"S Ding","year":"2014","unstructured":"Ding, S., Xia, C., Cai, Q., Zhou, K., Yang, S.: QoS-aware resource matching and recommendation for cloud computing systems. Appl. Math. Comput. 247, 941\u2013950 (2014)","journal-title":"Appl. Math. Comput."},{"issue":"2","key":"9475_CR94","first-page":"975","volume":"121","author":"S Taneja","year":"2015","unstructured":"Taneja, S., Rathi, K.: A trust evaluation model to recommend a service provider to a customer in cloud environment. Int. J. Comput. Appl. 121(2), 975\u20138887 (2015)","journal-title":"Int. J. Comput. Appl."},{"issue":"9","key":"9475_CR95","doi-asserted-by":"publisher","first-page":"3495","DOI":"10.1007\/s11771-015-2889-8","volume":"22","author":"H Ma","year":"2015","unstructured":"Ma, H., Hu, Z.: User preferences-aware recommendation for trustworthy cloud services based on fuzzy clustering. J. Cent South Univ. 22(9), 3495\u20133505 (2015)","journal-title":"J. Cent South Univ."},{"issue":"30","key":"9475_CR96","doi-asserted-by":"publisher","first-page":"32","DOI":"10.12913\/22998624\/62703","volume":"10","author":"S Kumar","year":"2016","unstructured":"Kumar, S., Mittal, S., Singh, M.: Fuzzy based trust management system for cloud environment. Adv. Sci. Technol. Res. J. 10(30), 32\u201337 (2016)","journal-title":"Adv. Sci. Technol. Res. J."},{"key":"9475_CR97","doi-asserted-by":"crossref","unstructured":"Saripalli, P., Pingali, G.: MADMAC: Multiple attribute Decision methodology for Adoption of clouds. In: Proceedings\u20142011 IEEE 4th International Conference on Cloud Computing, pp. 316\u2013323 (2011)","DOI":"10.1109\/CLOUD.2011.61"},{"issue":"4","key":"9475_CR98","doi-asserted-by":"publisher","first-page":"1012","DOI":"10.1016\/j.future.2012.06.006","volume":"29","author":"SK Garg","year":"2012","unstructured":"Garg, S.K., Versteeg, S., Buyya, R.: A framework for ranking of cloud computing services. Future Gener. Comput. Syst. 29(4), 1012\u20131023 (2012)","journal-title":"Future Gener. Comput. Syst."},{"issue":"4","key":"9475_CR99","doi-asserted-by":"publisher","first-page":"573","DOI":"10.1109\/TSC.2012.31","volume":"6","author":"H Sun","year":"2013","unstructured":"Sun, H., Zheng, Z., Chen, J., Lyu, M.R.: Personalized web service recommendation via normal recovery collaborative filtering. IEEE Trans. Serv. Comput. 6(4), 573\u2013579 (2013)","journal-title":"IEEE Trans. Serv. Comput."},{"key":"9475_CR100","doi-asserted-by":"publisher","first-page":"233","DOI":"10.1016\/j.future.2015.03.018","volume":"54","author":"D Serrano","year":"2016","unstructured":"Serrano, D., Bouchenak, S., Kouki, Y., de Oliveira Jr, F.A., Ledoux, T., Lejeune, J., Sens, P.: SLA guarantees for cloud services. Future Gener. Comput. Syst. 54, 233\u2013246 (2016)","journal-title":"Future Gener. Comput. Syst."},{"issue":"1","key":"9475_CR101","doi-asserted-by":"publisher","first-page":"281","DOI":"10.1007\/s10479-013-1380-x","volume":"233","author":"P Manuel","year":"2015","unstructured":"Manuel, P.: A trust model of cloud computing based on quality of service. Ann. Oper. Res. 233(1), 281\u2013292 (2015)","journal-title":"Ann. Oper. Res."},{"key":"9475_CR102","doi-asserted-by":"crossref","unstructured":"Takabi, H., Joshi, J. B. D., Ahn, G. J.: SecureCloud: Towards a comprehensive security framework for cloud computing environments. In: Proceedings\u2014International Computer Software and Applications Conference, pp. 393\u2013398 (2010)","DOI":"10.1109\/COMPSACW.2010.74"},{"issue":"13","key":"9475_CR103","first-page":"3908","volume":"12","author":"M Balasubramanian","year":"2017","unstructured":"Balasubramanian, M., Kim, H.: Trust Evaluation Scheme for Cloud Data Security using Fuzzy based Approach. Int. J. Appl. Eng. Res. 12(13), 3908\u20133913 (2017)","journal-title":"Int. J. Appl. Eng. Res."},{"key":"9475_CR104","doi-asserted-by":"crossref","unstructured":"Handoko, B. L., Widuri, R., Sarjono, H.: The effect of third party auditor and quality of service through cloud storage security to cloud user trust. In: IEEE 9th International Conference on Communication Software and Networks (ICCSN), pp. 1397\u20131401 (2017)","DOI":"10.1109\/ICCSN.2017.8230339"},{"key":"9475_CR105","doi-asserted-by":"publisher","first-page":"191","DOI":"10.1016\/j.procs.2015.09.192","volume":"61","author":"S Rizvi","year":"2015","unstructured":"Rizvi, S., Karpinski, K., Kelly, B., Walker, T.: Utilizing third party auditing to manage trust in the cloud. Procedia Comput. Sci. 61, 191\u2013197 (2015)","journal-title":"Procedia Comput. Sci."},{"key":"9475_CR106","doi-asserted-by":"crossref","unstructured":"Meera, G., Geethakumari, G.: A provenance auditing framework for cloud computing systems. In: IEEE International Conference on Signal Processing, Informatics, Communication and Energy Systems (SPICES), pp. 1\u20135 (2015)","DOI":"10.1109\/SPICES.2015.7091427"},{"key":"9475_CR107","unstructured":"Lins, S., Schneider, S., Sunyaev, A.: Trust is good, control is better: creating secure clouds by continuous auditing. In: IEEE Transactions on Cloud Computing. (2016)"},{"key":"9475_CR108","doi-asserted-by":"crossref","unstructured":"Mei, S., Liu, C., Cheng, Y., Wu, J., Wang, Z.: TETPA: A case for trusted third party auditor in Cloud environment. In IEEE Conference Anthology, pp. 1\u20134 (2013)","DOI":"10.1109\/ANTHOLOGY.2013.6784998"},{"key":"9475_CR109","doi-asserted-by":"crossref","unstructured":"Ko, R. K., Lee, B. S., Pearson, S.: Towards achieving accountability, auditability and trust in cloud computing. In: International Conference on Advances in Computing and Communications, pp. 432\u2013444. Springer, Berlin (2011)","DOI":"10.1007\/978-3-642-22726-4_45"},{"issue":"1","key":"9475_CR110","first-page":"1","volume":"3","author":"H Kim","year":"2010","unstructured":"Kim, H., Lee, H., Kim, W., Kim, Y.: A trust evaluation model for QoS guarantee in cloud systems. Int. J. Grid Distrib. Comput. 3(1), 1\u201310 (2010)","journal-title":"Int. J. Grid Distrib. Comput."},{"key":"9475_CR111","doi-asserted-by":"crossref","unstructured":"Kuehnhausen, M., Frost, V. S., Minden, G. J.: Framework for assessing the trustworthiness of cloud resources. In: 2012 IEEE International Multi-Disciplinary Conference on Cognitive Methods in Situation Awareness and Decision Support, pp. 142\u2013145 (2012)","DOI":"10.1109\/CogSIMA.2012.6188367"},{"key":"9475_CR112","doi-asserted-by":"crossref","unstructured":"Rahman, R., Imran, A., Gias, A. U., Sakib, K.: A peer to peer resource provisioning scheme for cloud computing environment using multi attribute utility theory. In: 3rd International Conference on Innovative Computing Technology, pp. 132\u2013137 (2013)","DOI":"10.1109\/INTECH.2013.6653648"},{"issue":"8","key":"9475_CR113","doi-asserted-by":"publisher","first-page":"1285","DOI":"10.1016\/j.future.2011.11.003","volume":"28","author":"K Tserpes","year":"2012","unstructured":"Tserpes, K., Aisopos, F., Kyriazis, D., Varvarigou, T.: A recommender mechanism for service selection in service-oriented environments. Future Gener. Comput. Syst. 28(8), 1285\u20131294 (2012)","journal-title":"Future Gener. Comput. Syst."},{"key":"9475_CR114","doi-asserted-by":"crossref","unstructured":"Qu, L., Wang, Y., Orgun, M. A.: Cloud service selection based on the aggregation of user feedback and quantitative performance assessment. In: IEEE International Conference on Services Computing (SCC), pp. 152\u2013159 (2013)","DOI":"10.1109\/SCC.2013.92"},{"key":"9475_CR115","doi-asserted-by":"publisher","first-page":"216","DOI":"10.1016\/j.knosys.2013.11.014","volume":"56","author":"S Ding","year":"2014","unstructured":"Ding, S., Yang, S., Zhang, Y., Liang, C., Xia, C.: Combining QoS prediction and customer satisfaction estimation to solve cloud service trustworthiness evaluation problems. Knowl. Based Syst. 56, 216\u2013225 (2014)","journal-title":"Knowl. Based Syst."},{"issue":"5","key":"9475_CR116","first-page":"41","volume":"7","author":"FZ Filali","year":"2015","unstructured":"Filali, F.Z., Yagoubi, B.: Global Trust: a Trust Model for Cloud Service Selection. Int. J. Comput. Netw. Inf. Secur. 7(5), 41\u201350 (2015)","journal-title":"Int. J. Comput. Netw. Inf. Secur."},{"issue":"3","key":"9475_CR117","doi-asserted-by":"publisher","first-page":"369","DOI":"10.1109\/TSC.2015.2413111","volume":"8","author":"L Qu","year":"2015","unstructured":"Qu, L., Wang, Y., Orgun, M.A., Liu, L., Liu, H., Bouguettaya, A.: CCCloud: context-aware and credible cloud service selection based on subjective assessment and objective assessment. IEEE Trans. Serv. Comput. 8(3), 369\u2013383 (2015)","journal-title":"IEEE Trans. Serv. Comput."},{"issue":"11","key":"9475_CR118","first-page":"1","volume":"10","author":"Y Pan","year":"2015","unstructured":"Pan, Y., Ding, S., Fan, W., Li, J., Yang, S.: Trust-enhanced cloud service selection model based on QoS analysis. PLoS ONE 10(11), 1\u201319 (2015)","journal-title":"PLoS ONE"},{"key":"9475_CR119","doi-asserted-by":"publisher","first-page":"75","DOI":"10.1016\/j.eswa.2016.01.010","volume":"53","author":"Y Xu","year":"2016","unstructured":"Xu, Y., Yin, J., Deng, S.: N. Xiong, N., Huang, J.: context-aware QoS prediction for web service recommendation and selection. Expert Syst. Appl. 53, 75\u201386 (2016)","journal-title":"Expert Syst. Appl."},{"key":"9475_CR120","doi-asserted-by":"crossref","unstructured":"Emeakaroha, V., Fatema, K., Vanderwerff, L., Healy, P., Lynn, T., Morrison, J.: A Trust Label System for Communicating Trust in Cloud Services. In: IEEE Transactions on Services Computing (2016)","DOI":"10.1109\/TSC.2016.2553036"},{"issue":"2","key":"9475_CR121","doi-asserted-by":"publisher","first-page":"208","DOI":"10.1007\/s11633-014-0840-3","volume":"12","author":"W-J Fan","year":"2014","unstructured":"Fan, W.-J., Yang, S.-L., Perros, H., Pei, J.: A multi-dimensional trust-aware cloud service selection mechanism based on evidential reasoning approach. Int. J. Autom. Comput. 12(2), 208\u2013219 (2014)","journal-title":"Int. J. Autom. Comput."},{"issue":"3","key":"9475_CR122","doi-asserted-by":"publisher","first-page":"203","DOI":"10.1016\/j.kijoms.2016.06.002","volume":"2","author":"M Chiregi","year":"2016","unstructured":"Chiregi, M., Navimipour, N.J.: Trusted services identification in the cloud environment using the topological metrics. Karbala Int. J. Mod. Sci. 2(3), 203\u2013210 (2016)","journal-title":"Karbala Int. J. Mod. Sci."},{"issue":"3","key":"9475_CR123","doi-asserted-by":"publisher","first-page":"297","DOI":"10.1007\/s11633-011-0585-1","volume":"8","author":"B Li","year":"2011","unstructured":"Li, B., Cao, B.Q., Wen, K.M., Li, R.X.: Trustworthy assurance of service interoperation in cloud environment. Int. J. Autom. Comput. 8(3), 297\u2013308 (2011)","journal-title":"Int. J. Autom. Comput."},{"key":"9475_CR124","doi-asserted-by":"crossref","unstructured":"Divakarla, U., Chandrasekaran, K.: Trusted path between two entities in Cloud. In: Cloud System and Big Data Engineering (Confluence), 6th International Conference, pp. 157\u2013162 (2016)","DOI":"10.1109\/CONFLUENCE.2016.7508106"},{"key":"9475_CR125","doi-asserted-by":"publisher","DOI":"10.17485\/ijst\/2016\/v9i48\/107967","author":"J Bharath","year":"2016","unstructured":"Bharath, J., Shankar Sriram, V. S.: Genetically modified ant colony optimization based trust evaluation in cloud computing. Indian J. Sci. Technol. (2016). https:\/\/doi.org\/10.17485\/ijst\/2016\/v9i48\/107967","journal-title":"Indian J. Sci. Technol."},{"key":"9475_CR126","unstructured":"Hang, C. W., Singh, M. P.: Selecting trustworthy service in service-oriented environments. In: The 12th AAMAS Workshop on Trust in Agent Societies, pp. 1\u201312 (2009)"},{"key":"9475_CR127","doi-asserted-by":"crossref","unstructured":"Nevell, D. A, Maskell, S. R., Horridge, P. R., Barnett, H. L.: Fusion of data from sources with different levels of trust. In: 13th International Conference on Information Fusion, pp. 1\u20137 (2010)","DOI":"10.1109\/ICIF.2010.5711842"},{"issue":"1","key":"9475_CR128","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1145\/1921641.1921646","volume":"6","author":"CW Hang","year":"2011","unstructured":"Hang, C.W., Singh, M.P.: Trustworthy service selection and composition. ACM Trans. Auton. Adapt. Syst. 6(1), 5 (2011)","journal-title":"ACM Trans. Auton. Adapt. Syst."},{"issue":"3","key":"9475_CR129","doi-asserted-by":"publisher","first-page":"311","DOI":"10.1002\/sec.350","volume":"5","author":"W Wang","year":"2012","unstructured":"Wang, W., Zeng, G., Zhang, J., Tang, D.: Dynamic trust evaluation and scheduling framework for cloud computing. Secur. Commun. Netw. 5(3), 311\u2013318 (2012)","journal-title":"Secur. Commun. Netw."},{"issue":"11","key":"9475_CR130","doi-asserted-by":"publisher","first-page":"2185","DOI":"10.1002\/sec.748","volume":"7","author":"SM Habib","year":"2014","unstructured":"Habib, S.M., Ries, S., M\u00fchlh\u00e4user, M., Varikkattu, P.: Towards a trust management system for cloud computing marketplaces: using CAIQ as a trust information source. Secur. Commun. Netw. 7(11), 2185\u20132200 (2014)","journal-title":"Secur. Commun. Netw."},{"issue":"3","key":"9475_CR131","doi-asserted-by":"publisher","first-page":"467","DOI":"10.1109\/TSC.2014.2338851","volume":"8","author":"SY Hwang","year":"2015","unstructured":"Hwang, S.Y., Hsu, C.C., Lee, C.H.: Service selection for web services with probabilistic QoS. IEEE Trans. Serv. Comput. 8(3), 467\u2013480 (2015)","journal-title":"IEEE Trans. Serv. Comput."},{"issue":"17","key":"9475_CR132","first-page":"18","volume":"5","author":"A Algamdi","year":"2017","unstructured":"Algamdi, A., Coenen, F., Lisitsa, A.: A trust evaluation method based on the distributed cloud trust protocol (CTP) and opinion sharing. Provider 5(17), 18 (2017)","journal-title":"Provider"},{"key":"9475_CR133","doi-asserted-by":"crossref","unstructured":"Mohammed, A. M., Morsy, E. I., Omara, F. A.: Trust model for cloud service consumers. In: IEEE International Conference on\u00a0Innovative Trends in Computer Engineering (ITCE), pp. 122\u2013129 (2018)","DOI":"10.1109\/ITCE.2018.8316613"},{"issue":"2","key":"9475_CR134","doi-asserted-by":"publisher","first-page":"136","DOI":"10.1111\/exsy.12017","volume":"31","author":"W Fan","year":"2014","unstructured":"Fan, W., Yang, S., Pei, J.: A novel two-stage model for cloud service trustworthiness evaluation. Expert Syst. 31(2), 136\u2013153 (2014)","journal-title":"Expert Syst."},{"issue":"5","key":"9475_CR135","doi-asserted-by":"publisher","first-page":"570","DOI":"10.15837\/ijccc.2014.5.1276","volume":"9","author":"L Gu","year":"2014","unstructured":"Gu, L., Wang, C., Zhang, Y., Zhong, J., Ni, Z.: Trust model in cloud computing environment based on fuzzy theory. Int. J. Comput. Commun. Control 9(5), 570\u2013583 (2014)","journal-title":"Int. J. Comput. Commun. Control"},{"key":"9475_CR136","doi-asserted-by":"crossref","unstructured":"Alam, K., Ahmad, R.: A Hybrid Fuzzy multi-criteria decision model for cloud service selection and importance degree of component services. In: Proceedings of the 12th International FLINS Conference on Knowledge Engineering and Decision Making, pp. 334\u2013340 (2016)","DOI":"10.1142\/9789813146976_0056"},{"issue":"1","key":"9475_CR137","doi-asserted-by":"publisher","first-page":"339","DOI":"10.1007\/s40815-017-0347-5","volume":"20","author":"R Nagarajan","year":"2018","unstructured":"Nagarajan, R., Thirunavukarasu, R., Shanmugam, S.: A fuzzy-based intelligent cloud broker with mapreduce framework to evaluate the trust level of cloud services using customer feedback. Int. J. Fuzzy Syst. 20(1), 339\u2013347 (2018)","journal-title":"Int. J. Fuzzy Syst."},{"key":"9475_CR138","doi-asserted-by":"crossref","unstructured":"Eisa, M., Younas, M., Basu, K., Zhu, H.: Trends and directions in cloud service selection. In: 2016 IEEE Symposium on Service-Oriented System Engineering (SOSE), pp. 423\u2013432 (2016)","DOI":"10.1109\/SOSE.2016.59"},{"key":"9475_CR139","doi-asserted-by":"crossref","unstructured":"Wang, L., Wu, Z.: A Trustworthiness evaluation framework in cloud computing for service selection. In: 2014 IEEE 6th International Conference on Cloud Computing Technology and Science, pp. 101\u2013106 (2014)","DOI":"10.1109\/CloudCom.2014.107"},{"key":"9475_CR140","doi-asserted-by":"publisher","first-page":"75","DOI":"10.1016\/j.jpdc.2016.05.008","volume":"96","author":"H Ma","year":"2016","unstructured":"Ma, H., Hu, Z., Li, K., Zhang, H.: Toward trustworthy cloud service selection: a time-aware approach using interval neutrosophic set. J. Parallel Distrib. Comput. 96, 75\u201394 (2016)","journal-title":"J. Parallel Distrib. Comput."},{"issue":"7","key":"9475_CR141","doi-asserted-by":"crossref","first-page":"1245","DOI":"10.1108\/K-02-2017-0070","volume":"46","author":"R Hajizadeh","year":"2017","unstructured":"Hajizadeh, R., Jafari Navimipour, N.: A method for trust evaluation in the cloud environments using a behavior graph and services grouping. Kybernetes 46(7), 1245\u20131261 (2017)","journal-title":"Kybernetes"},{"issue":"6","key":"9475_CR142","first-page":"1","volume":"9","author":"S Ding","year":"2014","unstructured":"Ding, S., Xia, C.Y., Zhou, K.Le, Yang, S.L., Shang, J.S.: Decision support for personalized cloud service selection through multi-attribute trustworthiness evaluation. PLoS ONE 9(6), 1\u201311 (2014)","journal-title":"PLoS ONE"},{"issue":"11","key":"9475_CR143","doi-asserted-by":"publisher","first-page":"39","DOI":"10.14257\/ijsh.2016.10.11.04","volume":"10","author":"X Li","year":"2016","unstructured":"Li, X., Liang, H., Zhang, X.: Trust based service selection in cloud computing environment. Int. J. Smart Home 10(11), 39\u201350 (2016)","journal-title":"Int. J. Smart Home"},{"key":"9475_CR144","doi-asserted-by":"publisher","first-page":"488","DOI":"10.1016\/j.future.2017.09.071","volume":"79","author":"M Alhanahnah","year":"2018","unstructured":"Alhanahnah, M., Bertok, P., Tari, Z., Alouneh, S.: Context-aware multifaceted trust framework for evaluating trustworthiness of cloud providers. Future Gener. Comput. Syst. 79, 488\u2013499 (2018)","journal-title":"Future Gener. Comput. Syst."},{"issue":"7","key":"9475_CR145","first-page":"13474","volume":"4","author":"K Rathi","year":"2015","unstructured":"Rathi, K., Kumari, S., Chhotu, D.: Model for user\u2019s trust in cloud service providers in cloud environment. Int. J. Eng. Comput. Sci. 4(7), 13474\u201313483 (2015)","journal-title":"Int. J. Eng. Comput. Sci."},{"issue":"1\/2","key":"9475_CR146","first-page":"32","volume":"10","author":"F Jrad","year":"2015","unstructured":"Jrad, F., Tao, J., Streit, A., Knapper, R., Flath, C.: A utility-based approach for customized cloud service selection. Int. J. Comput. Sci. Eng. 10(1\/2), 32 (2015)","journal-title":"Int. J. Comput. Sci. Eng."},{"key":"9475_CR147","unstructured":"Cloud Armor. The Project Website. http:\/\/cs.adelaide.edu.au\/~cloudarmor"},{"key":"9475_CR148","unstructured":"Cloud Service. Measurement Index Consortium (CSMIC), SMI framework. http:\/\/betawww.cloudcommons.com\/servicemeasurementindex"}],"container-title":["Journal of Network and Systems Management"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10922-018-9475-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10922-018-9475-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10922-018-9475-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,21]],"date-time":"2025-10-21T20:28:43Z","timestamp":1761078523000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10922-018-9475-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,10,1]]},"references-count":148,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2019,4]]}},"alternative-id":["9475"],"URL":"https:\/\/doi.org\/10.1007\/s10922-018-9475-y","relation":{},"ISSN":["1064-7570","1573-7705"],"issn-type":[{"type":"print","value":"1064-7570"},{"type":"electronic","value":"1573-7705"}],"subject":[],"published":{"date-parts":[[2018,10,1]]},"assertion":[{"value":"18 October 2017","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"30 August 2018","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"18 September 2018","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"1 October 2018","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}