{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,19]],"date-time":"2025-05-19T19:06:02Z","timestamp":1747681562987},"reference-count":21,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2020,4,19]],"date-time":"2020-04-19T00:00:00Z","timestamp":1587254400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,4,19]],"date-time":"2020-04-19T00:00:00Z","timestamp":1587254400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Front. Comput. Sci."],"published-print":{"date-parts":[[2020,12]]},"DOI":"10.1007\/s11704-019-9130-0","type":"journal-article","created":{"date-parts":[[2020,4,19]],"date-time":"2020-04-19T15:02:41Z","timestamp":1587308561000},"update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["A behavior-aware SLA-based framework for guaranteeing the security conformance of cloud service"],"prefix":"10.1007","volume":"14","author":[{"given":"Xiaochen","family":"Liu","sequence":"first","affiliation":[]},{"given":"Chunhe","family":"Xia","sequence":"additional","affiliation":[]},{"given":"Tianbo","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Li","family":"Zhong","sequence":"additional","affiliation":[]},{"given":"Xiaojian","family":"Li","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,4,19]]},"reference":[{"key":"9130_CR1","volume-title":"Cloud Security: A Comprehensive Guide to Secure Cloud Computing","author":"R L Krutz","year":"2010","unstructured":"Krutz R L, Vines R D, Brunette G. Cloud Security: A Comprehensive Guide to Secure Cloud Computing. Indianapolis: Wiley, 2010"},{"key":"9130_CR2","doi-asserted-by":"publisher","first-page":"88","DOI":"10.1016\/j.jnca.2016.11.027","volume":"79","author":"A Singh","year":"2017","unstructured":"Singh A, Chatterjee K. Cloud security issues and challenges: a survey. Journal of Network and Computer Applications, 2017, 79: 88\u2013115","journal-title":"Journal of Network and Computer Applications"},{"issue":"3","key":"9130_CR3","doi-asserted-by":"publisher","first-page":"339","DOI":"10.3233\/FI-2011-566","volume":"111","author":"A Lomuscio","year":"2011","unstructured":"Lomuscio A, Penczek W, Solanki M, Szreter M. Runtime monitoring of contract regulated web services. Fundamenta Informaticae, 2011, 111(3): 339\u2013355","journal-title":"Fundamenta Informaticae"},{"issue":"2","key":"9130_CR4","doi-asserted-by":"publisher","first-page":"182","DOI":"10.1002\/widm.1045","volume":"2","author":"W Van der Aalst","year":"2012","unstructured":"Van der Aalst W, Adriansyah A, van Dongen B. Replaying history on process models for conformance checking and performance analysis. Wiley Interdisciplinary Reviews Data Mining and Knowledge Discovery, 2012, 2(2): 182\u2013192","journal-title":"Wiley Interdisciplinary Reviews Data Mining and Knowledge Discovery"},{"issue":"3","key":"9130_CR5","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1361186.1361189","volume":"8","author":"W M P Van der Aalst","year":"2008","unstructured":"Van der Aalst W M P, Dumas M, Ouyang C, Rozinat A, Verbeek E. Conformance checking of service behavior. ACM Transactions on Internet Technology, 2008, 8(3): 1\u201330","journal-title":"ACM Transactions on Internet Technology"},{"issue":"99","key":"9130_CR6","first-page":"1","volume":"PP","author":"L Garc\u00eda-Banuelos","year":"2015","unstructured":"Garc\u00eda-Banuelos L, Van Beest N R T P, Dumas M, La Rosa M, Mertens W. Complete and interpretable conformance checking of business processes. IEEE Transactions on Software Engineering, 2015, PP(99): 1\u20131","journal-title":"IEEE Transactions on Software Engineering"},{"issue":"2","key":"9130_CR7","doi-asserted-by":"publisher","first-page":"24","DOI":"10.4018\/ijsi.2015040104","volume":"3","author":"J Kai","year":"2015","unstructured":"Kai J, Miao H, Zhao K, Zhou J, Gao H. A platform for analyzing behaviors of service-oriented application based on the probabilistic model checking. International Journal of Software Innovation, 2015, 3(2): 24\u201338","journal-title":"International Journal of Software Innovation"},{"key":"9130_CR8","doi-asserted-by":"crossref","unstructured":"Kikuchi S, Aoki T. Evaluation of operational vulnerability in cloud service management using model checking. In: Proceedings of IEEE International Symposium on Service Oriented System Engineering. 2013, 37\u201348","DOI":"10.1109\/SOSE.2013.31"},{"key":"9130_CR9","doi-asserted-by":"crossref","unstructured":"Moreno G A, Camara J, Garlan D, Schmerl B. Proactive self-adaptation under uncertainty: a probabilistic model checking approach. In: Proceedings of Joint Meeting on Foundations of Software Engineering. 2015, 1\u201312","DOI":"10.1145\/2786805.2786853"},{"issue":"2","key":"9130_CR10","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s10270-016-0545-x","volume":"17","author":"S J J Leemans","year":"2018","unstructured":"Leemans S J J, Fahland D, Van der Aalst W M P. Scalable process discovery and conformance checking. Software and Systems Modeling, 2018, 17(2): 1\u201333","journal-title":"Software and Systems Modeling"},{"key":"9130_CR11","doi-asserted-by":"crossref","unstructured":"Liu D, Zic J. Cloud#: a specification language for modeling cloud. In: Proceedings of IEEE International Conference on Cloud Computing. 2011, 533\u2013540","DOI":"10.1109\/CLOUD.2011.18"},{"key":"9130_CR12","doi-asserted-by":"crossref","unstructured":"Uriarte R B, Tiezzi F, Nicola R D. SLAC: a formal servicelevel-agreement language for cloud computing. In: Proceedings of IEEE\/ACM International Conference on Utility and Cloud Computing. 2014, 419\u2013426","DOI":"10.1109\/UCC.2014.53"},{"key":"9130_CR13","doi-asserted-by":"crossref","unstructured":"Bergmayr A, Wimmer M, Kappel G, Grossniklaus M. Cloud modeling languages by example. In: Proceedings of IEEE International Conference on Service-oriented Computing and Applications. 2014, 137\u2013146","DOI":"10.1109\/SOCA.2014.56"},{"issue":"2","key":"9130_CR14","first-page":"4","volume":"6","author":"G Cicotti","year":"2015","unstructured":"Cicotti G, Coppolino L, D\u2019Antonio S, Romano L. Runtime model checking for SLA compliance monitoring and QoS prediction. JoWUA, 2015, 6(2): 4\u201320","journal-title":"JoWUA"},{"key":"9130_CR15","doi-asserted-by":"crossref","unstructured":"Awad A, Decker G, Weske M. Efficient compliance checking using BPMN-Q and temporal logic. In: Proceedings of International Conference on Business Process Management. 2008, 326\u2013341","DOI":"10.1007\/978-3-540-85758-7_24"},{"key":"9130_CR16","doi-asserted-by":"crossref","unstructured":"Hendre A, Joshi K P. A semantic approach to cloud security and compliance. In: Proceedings of IEEE International Conference on Cloud Computing. 2015, 1081\u20131084","DOI":"10.1109\/CLOUD.2015.157"},{"issue":"1","key":"9130_CR17","doi-asserted-by":"publisher","first-page":"123","DOI":"10.1007\/s12927-012-0005-2","volume":"4","author":"A Khadraoui","year":"2012","unstructured":"Khadraoui A, Feltus C. Service specification and service compliance: how to consider the responsibility dimension? Journal of Service Science Research, 2012, 4(1): 123\u2013142","journal-title":"Journal of Service Science Research"},{"key":"9130_CR18","doi-asserted-by":"crossref","unstructured":"Madi T, Majumdar S, Wang Y, Pourzandi M, Debbabi M, Jarraya Y, Wang L. Auditing security compliance of the virtualized infrastructure in the cloud: application to openstack. In: Proceedings of the 6th ACM Conference on Data and Application Security and Privacy. 2016, 195\u2013206","DOI":"10.1145\/2857705.2857721"},{"key":"9130_CR19","doi-asserted-by":"crossref","unstructured":"Darvas D, Majzik I, Vinuela E B. Conformance checking for programmable logic controller programs and specifications. In: Proceedings of the 11th IEEE Symposium on Industrial Embedded Systems. 2016, 1\u20138","DOI":"10.1109\/SIES.2016.7509409"},{"key":"9130_CR20","doi-asserted-by":"crossref","unstructured":"Roehm H, Oehlerking J, Woehrle M, Althoff M. Reachset conformance testing of hybrid automata. In: Proceedings of the 19th International Conference on Hybrid Systems: Computation and Control. 2016, 277\u2013286","DOI":"10.1145\/2883817.2883828"},{"issue":"2","key":"9130_CR21","doi-asserted-by":"publisher","first-page":"1469","DOI":"10.1109\/TII.2014.2301132","volume":"10","author":"W Viriyasitavat","year":"2014","unstructured":"Viriyasitavat W, Da Xu L, Viriyasitavat W. Compliance checking for requirement-oriented service workflow interoperations. IEEE Transactions on Industrial Informatics, 2014, 10(2): 1469\u20131477","journal-title":"IEEE Transactions on Industrial Informatics"}],"container-title":["Frontiers of Computer Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11704-019-9130-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11704-019-9130-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11704-019-9130-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,19]],"date-time":"2022-01-19T21:17:37Z","timestamp":1642627057000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11704-019-9130-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,4,19]]},"references-count":21,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2020,12]]}},"alternative-id":["9130"],"URL":"https:\/\/doi.org\/10.1007\/s11704-019-9130-0","relation":{},"ISSN":["2095-2228","2095-2236"],"issn-type":[{"value":"2095-2228","type":"print"},{"value":"2095-2236","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,4,19]]},"assertion":[{"value":"14 April 2019","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"30 October 2019","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"19 April 2020","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}],"article-number":"146808"}}