{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,27]],"date-time":"2026-02-27T15:38:23Z","timestamp":1772206703714,"version":"3.50.1"},"reference-count":40,"publisher":"Springer Science and Business Media LLC","issue":"12","license":[{"start":{"date-parts":[[2019,1,13]],"date-time":"2019-01-13T00:00:00Z","timestamp":1547337600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Ambient Intell Human Comput"],"published-print":{"date-parts":[[2019,12]]},"DOI":"10.1007\/s12652-019-01182-9","type":"journal-article","created":{"date-parts":[[2019,1,13]],"date-time":"2019-01-13T08:41:53Z","timestamp":1547368913000},"page":"4881-4899","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["Trust level estimation for cloud service composition with inter-service constraints"],"prefix":"10.1007","volume":"10","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-2475-3624","authenticated-orcid":false,"given":"Hela","family":"Malouche","sequence":"first","affiliation":[]},{"given":"Youssef","family":"Ben Halima","sequence":"additional","affiliation":[]},{"given":"Henda","family":"Ben Ghezala","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,1,13]]},"reference":[{"key":"1182_CR1","doi-asserted-by":"crossref","unstructured":"Ai L, Tang M (2008) A penalty-based genetic algorithm for QoS-aware web service composition with inter-service dependencies and conflicts. In: 2008 international conference on computational intelligence for modelling control and automation, CIMCA 2008. pp\u00a0738\u2013743","DOI":"10.1109\/CIMCA.2008.104"},{"key":"1182_CR2","unstructured":"AICPA (2017) Trust services criteria. \n                    https:\/\/www.aicpa.org\/content\/dam\/aicpa\/interestareas\/frc\/assuranceadvisoryservices\/downloadabledocuments\/trust-services-criteria.pdf\n                    \n                  . Accessed 12 Jan 2019"},{"key":"1182_CR3","volume-title":"The role of transparency and trust in the selection of cloud service providers","author":"MI Almanea","year":"2015","unstructured":"Almanea MI (2015) The role of transparency and trust in the selection of cloud service providers. Newcastle University, Newcastle upon Tyne"},{"key":"1182_CR4","doi-asserted-by":"publisher","DOI":"10.1145\/2180861.2180864","author":"M Alrifai","year":"2011","unstructured":"Alrifai M, Risse T, Nejdl W (2011) A hybrid approach for efficient Web service composition with end-to-end QoS constraints. ACM Trans Web. \n                    https:\/\/doi.org\/10.1145\/2180861.2180864","journal-title":"ACM Trans Web"},{"key":"1182_CR5","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1109\/TDSC.2004.2","volume":"1","author":"A Avizienis","year":"2004","unstructured":"Avizienis A, Laprie J-C, Randell B, Landwehr C (2004) Basic concepts and taxonomy of dependable and secure computing. IEEE Trans Dependable Secur Comput 1:11\u201333. \n                    https:\/\/doi.org\/10.1109\/TDSC.2004.2","journal-title":"IEEE Trans Dependable Secur Comput"},{"key":"1182_CR6","first-page":"412","volume":"10","author":"MA Bouanaka","year":"2013","unstructured":"Bouanaka MA, Zarour N (2013) An approach for an optimized web service selection based on skyline. Int J Comput Sci Issues 10:412\u2013418","journal-title":"Int J Comput Sci Issues"},{"key":"1182_CR7","doi-asserted-by":"publisher","DOI":"10.1051\/matecconf\/201710005029","author":"Y Cao","year":"2017","unstructured":"Cao Y, Guo Z, Zhang J (2017) Weight calculation for cases generated by tacit knowledge explicit based on RS-FAHP. MATEC Web Conf. \n                    https:\/\/doi.org\/10.1051\/matecconf\/201710005029","journal-title":"MATEC Web Conf"},{"key":"1182_CR8","doi-asserted-by":"publisher","unstructured":"Chakraborty S, Roy K (2012) An SLA-based framework for estimating trustworthiness of a cloud. In: Proceeding of the 11th IEEE international conference on trust, security and privacy in computing and communications trust\u201411th IEEE international conference on ubiquitous computing and communications IUCC-2012, pp\u00a0937\u2013942. \n                    https:\/\/doi.org\/10.1109\/TrustCom.2012.84","DOI":"10.1109\/TrustCom.2012.84"},{"key":"1182_CR9","unstructured":"Chhetri MB, Goh S, Lin J et al (2007) Agent-based negotiation of service level agreements for web service compositions. In: Proceedings of the joint conference on the INFORMS section on group decision and negotiation. pp\u00a081\u201393"},{"key":"1182_CR10","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2016.02.029","author":"M Chiregi","year":"2016","unstructured":"Chiregi M, Navimipour NJ (2016) A new method for trust and reputation evaluation in the cloud environments using the recommendations of opinion leader\u2019s entities and removing the effect of troll entities. Comput Human Behav. \n                    https:\/\/doi.org\/10.1016\/j.chb.2016.02.029","journal-title":"Comput Human Behav"},{"key":"1182_CR11","unstructured":"Cloud Security Alliance (2013) The notorious nine cloud computing top threats in 2013. \n                    https:\/\/downloads.cloudsecurityalliance.org\/initiatives\/top_threats\/The_Notorious_Nine_Cloud_Computing_Top_Threats_in_2013.pdf\n                    \n                  . Accessed 12 Jan 2019"},{"key":"1182_CR12","unstructured":"Cloud Security Alliance (2016) The treacherous 12: cloud computing top threats in 2016. \n                    https:\/\/downloads.cloudsecurityalliance.org\/assets\/research\/top-threats\/Treacherous-12_Cloud-Computing_Top-Threats.pdf\n                    \n                  . Accessed 19 Sept 2018"},{"key":"1182_CR13","doi-asserted-by":"crossref","unstructured":"Faratin P, Sierra C, Jennings NR (2000) Using similarity criteria to make negotiation trade-offs. In: Proceedings\u20144th international conference on MultiAgent systems, ICMAS 2000. pp\u00a0119\u2013126","DOI":"10.1109\/ICMAS.2000.858443"},{"key":"1182_CR14","unstructured":"Farokhi S, Jrad F, Brandic I, Streit A (2014) HS4MC: hierarchical SLA-based service selection for multi-cloud environments. In: Proceedings of the 4th international conference on cloud computing and services science (CLOSER 2014). Barcelona, Spain, pp\u00a0722\u2013734"},{"key":"1182_CR15","doi-asserted-by":"crossref","unstructured":"Fdhila W, Dumas M, Godart C (2010) Optimized decentralization of composite web services. In: Conference on collaborative computing: networking, applications and worksharing. pp\u00a01\u201310","DOI":"10.4108\/icst.collaboratecom.2010.1"},{"key":"1182_CR16","unstructured":"Goettelmann E, Dahman K, Gateau B et al (2014) A broker framework for secure and cost-effective business process deployment on multiple clouds. In: CAiSE 2014 Forum\/Doctoral Consortium. Lecture notes in business information processing 204"},{"key":"1182_CR17","doi-asserted-by":"publisher","DOI":"10.1108\/K-02-2017-0070","author":"R Hajizadeh","year":"2017","unstructured":"Hajizadeh R, Jafari Navimipour N (2017) A method for trust evaluation in the cloud environments using a behavior graph and services grouping. Kybernetes. \n                    https:\/\/doi.org\/10.1108\/K-02-2017-0070","journal-title":"Kybernetes"},{"key":"1182_CR18","doi-asserted-by":"crossref","unstructured":"Kanpariyasoontorn J, Senivongse T (2017) Cloud service trustworthiness assessment based on cloud controls matrix. In: International conference on advanced communication technology, ICACT. pp\u00a0291\u2013297","DOI":"10.23919\/ICACT.2017.7890100"},{"key":"1182_CR19","doi-asserted-by":"crossref","unstructured":"Klein A, Ishikawa F, Honiden S (2011) Efficient heuristic approach with improved time complexity for QoS-aware service composition. In: Proceedings\u20142011 IEEE 9th international conference on web services, ICWS 2011. pp\u00a0436\u2013443","DOI":"10.1109\/ICWS.2011.60"},{"key":"1182_CR20","doi-asserted-by":"crossref","unstructured":"Klein A, Ishikawa F, Honiden S (2012) Towards network-aware service composition in the cloud. In: Proceedings of the 21st international conference on World Wide Web\u2014WWW\u201912. pp\u00a0959\u2013968","DOI":"10.1145\/2187836.2187965"},{"key":"1182_CR21","doi-asserted-by":"publisher","first-page":"2757","DOI":"10.1007\/s00170-016-8992-7","volume":"88","author":"B Liu","year":"2016","unstructured":"Liu B, Zhang Z (2016) QoS-aware service composition for cloud manufacturing based on the optimal construction of synergistic elementary service groups. Int J Adv Manuf Technol 88:2757\u20132771. \n                    https:\/\/doi.org\/10.1007\/s00170-016-8992-7","journal-title":"Int J Adv Manuf Technol"},{"key":"1182_CR22","doi-asserted-by":"publisher","first-page":"527","DOI":"10.4236\/am.2016.76049","volume":"7","author":"Y Liu","year":"2016","unstructured":"Liu Y, Esseghir M, Boulahia LM (2016) Evaluation of parameters importance in cloud service selection using rough sets. Appl Math 7:527\u2013541","journal-title":"Appl Math"},{"key":"1182_CR23","doi-asserted-by":"publisher","first-page":"77","DOI":"10.14257\/ijgdc.2014.7.1.08","volume":"7","author":"W Lu","year":"2014","unstructured":"Lu W, Hu X, Wang S, Li X (2014) A multi-criteria QoS-aware trust service composition algorithm in cloud computing environments. Int J Grid Distrib Comput 7:77\u201388. \n                    https:\/\/doi.org\/10.14257\/ijgdc.2014.7.1.08","journal-title":"Int J Grid Distrib Comput"},{"key":"1182_CR24","doi-asserted-by":"crossref","unstructured":"Malouche H, Ben Halima Y, Ben Ghezala H (2017) Enterprise preparation for cloud migration: assessment phase. In: 2017 IEEE\/ACS 14th international conference on computer systems and applications (AICCSA). IEEE, pp\u00a0652\u2013659","DOI":"10.1109\/AICCSA.2017.23"},{"key":"1182_CR25","doi-asserted-by":"publisher","DOI":"10.1002\/9781118627372","volume-title":"Integer and combinatorial optimization","author":"GL Nemhauser","year":"1988","unstructured":"Nemhauser GL, Wolsey LA (1988) Integer and combinatorial optimization. Wiley-Interscience, New York"},{"key":"1182_CR26","doi-asserted-by":"publisher","DOI":"10.6028\/NIST.SP.800-53Ar4","author":"NIST","year":"2013","unstructured":"NIST (2013) Security and privacy controls for federal information systems and organizations. NIST Spec Publ. \n                    https:\/\/doi.org\/10.6028\/NIST.SP.800-53Ar4","journal-title":"NIST Spec Publ"},{"key":"1182_CR27","first-page":"45","volume":"2","author":"M Pavithra","year":"2015","unstructured":"Pavithra M, Mahalingam SK (2015) Trust driven workflow scheduling by composition of cloud services under fuzzy preferences of users. Int J Eng Technol Sci 2:45\u201350","journal-title":"Int J Eng Technol Sci"},{"key":"1182_CR28","doi-asserted-by":"publisher","first-page":"341","DOI":"10.1007\/BF01001956","volume":"11","author":"Z Pawlak","year":"1982","unstructured":"Pawlak Z (1982) Rough sets. Int J Comput Inf Sci 11:341\u2013356. \n                    https:\/\/doi.org\/10.1007\/BF01001956","journal-title":"Int J Comput Inf Sci"},{"key":"1182_CR29","first-page":"206","volume":"2","author":"SM Ranbhise","year":"2014","unstructured":"Ranbhise SM, Joshi KK (2014) Simulation and analysis of cloud environment. Int J Adv Res Comput Sci Technol 2:206\u2013209","journal-title":"Int J Adv Res Comput Sci Technol"},{"key":"1182_CR30","doi-asserted-by":"publisher","first-page":"229","DOI":"10.19026\/rjaset.11.1711","volume":"11","author":"MA Remli","year":"2015","unstructured":"Remli MA, Deris S, Jamous M et al (2015) Service composition optimization using differential evolution and opposition-based learning. Res J Appl Sci Eng Technol 11:229\u2013234. \n                    https:\/\/doi.org\/10.19026\/rjaset.11.1711","journal-title":"Res J Appl Sci Eng Technol"},{"key":"1182_CR31","doi-asserted-by":"publisher","first-page":"99","DOI":"10.14257\/ijgdc.2016.9.1.10","volume":"9","author":"N Sasikaladevi","year":"2016","unstructured":"Sasikaladevi N (2016) Trust based cloud service composition framework. Int J Grid Distrib Comput 9:99\u2013104. \n                    https:\/\/doi.org\/10.14257\/ijgdc.2016.9.1.10","journal-title":"Int J Grid Distrib Comput"},{"key":"1182_CR32","doi-asserted-by":"publisher","DOI":"10.14738\/tnc.31.961","author":"U Shehu","year":"2015","unstructured":"Shehu U, Safdar GA, Epiphaniou G (2015) Network-aware composition for Internet of thing services. Trans Netw Commun. \n                    https:\/\/doi.org\/10.14738\/tnc.31.961","journal-title":"Trans Netw Commun"},{"key":"1182_CR33","first-page":"87","volume-title":"IFIP Advances in Information and Communication Technology","author":"Georgiana Stegaru","year":"2012","unstructured":"Stegaru G, Danila C, Sacala IS et al (2012) Quality driven web service composition modeling framework. In: 13th working conference on virtual enterpries (PROVE), Oct 2012, Bournemouth, United Kingdom. Springer, IFIP advances in information and communication technology, AICT-380. pp\u00a087\u201395"},{"key":"1182_CR34","doi-asserted-by":"publisher","first-page":"65","DOI":"10.9781\/ijimai.2017.4310","volume":"4","author":"J Talbi","year":"2017","unstructured":"Talbi J, Haqiq A (2017) A MAS-based cloud service brokering system to respond security needs of cloud customers. Int J Interact Multimed Artif Intell 4:65. \n                    https:\/\/doi.org\/10.9781\/ijimai.2017.4310","journal-title":"Int J Interact Multimed Artif Intell"},{"key":"1182_CR35","doi-asserted-by":"publisher","first-page":"116","DOI":"10.1007\/s11036-012-0373-3","volume":"18","author":"S Wang","year":"2013","unstructured":"Wang S, Sun Q, Zou H, Yang F (2013) Particle swarm optimization with skyline operator for fast cloud-based web service composition. Mob Netw Appl 18:116\u2013121. \n                    https:\/\/doi.org\/10.1007\/s11036-012-0373-3","journal-title":"Mob Netw Appl"},{"key":"1182_CR36","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2014.10.008","author":"D Wang","year":"2014","unstructured":"Wang D, Yang Y, Mi Z (2014) A genetic-based approach to web service composition in geo-distributed cloud environment. Comput Electr Eng. \n                    https:\/\/doi.org\/10.1016\/j.compeleceng.2014.10.008","journal-title":"Comput Electr Eng"},{"key":"1182_CR37","doi-asserted-by":"publisher","DOI":"10.1155\/2013\/387083","author":"Q Wu","year":"2013","unstructured":"Wu Q, Zhang M, Zheng R et al (2013) A QoS-satisfied prediction model for cloud-service composition based on a hidden markov model. Math Probl Eng. \n                    https:\/\/doi.org\/10.1155\/2013\/387083","journal-title":"Math Probl Eng"},{"key":"1182_CR38","first-page":"146","volume":"9","author":"MYM Yacoab","year":"2018","unstructured":"Yacoab MYM, Alameen A, Sha MM (2018) A web service composition framework based on functional weight to reach maximum QoS. Int J Adv Comput Sci Appl 9:146\u2013150","journal-title":"Int J Adv Comput Sci Appl"},{"key":"1182_CR39","doi-asserted-by":"crossref","unstructured":"Zeng L, Benatallah B, Dumas M et al (2003) Quality driven web services composition. In: Proceedings of the twelfth international conference on World Wide Web WWW 03. pp\u00a0411\u2013421","DOI":"10.1145\/775152.775211"},{"key":"1182_CR40","unstructured":"Zheng X, Martin P, Brohman K (2012) Cloud service negotiation: concession vs. tradeoff approaches. In: Proceedings\u201412th IEEE\/ACM international symposium on cluster, cloud and grid computing, CCGrid 2012. pp\u00a0515\u2013522"}],"container-title":["Journal of Ambient Intelligence and Humanized Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12652-019-01182-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s12652-019-01182-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12652-019-01182-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,1,12]],"date-time":"2020-01-12T19:07:52Z","timestamp":1578856072000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s12652-019-01182-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,1,13]]},"references-count":40,"journal-issue":{"issue":"12","published-print":{"date-parts":[[2019,12]]}},"alternative-id":["1182"],"URL":"https:\/\/doi.org\/10.1007\/s12652-019-01182-9","relation":{},"ISSN":["1868-5137","1868-5145"],"issn-type":[{"value":"1868-5137","type":"print"},{"value":"1868-5145","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,1,13]]},"assertion":[{"value":"1 August 2018","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"3 January 2019","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"13 January 2019","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}