{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,24]],"date-time":"2025-10-24T04:19:02Z","timestamp":1761279542278,"version":"build-2065373602"},"publisher-location":"Cham","reference-count":23,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030161835"},{"type":"electronic","value":"9783030161842"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-16184-2_38","type":"book-chapter","created":{"date-parts":[[2019,3,29]],"date-time":"2019-03-29T13:04:26Z","timestamp":1553864666000},"page":"396-406","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Stratifying Measuring Requirements and Tools for Cloud Services Monitoring"],"prefix":"10.1007","author":[{"given":"Paulo","family":"Carvalho","sequence":"first","affiliation":[]},{"given":"Solange","family":"Rito Lima","sequence":"additional","affiliation":[]},{"given":"Kalil Araujo","family":"Bispo","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,3,30]]},"reference":[{"key":"38_CR1","doi-asserted-by":"publisher","unstructured":"Ferraz, F., Ribeiro, F., Lima, W., Sampaio, C.: A disturbing question: what is the economical impact of cloud computing? A systematic mapping. In: 2018 IEEE 11th International Conference on Cloud Computing (CLOUD), vol.\u00a000, pp. 853\u2013856 (2018). https:\/\/doi.org\/10.1109\/CLOUD.2018.00120","DOI":"10.1109\/CLOUD.2018.00120"},{"key":"38_CR2","doi-asserted-by":"publisher","unstructured":"Rafique, K., Tareen, A.W., Saeed, M., Wu, J., Qureshi, S.S.: Cloud computing economics opportunities and challenges. In: 2011 4th IEEE International Conference on Broadband Network and Multimedia Technology, pp. 401\u2013406 (2011). https:\/\/doi.org\/10.1109\/ICBNMT.2011.6155965","DOI":"10.1109\/ICBNMT.2011.6155965"},{"issue":"1","key":"38_CR3","doi-asserted-by":"publisher","first-page":"12:1","DOI":"10.1145\/2522968.2522980","volume":"46","author":"TH Noor","year":"2013","unstructured":"Noor, T.H., Sheng, Q.Z., Zeadally, S., Yu, J.: Trust management of services in cloud environments: obstacles and solutions. ACM Comput. Surv. 46(1), 12:1\u201312:30 (2013). https:\/\/doi.org\/10.1145\/2522968.2522980","journal-title":"ACM Comput. Surv."},{"key":"38_CR4","doi-asserted-by":"publisher","unstructured":"Hussain, M., Al-Mourad, M.: Effective third party auditing in cloud computing. In: 2014 28th International Conference on Advanced Information Networking and Applications Workshops (WAINA), pp. 91\u201395 (2014). https:\/\/doi.org\/10.1109\/WAINA.2014.158","DOI":"10.1109\/WAINA.2014.158"},{"key":"38_CR5","doi-asserted-by":"publisher","unstructured":"Hauser, C.B., Wesner, S.: Reviewing cloud monitoring: towards cloud resource profiling. In: 2018 IEEE 11th International Conference on Cloud Computing (CLOUD), pp. 678\u2013685 (2018). https:\/\/doi.org\/10.1109\/CLOUD.2018.00093","DOI":"10.1109\/CLOUD.2018.00093"},{"issue":"9","key":"38_CR6","doi-asserted-by":"publisher","first-page":"2093","DOI":"10.1016\/j.comnet.2013.04.001","volume":"57","author":"G Aceto","year":"2013","unstructured":"Aceto, G., Botta, A., De Donato, W., Pescap\u00e8, A.: Cloud monitoring: a survey. Comput. Netw. 57(9), 2093\u20132115 (2013). https:\/\/doi.org\/10.1016\/j.comnet.2013.04.001","journal-title":"Comput. Netw."},{"issue":"1","key":"38_CR7","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.jnca.2010.07.006","volume":"34","author":"S Subashini","year":"2011","unstructured":"Subashini, S., Kavitha, V.: A survey on security issues in service delivery models of cloud computing. J. Netw. Comput. Appl. 34(1), 1\u201311 (2011). https:\/\/doi.org\/10.1016\/j.jnca.2010.07.006","journal-title":"J. Netw. Comput. Appl."},{"key":"38_CR8","doi-asserted-by":"publisher","unstructured":"Zhang, H., Luna, J., Suri, N., Trapero, R.: Flashlight: a novel monitoring path identification schema for securing cloud services. In: Proceedings of the 13th International Conference on Availability, Reliability and Security, ARES 2018, pp. 5:1\u20135:10. ACM, New York (2018). https:\/\/doi.org\/10.1145\/3230833.3230860","DOI":"10.1145\/3230833.3230860"},{"issue":"10","key":"38_CR9","doi-asserted-by":"publisher","first-page":"2918","DOI":"10.1016\/j.jpdc.2014.06.007","volume":"74","author":"K Fatema","year":"2014","unstructured":"Fatema, K., Emeakaroha, V.C., Healy, P.D., Morrison, J.P., Lynn, T.: A survey of cloud monitoring tools: taxonomy, capabilities and objectives. J. Parallel Distrib. Comput. 74(10), 2918\u20132933 (2014). https:\/\/doi.org\/10.1016\/j.jpdc.2014.06.007","journal-title":"J. Parallel Distrib. Comput."},{"key":"38_CR10","doi-asserted-by":"publisher","first-page":"931","DOI":"10.1007\/978-3-642-36981-0_87","volume-title":"Advances in Information Systems and Technologies","author":"N Palhares","year":"2013","unstructured":"Palhares, N., Lima, S.R., Carvalho, P.: A multidimensional model for monitoring cloud services. In: Rocha, \u00c1., Correia, A.M., Wilson, T., Stroetmann, K.A. (eds.) Advances in Information Systems and Technologies, pp. 931\u2013938. Springer, Heidelberg (2013)"},{"key":"38_CR11","doi-asserted-by":"publisher","unstructured":"Sheikhalishahi, M., Grandinetti, L.: Revising resource management and scheduling systems. In: Proceedings of the 2nd International Conference on Cloud Computing and Services Science, pp. 121\u2013126 (2012). https:\/\/doi.org\/10.5220\/0003955401210126","DOI":"10.5220\/0003955401210126"},{"key":"38_CR12","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1016\/j.jnca.2016.05.010","volume":"71","author":"MA Khan","year":"2016","unstructured":"Khan, M.A.: A survey of security issues for cloud computing. J. Netw. Comput. Appl. 71, 11\u201329 (2016). https:\/\/doi.org\/10.1016\/j.jnca.2016.05.010","journal-title":"J. Netw. Comput. Appl."},{"key":"38_CR13","doi-asserted-by":"publisher","first-page":"200","DOI":"10.1016\/j.jnca.2016.09.002","volume":"75","author":"S Singh","year":"2016","unstructured":"Singh, S., Jeong, Y.S., Park, J.H.: A survey on cloud computing security: issues, threats, and solutions. J. Netw. Comput. Appl. 75, 200\u2013222 (2016). https:\/\/doi.org\/10.1016\/j.jnca.2016.09.002","journal-title":"J. Netw. Comput. Appl."},{"key":"38_CR14","doi-asserted-by":"publisher","unstructured":"AbdElRahem, O., Bahaa-Eldin, A.M., Taha, A.: Virtualization security: a survey. In: 2016 11th International Conference on Computer Engineering Systems (ICCES), pp. 32\u201340 (2016). https:\/\/doi.org\/10.1109\/ICCES.2016.7821971","DOI":"10.1109\/ICCES.2016.7821971"},{"issue":"11","key":"38_CR15","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1109\/MCOM.2013.6658648","volume":"51","author":"R Jain","year":"2013","unstructured":"Jain, R., Paul, S.: Network virtualization and software defined networking for cloud computing: a survey. IEEE Commun. Mag. 51(11), 24\u201331 (2013)","journal-title":"IEEE Commun. Mag."},{"issue":"2","key":"38_CR16","doi-asserted-by":"publisher","first-page":"66","DOI":"10.1109\/MSP.2011.33","volume":"9","author":"J Spring","year":"2011","unstructured":"Spring, J.: Monitoring cloud computing by layer, part 1. IEEE Secur. Priv. 9(2), 66\u201368 (2011). http:\/\/doi.ieeecomputersociety.org\/10.1109\/MSP.2011.33","journal-title":"IEEE Secur. Priv."},{"issue":"3","key":"38_CR17","doi-asserted-by":"publisher","first-page":"52","DOI":"10.1109\/MSP.2011.57","volume":"9","author":"J Spring","year":"2011","unstructured":"Spring, J.: Monitoring cloud computing by layer, part 2. IEEE Secur. Priv. 9(3), 52\u201355 (2011). http:\/\/doi.ieeecomputersociety.org\/10.1109\/MSP.2011.57","journal-title":"IEEE Secur. Priv."},{"key":"38_CR18","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4614-1614-2","volume-title":"Service Level Agreements for Cloud Computing","author":"P Wieder","year":"2011","unstructured":"Wieder, P., Butler, J.M., Theilmann, W., Yahyapour, R.: Service Level Agreements for Cloud Computing. Springer Publishing Company, Incorporated, New York (2011)"},{"key":"38_CR19","unstructured":"European Commission C-SIG SLA Subgroup: Cloud Service Level Agreement Standardization Guidelines (2014)"},{"key":"38_CR20","doi-asserted-by":"publisher","unstructured":"Choi, T., Kodirov, N., Lee, T.H., Kim, D., Lee, J.: Autonomic management framework for cloud-based virtual networks. In: 2011 13th Asia-Pacific Network Operations and Management Symposium (APNOMS), pp. 1\u20137 (2011). https:\/\/doi.org\/10.1109\/APNOMS.2011.6077011","DOI":"10.1109\/APNOMS.2011.6077011"},{"key":"38_CR21","doi-asserted-by":"publisher","unstructured":"de\u00a0Chaves, S., Westphall, C., Lamin, F.: SLA perspective in security management for cloud computing. In: 2010 Sixth International Conference on Networking and Services (ICNS), pp. 212\u2013217 (2010). https:\/\/doi.org\/10.1109\/ICNS.2010.36","DOI":"10.1109\/ICNS.2010.36"},{"key":"38_CR22","doi-asserted-by":"crossref","unstructured":"Stamou, K., Morin, J.H., G\u00e2teau, B., Aubert, J.: Service level agreements as a service - towards security risks aware SLA management. In: CLOSER, pp. 663\u2013669 (2012)","DOI":"10.5220\/0003966006630669"},{"key":"38_CR23","unstructured":"Clayman, S., Galis, A., Chapman, C., Toffetti, G., Rodero-Merino, L., Vaquero, L.M., Nagin, K., Rochwerger, B.: Monitoring service clouds in the future internet. In: Tselentis, G., Galis, A., Gavras, A., Krco, S., Lotz, V., Simperl, E.P.B., Stiller, B., Zahariadis, T. (eds.) Future Internet Assembly, pp. 115\u2013126. IOS Press (2010)"}],"container-title":["Advances in Intelligent Systems and Computing","New Knowledge in Information Systems and Technologies"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-16184-2_38","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,24]],"date-time":"2025-10-24T04:13:47Z","timestamp":1761279227000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-16184-2_38"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030161835","9783030161842"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-16184-2_38","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"30 March 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"WorldCIST'19","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"World Conference on Information Systems and Technologies","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Galicia","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Spain","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16 April 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19 April 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"worldcist2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.worldcist.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}