{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T15:59:10Z","timestamp":1725465550897},"publisher-location":"Berlin, Heidelberg","reference-count":12,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642308222"},{"type":"electronic","value":"9783642308239"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-30823-9_7","type":"book-chapter","created":{"date-parts":[[2012,6,8]],"date-time":"2012-06-08T07:49:52Z","timestamp":1339141792000},"page":"87-95","source":"Crossref","is-referenced-by-count":4,"title":["A Trustworthy and Resilient Event Broker for Monitoring Cloud Infrastructures"],"prefix":"10.1007","author":[{"given":"Diego","family":"Kreutz","sequence":"first","affiliation":[]},{"given":"Ant\u00f3nio","family":"Casimiro","sequence":"additional","affiliation":[]},{"given":"Marcelo","family":"Pasin","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"7_CR1","doi-asserted-by":"publisher","first-page":"93","DOI":"10.1007\/s00607-010-0140-x","volume":"91","author":"L. Vaquero","year":"2011","unstructured":"Vaquero, L., Rodero-Merino, L., Morn, D.: Locking the sky: a survey on iaas cloud security. Computing\u00a091, 93\u2013118 (2011)","journal-title":"Computing"},{"issue":"6","key":"7_CR2","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1109\/MSP.2010.186","volume":"8","author":"H. Takabi","year":"2010","unstructured":"Takabi, H., Joshi, J., Ahn, G.: Security and privacy challenges in cloud computing environments. IEEE Security Privacy\u00a08(6), 24\u201331 (2010)","journal-title":"IEEE Security Privacy"},{"key":"7_CR3","doi-asserted-by":"crossref","unstructured":"Mansfield-Devine, S.: Danger in the clouds. Network Security\u00a0(12), 9\u201311 (2008)","DOI":"10.1016\/S1353-4858(08)70140-5"},{"key":"7_CR4","unstructured":"Padhy, S., Kreutz, D., Casimiro, A., Pasin, M.: TRONE - First Specification of the Architecture. Technical report, FCUL (October 2011), \n                  \n                    http:\/\/trone.di.fc.ul.pt"},{"key":"7_CR5","doi-asserted-by":"crossref","unstructured":"Ibrahim, A.S., et al.: Cloudsec: a security monitoring appliance for virtual machines in the iaas cloud model. In: Proceedings of the 5th International Conference on Network and System Security. IEEE (2011)","DOI":"10.1109\/ICNSS.2011.6059967"},{"issue":"12","key":"7_CR6","doi-asserted-by":"publisher","first-page":"130","DOI":"10.1109\/MCOM.2011.6094017","volume":"49","author":"S. Chaves De","year":"2011","unstructured":"De Chaves, S., Uriarte, R., Westphall, C.: Toward an architecture for monitoring private clouds. IEEE Communications Magazine\u00a049(12), 130\u2013137 (2011)","journal-title":"IEEE Communications Magazine"},{"key":"7_CR7","doi-asserted-by":"crossref","unstructured":"Campbell, R.H., Montanari, M., Farivar, R.: A middleware for assured clouds. Journal of Internet Services and Applications (December 2011)","DOI":"10.1007\/s13174-011-0044-9"},{"key":"7_CR8","doi-asserted-by":"publisher","first-page":"642","DOI":"10.1109\/71.774912","volume":"10","author":"F. Cristian","year":"1999","unstructured":"Cristian, F., Fetzer, C.: The timed asynchronous distributed system model. IEEE Transactions on Parallel and Distributed Systems\u00a010, 642\u2013657 (1999)","journal-title":"IEEE Transactions on Parallel and Distributed Systems"},{"key":"7_CR9","doi-asserted-by":"publisher","first-page":"114","DOI":"10.1145\/857076.857078","volume":"35","author":"P.T.. Eugster","year":"2003","unstructured":"Eugster, P.T., Felber, P.A., Guerraoui, R., Kermarrec, A.M.: The many faces of publish\/subscribe. ACM Computing Survey\u00a035, 114\u2013131 (2003)","journal-title":"ACM Computing Survey"},{"key":"7_CR10","doi-asserted-by":"crossref","unstructured":"Wang, H., Liao, C., Tian, Z.: Providing quality of service over time delay networks by efficient queue management. In: 2011 IEEE 36th Conference on Local Computer Networks (LCN), pp. 275\u2013278 (October 2011)","DOI":"10.1109\/LCN.2011.6115208"},{"key":"7_CR11","series-title":"Advances in Information Security","doi-asserted-by":"publisher","first-page":"93","DOI":"10.1007\/978-0-387-36584-8_8","volume-title":"Quality of Protection","author":"S.N. Foley","year":"2006","unstructured":"Foley, S.N., et al.: Multilevel Security and Quality of Protection. In: Gollmann, D., Massacci, F., Yautsiukhin, A. (eds.) Quality of Protection. Advances in Information Security, vol.\u00a023, pp. 93\u2013105. Springer, US (2006)"},{"key":"7_CR12","unstructured":"Bessani, A.N., et al.: BFT-SMaRt - High-performance Byzantine-Fault-Tolerant State Machine Replication (2011), \n                  \n                    http:\/\/code.google.com\/p\/bft-smart\/"}],"container-title":["Lecture Notes in Computer Science","Distributed Applications and Interoperable Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-30823-9_7.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,4]],"date-time":"2021-05-04T07:31:12Z","timestamp":1620113472000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-30823-9_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642308222","9783642308239"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-30823-9_7","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2012]]}}}