{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,30]],"date-time":"2025-10-30T07:02:46Z","timestamp":1761807766758,"version":"3.40.3"},"reference-count":77,"publisher":"Elsevier","isbn-type":[{"type":"print","value":"9780123965356"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1016\/b978-0-12-396535-6.00002-8","type":"book-chapter","created":{"date-parts":[[2012,7,20]],"date-time":"2012-07-20T14:44:22Z","timestamp":1342795462000},"page":"41-85","source":"Crossref","is-referenced-by-count":70,"title":["Cloud Computing Uncovered: A Research Landscape"],"prefix":"10.1016","author":[{"given":"Mohammad","family":"Hamdaqa","sequence":"first","affiliation":[]},{"given":"Ladan","family":"Tahvildari","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/B978-0-12-396535-6.00002-8_b0005","unstructured":"D. Parkhill, The Challenge of the Computer Utility, first ed. Addison-Wesley Pub. Co. 1966."},{"key":"10.1016\/B978-0-12-396535-6.00002-8_b0010","doi-asserted-by":"crossref","first-page":"50","DOI":"10.1145\/1496091.1496100","article-title":"A break in the clouds: towards a cloud definition","volume":"39","author":"Vaquero","year":"2008","journal-title":"ACM SIGCOMM \u2013 Computer Communication Review"},{"key":"10.1016\/B978-0-12-396535-6.00002-8_b0015","unstructured":"M. Armbrust, A. Fox, R. Griffith, A.D. Joseph, R.H. Hatz, A. Konwinski, G. Lee, D.A. Patterson, A. Rabkin, M. Zaharia, Above the Clouds: a Berkeley view of cloud computing, Technical Report UCB\/EECS-2009-2, Electrical Engineering and Computer Sciences University of California, Berkeley, 2009."},{"key":"10.1016\/B978-0-12-396535-6.00002-8_b0020","unstructured":"J. Staten, T. Schadler, J.R. Rymer, C. Wang, Q&A: by 2011, CIOs must answer the question, why not run in the cloud? Technical Report, Forrester Research Inc., 2009. Retrieved from: <http:\/\/www.forrester.com\/rb\/Research\/qn,\/q\/id\/55193\/t\/2>."},{"key":"10.1016\/B978-0-12-396535-6.00002-8_b0025","unstructured":"J. Staten, C. Kane, R. Whiteley, You\u2019re not ready for internal cloud, Technical Report, Forrester Research Inc., 2010. Retrieved from: <http:\/\/www.forrester.com\/rb\/Research>."},{"key":"10.1016\/B978-0-12-396535-6.00002-8_b0030","unstructured":"P. Mell, T. Grance, The NIST definition of cloud computing, Recommendations of the National Institute of Standards and Technology Special Publication 800-145, National Institute of Standards and Technology, 2009."},{"key":"10.1016\/B978-0-12-396535-6.00002-8_b0035","doi-asserted-by":"crossref","unstructured":"K. Tsakalozos, M. Roussopoulos, V. Floros, A. Delis, in: ICDCS\u201910, 30th IEEE International Conference on Distributed Computing Systems, IEEE, 2010, pp. 74\u201385.","DOI":"10.1109\/ICDCS.2010.66"},{"key":"10.1016\/B978-0-12-396535-6.00002-8_b0040","unstructured":"M. Zaharia, D. Borthakur, J. SenSarma, K. Elmeleegy, S. Shenker, I. Stoica, in: EuroSys\u201910, Fifth European Conference on Computer Systems, ACM, 2010, pp. 265\u2013278."},{"key":"10.1016\/B978-0-12-396535-6.00002-8_b0045","series-title":"CLOSER\u201911, The First International Conference on Cloud Computing and Services Science","first-page":"104","author":"Haselmann","year":"2011"},{"key":"10.1016\/B978-0-12-396535-6.00002-8_b0050","doi-asserted-by":"crossref","first-page":"472","DOI":"10.1007\/978-3-642-10665-1_43","article-title":"Community cloud computing","author":"Marinos","year":"2009","journal-title":"Cloud Computing"},{"key":"10.1016\/B978-0-12-396535-6.00002-8_b0055","doi-asserted-by":"crossref","unstructured":"G. Briscoe, A. Marinos, in: DEST\u201909, Third IEEE International Conference on Digital Ecosystems and Technologies, IEEE, 2009, pp. 103\u2013108.","DOI":"10.1109\/DEST.2009.5276725"},{"key":"10.1016\/B978-0-12-396535-6.00002-8_b0060","unstructured":"G. Reese, The economics of cloud computing, Online, 2008. Retrieved from: <http:\/\/broadcast.oreilly.com\/2008\/10\/the-economics-of-cloud-c.html>."},{"key":"10.1016\/B978-0-12-396535-6.00002-8_b0065","unstructured":"B. Kepes, Moving your infrastructure to the cloud: how to maximize benefits and avoid pitfalls, White Paper, Diversity Limited and Rackspace, 2011. <http:\/\/www.rackspace.com\/knowledge_center\/whitepaper\/moving-your-infrastructure-to-the-cloud-how-to-maximize-benefits-and-avoid-pitfalls>."},{"key":"10.1016\/B978-0-12-396535-6.00002-8_b0070","unstructured":"J. Moore, Cloud computing economics: technical and business information about cloud computing, Online, 2009. Retrieved from: <http:\/\/www.cloudcomputingeconomics.com\/2009\/01\/experience-curves-for-data-center.html>."},{"key":"10.1016\/B978-0-12-396535-6.00002-8_b0075","doi-asserted-by":"crossref","first-page":"68","DOI":"10.1145\/1496091.1496103","article-title":"The cost of a cloud: research problems in data center networks","volume":"39","author":"Greenberg","year":"2008","journal-title":"ACM SIGCOMM \u2013 Computer Communication Review"},{"key":"10.1016\/B978-0-12-396535-6.00002-8_b0080","series-title":"CCSW\u201909, First ACM Workshop on Cloud Computing Security, CCSW\u201909","first-page":"97","author":"Christodorescu","year":"2009"},{"key":"10.1016\/B978-0-12-396535-6.00002-8_b0085","unstructured":"M. Dawson, Debunking the top three cloud security myths, Online, 2011. Retrieved from: <https:\/\/blog.cloudsecurityalliance.org\/2011\/03\/30\/debunking-the-top-three-cloud-security-myths\/>."},{"key":"10.1016\/B978-0-12-396535-6.00002-8_b0090","unstructured":"T. Micro, Top 5 myths of cloud computing, Online, 2010. Retrieved from: <http:\/\/cloudsecurity.trendmicro.com\/top-5-myths-of-cloud-computing-security\/>."},{"key":"10.1016\/B978-0-12-396535-6.00002-8_b0095","unstructured":"W. Tsai, X. Sun, J. Balasooriya, in: ITNG\u201910, Seventh International Conference on Information Technology: New Generations, 2010, pp. 684\u2013689."},{"key":"10.1016\/B978-0-12-396535-6.00002-8_b0100","doi-asserted-by":"crossref","unstructured":"X. Li, L. Zhou, Y. Shi, Y. Guo, in: ICMLC\u201910, Second International Conference on Machine Learning and Cybernetics, vol. 6, IEEE, 2010, pp. 2843\u20132848.","DOI":"10.1109\/ICMLC.2010.5580769"},{"key":"10.1016\/B978-0-12-396535-6.00002-8_b0105","unstructured":"M. Behrendt, B. Glasner, P. Kopp, R. Dieckmann, G. Breiter, S. Pappe, H. Kreger, A. Arsanjani, Introduction and architecture overview IBM Cloud Computing Reference Architecture 2.0, 2011. Retrieved from: <https:\/\/https:\/\/www.opengroup.org\/cloudcomputing\/uploads\/40\/23840\/CCRAIBMSubmission.02282011.doc>."},{"key":"10.1016\/B978-0-12-396535-6.00002-8_b0110","doi-asserted-by":"crossref","unstructured":"L. Youseff, D.M.D. Silva, M. Butrico, J. Appavoo, Cloud Computing and Software Services: Theory and Techniques, CRC Press, 2011, pp. 1\u201316.","DOI":"10.1201\/EBK1439803158-c1"},{"key":"10.1016\/B978-0-12-396535-6.00002-8_b0115","series-title":"Software Engineering Environments","first-page":"115","volume":"vol. 467","author":"Earl","year":"1990"},{"key":"10.1016\/B978-0-12-396535-6.00002-8_b0120","unstructured":"A.D. Giordano, Data Integration Blueprint and Modeling: Techniques for a Scalable and Sustainable Architecture, IBM Press, 2011, pp. 19\u201320."},{"key":"10.1016\/B978-0-12-396535-6.00002-8_b0125","unstructured":"L. Wilkes, Cloud computing reference architectures, models and frameworks, Technical Report, Everware-CBDI Inc., 2011."},{"key":"10.1016\/B978-0-12-396535-6.00002-8_b0130","unstructured":"NIST, Nist cloud computing reference architecture, version 1, 2011. Retrieved from: <http:\/\/collaborate.nist.gov\/twiki-cloud-computing\/pub\/CloudComputing\/ReferenceArchitectureTaxonomy\/NIST_CC_Reference_Architecture_v1_March_30_2011.pd>."},{"key":"10.1016\/B978-0-12-396535-6.00002-8_b0135","unstructured":"C.S. Alliance, Cloud security alliance security guidance for critical areas of focus in cloud computing V2.16, Technical Report, Cloud Security Alliance, 2009."},{"key":"10.1016\/B978-0-12-396535-6.00002-8_b0140","series-title":"CLOSER\u201911, First International Conference on Cloud Computing and Services Science","first-page":"98","author":"Hamdaqa","year":"2011"},{"key":"10.1016\/B978-0-12-396535-6.00002-8_b0145","unstructured":"C. Wang, S. Balaouras, L. Coit, Q&A: Demystifying cloud security. An empowered report: getting past cloud security fear mongering, Technical Report, Forrester Research, Inc., 2010."},{"key":"10.1016\/B978-0-12-396535-6.00002-8_b0150","doi-asserted-by":"crossref","first-page":"4","DOI":"10.1147\/JRD.2009.5429058","article-title":"The reservoir model and architecture for open federated cloud computing","volume":"53","author":"Rochwerger","year":"2009","journal-title":"IBM Journal of Research and Development"},{"key":"10.1016\/B978-0-12-396535-6.00002-8_b0155","unstructured":"L. Zhang, Q. Zhou, in: ICWS 2009, Seventh IEEE International Conference on Web Services, IEEE, 2009, pp. 607\u2013616."},{"key":"10.1016\/B978-0-12-396535-6.00002-8_b0160","unstructured":"S. Charlton, in: OOPSLA09, 14th Conference Companion on Object Oriented Programming Systems Languages and Applications, 2009, pp. 17\u201326."},{"key":"10.1016\/B978-0-12-396535-6.00002-8_b0165","unstructured":"NIST, Cloud architecture reference models: a survey V2, Technical Report, National Institute of Standards and Technology, 2011."},{"key":"10.1016\/B978-0-12-396535-6.00002-8_b0170","unstructured":"Architecture for managing clouds: desktop management task force cloud computing reference architecture, 2010. Retrieved from: <http:\/\/www.dmtf.org\/sites\/default\/files\/standards\/documents\/ DSP-IS0102_1.0.0.pdf>."},{"key":"10.1016\/B978-0-12-396535-6.00002-8_b0175","unstructured":"K. Bakshi, Cisco cloud computing \u2013 data center strategy, architecture, and solutions, Technical Report, Cisco Systems, Inc., 2009."},{"key":"10.1016\/B978-0-12-396535-6.00002-8_b0180","unstructured":"B. Khasnabish, J. Chu, S. Ma, Y. Meng, P. Unbehagen, M. Morrow, M. Hasan, Cloud reference framework 01, 2011. Retrieved from: <http:\/\/tools.ietf.org\/html\/draft-khasnabish-cloud-reference-framework-00>."},{"key":"10.1016\/B978-0-12-396535-6.00002-8_b0185","unstructured":"I.G. Services, Getting cloud computing right: the key to business success in a cloud adoption is a robust, proven architecture, White paper CIW03078-USEN-01, IBM Corporation, 2011. Retrieved from: <http:\/\/public.dhe.ibm.com\/common\/ssi\/ecm\/en\/ciw03078usen\/CIW03078USEN.PDF>."},{"key":"10.1016\/B978-0-12-396535-6.00002-8_b0190","unstructured":"Sp-011: cloud computing pattern, 2011. Retrieved from: <http:\/\/www.opensecurityarchitecture.org\/cms\/library\/patternlandscape\/251-pattern-cloud-computing>."},{"key":"10.1016\/B978-0-12-396535-6.00002-8_b0195","unstructured":"The Open Group, Service oriented architecture: what is SOA?, Online, 2011. Retrieved from: <http:\/\/www.opengroup.org\/soa\/source-book\/soa\/soa.htm>."},{"key":"10.1016\/B978-0-12-396535-6.00002-8_b0200","doi-asserted-by":"crossref","first-page":"72","DOI":"10.1109\/MIC.2010.147","article-title":"Service-oriented computing and cloud computing: challenges and opportunities","volume":"14","author":"Wei","year":"2010","journal-title":"IEEE Internet Computing"},{"key":"10.1016\/B978-0-12-396535-6.00002-8_b0205","unstructured":"R. Fielding, Architectural styles and the design of network-based software architectures, Ph.D. thesis, University of California, Irvine, 2000."},{"key":"10.1016\/B978-0-12-396535-6.00002-8_b0210","doi-asserted-by":"crossref","first-page":"137","DOI":"10.1007\/s00354-008-0081-5","article-title":"Cloud computing: a perspective study","volume":"28","author":"Wang","year":"2010","journal-title":"New Generation Computing"},{"key":"10.1016\/B978-0-12-396535-6.00002-8_b0215","unstructured":"OMG, Service oriented architecture modeling language (SOAML) \u2013 specification for the UML profile and metamodel for services (UPMS), 2009. Retrieved from: <http:\/\/www.omg.org\/SoaML\/1.0\/Beta2\/PDF>."},{"key":"10.1016\/B978-0-12-396535-6.00002-8_b0220","series-title":"CLOSER\u201911, First International Conference on Cloud Computing and Services Science","first-page":"98","author":"Elvester","year":"2011"},{"key":"10.1016\/B978-0-12-396535-6.00002-8_b0225","unstructured":"A. Arsanjani, N. Kumar, SOA reference architecture, 2009. Retrieved from: <http:\/\/www.opengroup.org\/projects\/soa-ref-arch\/uploads\/40\/19713\/soa-ra-public-050609.pdf>."},{"key":"10.1016\/B978-0-12-396535-6.00002-8_b0230","doi-asserted-by":"crossref","unstructured":"I. Foster, Y. Zhao, I. Raicu, S. Lu, in: GCE\u201908, Fourth Grid Computing Environments Workshop, IEEE, 2008, pp. 1\u201310.","DOI":"10.1109\/GCE.2008.4738445"},{"key":"10.1016\/B978-0-12-396535-6.00002-8_b0235","unstructured":"W. Voorsluys, J. Broberg, R. Buyya, Cloud Computing: Principles and Paradigms, Wiley, 2011, pp. 3\u201341."},{"key":"10.1016\/B978-0-12-396535-6.00002-8_b0240","doi-asserted-by":"crossref","first-page":"265","DOI":"10.1155\/2005\/351408","article-title":"Virtual workspaces: achieving quality of service and quality of life in the grid","volume":"13","author":"Keahey","year":"2005","journal-title":"Scientific Programming"},{"key":"10.1016\/B978-0-12-396535-6.00002-8_b0245","unstructured":"J. Chase, D. Irwin, L. Grit, J. Moore, S. Sprenkle, in: HPDC\u201903, 12th IEEE International Symposium on High Performance Distributed Computing, IEEE, 2003, pp. 90\u2013100."},{"key":"10.1016\/B978-0-12-396535-6.00002-8_b0250","unstructured":"J. Myerson, Cloud computing versus grid computing-service types, similarities and differences, and things to consider, Online, 2008. Retrieved from: <http:\/\/www.ibm.com\/developerworks\/web\/library\/wa-cloudgrid>."},{"key":"10.1016\/B978-0-12-396535-6.00002-8_b0255","doi-asserted-by":"crossref","first-page":"599","DOI":"10.1016\/j.future.2008.12.001","article-title":"Cloud computing and emerging IT platforms: vision, hype, and reality for delivering computing as the 5th utility","volume":"25","author":"Buyya","year":"2009","journal-title":"Future Generation Computer Systems"},{"volume":"vol. 110","year":"1994","author":"Kumar","key":"10.1016\/B978-0-12-396535-6.00002-8_b0260"},{"key":"10.1016\/B978-0-12-396535-6.00002-8_b0265","doi-asserted-by":"crossref","first-page":"200","DOI":"10.1177\/109434200101500302","article-title":"The anatomy of the grid: enabling scalable virtual organizations","volume":"15","author":"Foster","year":"2001","journal-title":"International Journal of High Performance Computing Applications"},{"key":"10.1016\/B978-0-12-396535-6.00002-8_b0270","series-title":"SC\u201908, 21st ACM\/IEE Annual Supercomputing Conference, SC\u201908","first-page":"22:1","author":"Raicu","year":"2008"},{"key":"10.1016\/B978-0-12-396535-6.00002-8_b0275","doi-asserted-by":"crossref","first-page":"107","DOI":"10.1145\/1327452.1327492","article-title":"MapReduce: simplified data processing on large clusters","volume":"51","author":"Dean","year":"2008","journal-title":"Communications of the ACM"},{"key":"10.1016\/B978-0-12-396535-6.00002-8_b0280","doi-asserted-by":"crossref","unstructured":"Y. Zhao, M. Hategan, B. Clifford, I. Foster, G. von Laszewski, V. Nefedova, I. Raicu, T. Stef-Praun, M. Wilde, Swift: fast, reliable, loosely coupled parallel computation, in: IEEE Congress on Services, 2007, pp. 199\u2013206.","DOI":"10.1109\/SERVICES.2007.63"},{"key":"10.1016\/B978-0-12-396535-6.00002-8_b0285","series-title":"SC\u201907, Second ACM\/IEE Annual Supercomputing Conference, SC\u201907","first-page":"43:1","author":"Raicu","year":"2007"},{"key":"10.1016\/B978-0-12-396535-6.00002-8_b0290","doi-asserted-by":"crossref","first-page":"59","DOI":"10.1145\/1272998.1273005","article-title":"Dryad: distributed data-parallel programs from sequential building blocks","volume":"41","author":"Isard","year":"2007","journal-title":"SIGOPS Operating Systems Review"},{"key":"10.1016\/B978-0-12-396535-6.00002-8_b0295","doi-asserted-by":"crossref","first-page":"277","DOI":"10.1155\/2005\/962135","article-title":"Interpreting the data: parallel analysis with Sawzall","volume":"13","author":"Pike","year":"2005","journal-title":"Scientific Programming"},{"key":"10.1016\/B978-0-12-396535-6.00002-8_b0300","series-title":"Cloud Computing","first-page":"20","volume":"vol. 34","author":"Ekanayake","year":"2010"},{"key":"10.1016\/B978-0-12-396535-6.00002-8_b0305","series-title":"HPDC\u201910, 19th ACM International Symposium on High Performance Distributed Computing, HPDC\u201910","first-page":"413","author":"Lu","year":"2010"},{"key":"10.1016\/B978-0-12-396535-6.00002-8_b0310","unstructured":"Dictionary and Thesaurus \u2013 Merriam-Webster Online, The definition of utility, 2011. Retrieved from: <www.merriam-webster.com\/dictionary\/utility>."},{"key":"10.1016\/B978-0-12-396535-6.00002-8_b0315","doi-asserted-by":"crossref","first-page":"83","DOI":"10.1016\/0304-4076(94)01598-T","article-title":"General purpose technologies engines of growth?","volume":"65","author":"Bresnahan","year":"1995","journal-title":"Journal of Econometrics"},{"key":"10.1016\/B978-0-12-396535-6.00002-8_b0320","doi-asserted-by":"crossref","first-page":"32","DOI":"10.1147\/sj.431.0032","article-title":"The utility business model and the future of computing services","volume":"43","author":"Rappa","year":"2004","journal-title":"IBM Systems Journal"},{"key":"10.1016\/B978-0-12-396535-6.00002-8_b0325","doi-asserted-by":"crossref","first-page":"41","DOI":"10.1109\/MC.2003.1160055","article-title":"The vision of autonomic computing","volume":"36","author":"Kephart","year":"2003","journal-title":"Computer"},{"key":"10.1016\/B978-0-12-396535-6.00002-8_b0330","unstructured":"A. Karp, R. Gupta, G. Rozas, A. Banerji, The client utility architecture: the precursor to E-speak, Technical Report, Technical Report HPL-2001-136, Hewlett Packard Laboratories, 2001."},{"key":"10.1016\/B978-0-12-396535-6.00002-8_b0335","doi-asserted-by":"crossref","unstructured":"A. Ganek, Autonomic Computing: Concepts, Infrastructure, and Applications, CRC Press, 2007, pp. 3\u201318.","DOI":"10.1201\/9781420009354.pt1"},{"key":"10.1016\/B978-0-12-396535-6.00002-8_b0340","unstructured":"R. van Renesse, K.P. Birman, Autonomic computing \u2013 a system-wide perspective, Autonomic Computing: Concepts, Infrastructure, and Applications, 2006, pp. 1\u201311."},{"key":"10.1016\/B978-0-12-396535-6.00002-8_b0345","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/1380584.1380585","article-title":"A survey of autonomic computing degrees, models, and applications","volume":"40","author":"Huebscher","year":"2008","journal-title":"ACM Computing Surveys"},{"key":"10.1016\/B978-0-12-396535-6.00002-8_b0350","first-page":"1","article-title":"Autonomic computing: IBM\u2019s perspective on the state of information technology","volume":"15","author":"Horn","year":"2001","journal-title":"Computing Systems"},{"key":"10.1016\/B978-0-12-396535-6.00002-8_b0355","doi-asserted-by":"crossref","first-page":"483","DOI":"10.1147\/rd.255.0483","article-title":"The origin of the VM\/370 time-sharing system","volume":"25","author":"Creasy","year":"1981","journal-title":"IBM Journal of Research and Development"},{"key":"10.1016\/B978-0-12-396535-6.00002-8_b0360","unstructured":"R. Rose, Survey of system virtualization techniques, Technical Report, 2004."},{"key":"10.1016\/B978-0-12-396535-6.00002-8_b0365","doi-asserted-by":"crossref","first-page":"18","DOI":"10.1145\/1467247.1467253","article-title":"The evolution of virtualization","volume":"52","author":"Kroeker","year":"2009","journal-title":"Communications of the ACM"},{"key":"10.1016\/B978-0-12-396535-6.00002-8_b0370","doi-asserted-by":"crossref","first-page":"412","DOI":"10.1145\/361011.361073","article-title":"Formal requirements for virtualizable third generation architectures","volume":"17","author":"Popek","year":"1974","journal-title":"Communications of the ACM"},{"key":"10.1016\/B978-0-12-396535-6.00002-8_b0375","unstructured":"VMware, Understanding full virtualization, paravirtualization, and hardware assist, White Paper, VMware Inc., 2007."},{"year":"2011","series-title":"IBM Data Center Networking: Planning for Virtualization and Cloud Computing","author":"Girola","key":"10.1016\/B978-0-12-396535-6.00002-8_b0380"},{"key":"10.1016\/B978-0-12-396535-6.00002-8_b0385","unstructured":"K. Subramanian, Cloud advantage series: speed of deployment-cloud advantage series: speed of deployment, Online, 2009. Retrieved from: <http:\/\/www.cloudave.com\/2523\/cloud-advantage-series-speed-of-deployment\/>."}],"container-title":["Advances in Computers","Advances in Computers Volume 86"],"original-title":[],"language":"en","deposited":{"date-parts":[[2025,4,5]],"date-time":"2025-04-05T02:14:00Z","timestamp":1743819240000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/B9780123965356000028"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9780123965356"],"references-count":77,"URL":"https:\/\/doi.org\/10.1016\/b978-0-12-396535-6.00002-8","relation":{},"ISSN":["0065-2458"],"issn-type":[{"type":"print","value":"0065-2458"}],"subject":[],"published":{"date-parts":[[2012]]}}}