{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,3,12]],"date-time":"2024-03-12T19:30:15Z","timestamp":1710271815524},"reference-count":58,"publisher":"Informa UK Limited","issue":"1","content-domain":{"domain":["www.tandfonline.com"],"crossmark-restriction":true},"short-container-title":["International Journal of Electronic Commerce"],"published-print":{"date-parts":[[2015,11,15]]},"DOI":"10.1080\/10864415.2016.1061794","type":"journal-article","created":{"date-parts":[[2015,8,31]],"date-time":"2015-08-31T14:30:21Z","timestamp":1441031421000},"page":"142-173","update-policy":"http:\/\/dx.doi.org\/10.1080\/tandf_crossmark_01","source":"Crossref","is-referenced-by-count":7,"title":["A Semantic Framework to Support the Management of Cloud-Based Service Provision Within a Global Public Inclusive Infrastructure"],"prefix":"10.1080","volume":"20","author":[{"given":"Dimitris","family":"Giakoumis","sequence":"first","affiliation":[]},{"given":"Efthimia","family":"Mavridou","sequence":"additional","affiliation":[]},{"given":"Konstantinos","family":"Votis","sequence":"additional","affiliation":[]},{"given":"Konstantinos","family":"Giannoutakis","sequence":"additional","affiliation":[]},{"given":"Dimitrios","family":"Tzovaras","sequence":"additional","affiliation":[]},{"given":"George","family":"Hassapis","sequence":"additional","affiliation":[]}],"member":"301","published-online":{"date-parts":[[2015,8,31]]},"reference":[{"key":"CIT0001","doi-asserted-by":"publisher","DOI":"10.1109\/NBiS.2010.67"},{"key":"CIT0002","first-page":"9","volume-title":"Third International Conference on Models and Ontology-based Design of Protocols, Architectures and Services (MOPAS)","author":"Androcec D.","year":"2012"},{"key":"CIT0003","doi-asserted-by":"publisher","DOI":"10.1016\/j.websem.2007.03.002"},{"key":"CIT0004","doi-asserted-by":"crossref","unstructured":"Barros, A., and Dumas, M. The rise of Web service ecosystems. IEEE IT Professional, 8, 5 (2006), 31\u201337.","DOI":"10.1109\/MITP.2006.123"},{"key":"CIT0005","first-page":"18","volume-title":"Proceedings of the 2010 International Conference on Internet Computing, ICOMP 2010,","author":"Bernstein D.","year":"2010"},{"key":"CIT0006","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-15681-6_10"},{"key":"CIT0007","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2008.12.001"},{"key":"CIT0008","doi-asserted-by":"publisher","DOI":"10.1109\/SCC.2010.93"},{"key":"CIT0009","doi-asserted-by":"publisher","DOI":"10.1002\/9780470028261"},{"key":"CIT0010","doi-asserted-by":"publisher","DOI":"10.4236\/jsea.2013.66039"},{"key":"CIT0011","first-page":"18","volume-title":"The Third International Conference on Cloud Computing, GRIDs, and Virtualization","author":"Di Modica G.","year":"2012"},{"key":"CIT0012","doi-asserted-by":"publisher","DOI":"10.1109\/SKG.2012.1"},{"key":"CIT0013","doi-asserted-by":"publisher","DOI":"10.1109\/AINA.2010.187"},{"key":"CIT0014","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2012.09.006"},{"key":"CIT0015","first-page":"195","volume-title":"Tenth International Conference on Computer and Information Technology (CIT).","author":"Fei T.","year":"2010"},{"key":"CIT0016","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2011.05.022"},{"key":"CIT0017","doi-asserted-by":"publisher","DOI":"10.1109\/CISIS.2012.138"},{"key":"CIT0018","doi-asserted-by":"publisher","DOI":"10.2753\/JEC1086-4415120404"},{"key":"CIT0019","unstructured":"Global Public Inclusive Infrastructure (GPII). http:\/\/gpii.net\/ (2013) (accessed in January 2014)."},{"key":"CIT0020","first-page":"84","volume-title":"International Symposium on Web Information Systems and Applications (WISA)","author":"Guan Y.","year":"2009"},{"key":"CIT0021","doi-asserted-by":"crossref","unstructured":"Habib, S.M.; Ries, S.; and Muhlhauser, M. Cloud computing landscape and research challenges regarding trust and reputation. In Ubiquitous Intelligence and Computing and Seventh International Conference on Autonomic and Trusted Computing (UIC\/ATC). IEEE, 2010, pp. 410\u2013415.","DOI":"10.1109\/UIC-ATC.2010.48"},{"key":"CIT0022","doi-asserted-by":"publisher","DOI":"10.2307\/25148625"},{"key":"CIT0023","doi-asserted-by":"publisher","DOI":"10.1109\/DASC.2009.149"},{"key":"CIT0024","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2005.05.019"},{"key":"CIT0025","first-page":"496","volume-title":"Fourth Nordic Workshop on Secure Computer Systems (NORDSEC\u201999)","author":"Josang A.","year":"1999"},{"key":"CIT0026","doi-asserted-by":"publisher","DOI":"10.1109\/ICSSE.2011.5961913"},{"key":"CIT0027","doi-asserted-by":"publisher","DOI":"10.2753\/JEC1086-4415150105"},{"key":"CIT0028","doi-asserted-by":"publisher","DOI":"10.1007\/11948148_50"},{"key":"CIT0029","unstructured":"Kopp P. et al. IBM Cloud Computing Reference Architecture 2.0. https:\/\/www.open group.org\/cloudcomputing\/uploads\/40\/23840\/CCRA.IBMSubmission.02282011.doc. 2011."},{"key":"CIT0030","doi-asserted-by":"publisher","DOI":"10.2753\/JEC1086-4415110206"},{"key":"CIT0031","doi-asserted-by":"publisher","DOI":"10.1080\/10864415.2004.11044307"},{"key":"CIT0032","doi-asserted-by":"publisher","DOI":"10.6028\/NIST.SP.500-292"},{"key":"CIT0033","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-20042-7_35"},{"key":"CIT0034","doi-asserted-by":"publisher","DOI":"10.1080\/10864415.2001.11044235"},{"key":"CIT0035","doi-asserted-by":"publisher","DOI":"10.1145\/1985347.1985353"},{"issue":"145","key":"CIT0036","first-page":"7","volume":"800","author":"Mell P.","year":"2011","journal-title":"NIST Special Publication"},{"key":"CIT0037","first-page":"973","volume-title":"Federated Conference on Computer Science and Information Systems (FedCSIS)","author":"Moscato F.","year":"2011"},{"key":"CIT0038","doi-asserted-by":"publisher","DOI":"10.1007\/s12599-009-0069-9"},{"key":"CIT0039","doi-asserted-by":"publisher","DOI":"10.1016\/j.is.2012.06.004"},{"key":"CIT0040","doi-asserted-by":"publisher","DOI":"10.2753\/JEC1086-4415120203"},{"key":"CIT0041","doi-asserted-by":"publisher","DOI":"10.1080\/10864415.2003.11044275"},{"key":"CIT0042","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-29852-3_7"},{"key":"CIT0043","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4471-4189-1_1"},{"key":"CIT0044","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-07443-6_6"},{"key":"CIT0045","doi-asserted-by":"publisher","DOI":"10.1145\/544741.544853"},{"key":"CIT0046","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-29740-3_13"},{"key":"CIT0047","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-011-0710-5"},{"issue":"2","key":"CIT0048","first-page":"23","volume":"11","author":"Resnick P.","year":"2002","journal-title":"Advances in Applied Microeconomics"},{"key":"CIT0049","doi-asserted-by":"publisher","DOI":"10.1007\/s10257-008-0080-6"},{"key":"CIT0050","doi-asserted-by":"publisher","DOI":"10.1002\/9781118255674"},{"key":"CIT0051","doi-asserted-by":"publisher","DOI":"10.1145\/2522968.2522980"},{"issue":"2","key":"CIT0052","first-page":"61","volume":"5","author":"Tan Y.-H.","year":"2001","journal-title":"International Journal of Electronic Commerce"},{"key":"CIT0053","unstructured":"The Cloud4all project. http:\/\/cloud4all.info\/ (accessed in January 2015)."},{"key":"CIT0054","doi-asserted-by":"publisher","DOI":"10.1145\/2513383.2513395"},{"issue":"2","key":"CIT0055","first-page":"118","volume":"3","author":"Wang Y.","year":"2007","journal-title":"International Transactions on Systems Science and Applications"},{"key":"CIT0056","doi-asserted-by":"publisher","DOI":"10.1109\/MITP.2009.21"},{"key":"CIT0057","doi-asserted-by":"publisher","DOI":"10.1109\/GCE.2008.4738443"},{"key":"CIT0058","doi-asserted-by":"publisher","DOI":"10.1145\/544741.544809"}],"container-title":["International Journal of Electronic Commerce"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.tandfonline.com\/doi\/pdf\/10.1080\/10864415.2016.1061794","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,6,26]],"date-time":"2023-06-26T15:15:31Z","timestamp":1687792531000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.tandfonline.com\/doi\/full\/10.1080\/10864415.2016.1061794"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,8,31]]},"references-count":58,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2015,11,15]]}},"alternative-id":["10.1080\/10864415.2016.1061794"],"URL":"https:\/\/doi.org\/10.1080\/10864415.2016.1061794","relation":{},"ISSN":["1086-4415","1557-9301"],"issn-type":[{"value":"1086-4415","type":"print"},{"value":"1557-9301","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015,8,31]]},"assertion":[{"value":"The publishing and review policy for this title is described in its Aims & Scope.","order":1,"name":"peerreview_statement","label":"Peer Review Statement"},{"value":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=mjec20","URL":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=mjec20","order":2,"name":"aims_and_scope_url","label":"Aim & Scope"},{"value":"2015-08-31","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}