{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,26]],"date-time":"2026-02-26T00:11:01Z","timestamp":1772064661567,"version":"3.50.1"},"reference-count":61,"publisher":"Oxford University Press (OUP)","issue":"9","license":[{"start":{"date-parts":[[2018,1,6]],"date-time":"2018-01-06T00:00:00Z","timestamp":1515196800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/academic.oup.com\/journals\/pages\/open_access\/funder_policies\/chorus\/standard_publication_model"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,9,1]]},"DOI":"10.1093\/comjnl\/bxx118","type":"journal-article","created":{"date-parts":[[2017,11,28]],"date-time":"2017-11-28T23:11:33Z","timestamp":1511910693000},"page":"1306-1322","source":"Crossref","is-referenced-by-count":31,"title":["Risk-based framework for SLA violation abatement from the cloud service provider\u2019s perspective"],"prefix":"10.1093","volume":"61","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-0610-4006","authenticated-orcid":false,"given":"Walayat","family":"Hussain","sequence":"first","affiliation":[{"name":"School of Systems, Management and Leadership, Faculty of Engineering and IT, University of Technology Sydney, Sydney, NSW, Australia"}]},{"given":"Farookh Khadeer","family":"Hussain","sequence":"additional","affiliation":[{"name":"Centre for Artificial Intelligence, School of Software, Faculty of Engineering and IT, University of Technology Sydney, Sydney, NSW, Australia"}]},{"given":"Omar","family":"Hussain","sequence":"additional","affiliation":[{"name":"School of Business, University of New South Wales, Canberra, ACT, Australia"}]},{"given":"Ravindra","family":"Bagia","sequence":"additional","affiliation":[{"name":"School of Systems, Management and Leadership, Faculty of Engineering and IT, University of Technology Sydney, Sydney, NSW, Australia"}]},{"given":"Elizabeth","family":"Chang","sequence":"additional","affiliation":[{"name":"School of Business, University of New South Wales, Canberra, ACT, Australia"}]}],"member":"286","published-online":{"date-parts":[[2018,1,6]]},"reference":[{"key":"key\n\t\t\t\t20180827114419_bxx118C1","doi-asserted-by":"crossref","first-page":"391","DOI":"10.1007\/s12599-009-0071-2","article-title":"Cloud computing\u2014a classification, business models, and research directions","volume":"1","author":"Weinhardt","year":"2009","journal-title":"Bus. Inf. Syst. Eng."},{"key":"key\n\t\t\t\t20180827114419_bxx118C2","author":"Armbrust"},{"key":"key\n\t\t\t\t20180827114419_bxx118C3","volume-title":"Cloud Computing Explained: Implementation Handbook for Enterprises","author":"Rhoton","year":"2013"},{"key":"key\n\t\t\t\t20180827114419_bxx118C4","doi-asserted-by":"crossref","first-page":"240","DOI":"10.1016\/j.is.2017.08.007","article-title":"Formulating and managing viable SLAs in cloud computing from a small to medium service provider's viewpoint: A state-of-the-art review","volume":"71","author":"Hussain","year":"2017","journal-title":"Information Systems"},{"key":"key\n\t\t\t\t20180827114419_bxx118C5","doi-asserted-by":"crossref","first-page":"43","DOI":"10.1023\/A:1021525310424","article-title":"A service level agreement language for dynamic electronic services","volume":"3","author":"Ludwig","year":"2003","journal-title":"Electron. Commer. Res"},{"key":"key\n\t\t\t\t20180827114419_bxx118C6","author":"Hussain","year":"2014"},{"key":"key\n\t\t\t\t20180827114419_bxx118C7","author":"Mittal","year":"2016"},{"key":"key\n\t\t\t\t20180827114419_bxx118C8","author":"Karim","year":"2017"},{"key":"key\n\t\t\t\t20180827114419_bxx118C9","doi-asserted-by":"crossref","first-page":"52","DOI":"10.1109\/TSC.2016.2593925","article-title":"Modeling service level agreements with linked USDL agreement","volume":"10","author":"Garc\u00eda","year":"2017","journal-title":"IEEE Trans. Serv. Comput."},{"key":"key\n\t\t\t\t20180827114419_bxx118C10","author":"Jaramillo","year":"2015"},{"key":"key\n\t\t\t\t20180827114419_bxx118C11","doi-asserted-by":"crossref","first-page":"101","DOI":"10.1504\/IJGUC.2016.077488","article-title":"A multi-agent protocol for service level agreement negotiation in cloud federations","volume":"7","author":"Messina","year":"2016","journal-title":"Int. J. Grid Utility Comput."},{"key":"key\n\t\t\t\t20180827114419_bxx118C12","doi-asserted-by":"crossref","first-page":"12","DOI":"10.1504\/IJGUC.2016.073772","article-title":"Maximum revenue-oriented resource allocation in cloud","volume":"7","author":"Feng","year":"2016","journal-title":"Int. J. Grid Utility Comput."},{"key":"key\n\t\t\t\t20180827114419_bxx118C13","doi-asserted-by":"crossref","first-page":"1760","DOI":"10.1093\/comjnl\/bxw026","article-title":"Provider-based optimized personalized viable SLA (OPV-SLA) framework to prevent SLA violation","volume":"59","author":"Hussain","year":"2016","journal-title":"Comput. J."},{"key":"key\n\t\t\t\t20180827114419_bxx118C14","author":"Hussain","year":"2016"},{"key":"key\n\t\t\t\t20180827114419_bxx118C15","doi-asserted-by":"crossref","first-page":"2923","DOI":"10.1016\/j.comnet.2009.04.014","article-title":"Sandpiper: black-box and gray-box resource management for virtual machines","volume":"53","author":"Wood","year":"2009","journal-title":"Comput. Netw."},{"key":"key\n\t\t\t\t20180827114419_bxx118C16","author":"Emeakaroha","year":"2010"},{"key":"key\n\t\t\t\t20180827114419_bxx118C17","doi-asserted-by":"crossref","first-page":"1017","DOI":"10.1016\/j.future.2011.08.018","article-title":"Towards autonomic detection of SLA violations in cloud infrastructures","volume":"28","author":"Emeakaroha","year":"2012","journal-title":"Future Generation Comput. Syst."},{"key":"key\n\t\t\t\t20180827114419_bxx118C18","author":"Brandic","year":"2010"},{"key":"key\n\t\t\t\t20180827114419_bxx118C19","article-title":"Sla Validation in Layered Cloud Infrastructures","author":"Haq","year":"2010"},{"key":"key\n\t\t\t\t20180827114419_bxx118C20","author":"Cheetham","year":"2001"},{"key":"key\n\t\t\t\t20180827114419_bxx118C21","author":"Al Falasi","year":"2013"},{"key":"key\n\t\t\t\t20180827114419_bxx118C22","doi-asserted-by":"crossref","first-page":"114","DOI":"10.4236\/jsea.2013.63B025","article-title":"HA-SLA: a hierarchical autonomic SLA model for SLA monitoring in cloud computing","volume":"6","author":"Mosallanejad","year":"2013","journal-title":"J. Softw. Eng. Appl."},{"key":"key\n\t\t\t\t20180827114419_bxx118C23","doi-asserted-by":"crossref","first-page":"247","DOI":"10.1016\/j.future.2015.03.016","article-title":"Fault-tolerant service level agreement lifecycle management in clouds using actor system","volume":"54","author":"Lu","year":"2015","journal-title":"Future Generation Comput. Syst."},{"key":"key\n\t\t\t\t20180827114419_bxx118C24","doi-asserted-by":"crossref","first-page":"1029","DOI":"10.1016\/j.jss.2011.11.1043","article-title":"A self-adaptive hierarchical monitoring mechanism for Clouds","volume":"85","author":"Katsaros","year":"2012","journal-title":"J. Syst. Softw."},{"key":"key\n\t\t\t\t20180827114419_bxx118C25","author":"Lee","year":"2014"},{"key":"key\n\t\t\t\t20180827114419_bxx118C26","author":"Jrad","year":"2012"},{"key":"key\n\t\t\t\t20180827114419_bxx118C27","author":"Noor","year":"2011"},{"key":"key\n\t\t\t\t20180827114419_bxx118C28","author":"Fan","year":"2013"},{"key":"key\n\t\t\t\t20180827114419_bxx118C29","author":"Zhang","year":"2011"},{"key":"key\n\t\t\t\t20180827114419_bxx118C30","author":"Romano","year":"2011"},{"key":"key\n\t\t\t\t20180827114419_bxx118C31","first-page":"29","article-title":"How to monitor QoS in cloud infrastructures: the QoSMONaaS approach","volume":"1","author":"Cicotti","year":"2015","journal-title":"Int. J. Comput. Sci. Eng."},{"key":"key\n\t\t\t\t20180827114419_bxx118C32","author":"Cardellini","year":"2011"},{"key":"key\n\t\t\t\t20180827114419_bxx118C33","author":"Emeakaroha","year":"2012"},{"key":"key\n\t\t\t\t20180827114419_bxx118C34","author":"Chandrasekar","year":"2012"},{"key":"key\n\t\t\t\t20180827114419_bxx118C35","author":"Alhamad","year":"2010"},{"key":"key\n\t\t\t\t20180827114419_bxx118C36","author":"Wang","year":"2011"},{"key":"key\n\t\t\t\t20180827114419_bxx118C37","author":"Hammadi","year":"2012"},{"key":"key\n\t\t\t\t20180827114419_bxx118C38","author":"Muchahari","year":"2012"},{"key":"key\n\t\t\t\t20180827114419_bxx118C39","author":"Sun","year":"2013"},{"key":"key\n\t\t\t\t20180827114419_bxx118C40","doi-asserted-by":"crossref","first-page":"472","DOI":"10.1093\/comjnl\/bxu064","article-title":"A user-based early warning service management framework in cloud computing","volume":"58","author":"Hussain","year":"2014","journal-title":"Comput. J."},{"key":"key\n\t\t\t\t20180827114419_bxx118C41","author":"Leitner","year":"2010"},{"key":"key\n\t\t\t\t20180827114419_bxx118C42","author":"Ciciani","year":"2012"},{"key":"key\n\t\t\t\t20180827114419_bxx118C43","author":"Cardellini","year":"2011"},{"key":"key\n\t\t\t\t20180827114419_bxx118C44","doi-asserted-by":"crossref","first-page":"1597","DOI":"10.1007\/s11227-016-1686-y","article-title":"Adaptive trade-off strategy for bargaining-based multi-objective SLA establishment under varying cloud workload","volume":"72","author":"Son","year":"2016","journal-title":"J. Supercomput."},{"key":"key\n\t\t\t\t20180827114419_bxx118C45","doi-asserted-by":"crossref","first-page":"1303","DOI":"10.1016\/j.future.2011.11.002","article-title":"A time-constrained SLA negotiation strategy in competitive computational grids","volume":"28","author":"Silaghi","year":"2012","journal-title":"Future Generation Comput. Syst."},{"key":"key\n\t\t\t\t20180827114419_bxx118C46","author":"Badidi","year":"2013"},{"key":"key\n\t\t\t\t20180827114419_bxx118C47","author":"Pacheco-Sanchez","year":"2011"},{"key":"key\n\t\t\t\t20180827114419_bxx118C48","author":"Schmieders","year":"2011"},{"key":"key\n\t\t\t\t20180827114419_bxx118C49","author":"Hussain","year":"2016"},{"key":"key\n\t\t\t\t20180827114419_bxx118C50","author":"Ciciani","year":"2012"},{"key":"key\n\t\t\t\t20180827114419_bxx118C51","author":"Kiran","year":"2011"},{"key":"key\n\t\t\t\t20180827114419_bxx118C52","author":"Zhang","year":"2010"},{"key":"key\n\t\t\t\t20180827114419_bxx118C53","first-page":"4","article-title":"Runtime model checking for SLA compliance monitoring and QoS prediction","volume":"6","author":"Cicotti","year":"2015","journal-title":"J. Wireless Mobile Netw. Ubiquitous Comput. Dependable Appl. (JoWUA)"},{"key":"key\n\t\t\t\t20180827114419_bxx118C54","doi-asserted-by":"crossref","first-page":"2114","DOI":"10.1002\/sec.923","article-title":"Security risk assessment framework for cloud computing environments","volume":"7","author":"Albakri","year":"2014","journal-title":"Secur. Commun. Netw."},{"key":"key\n\t\t\t\t20180827114419_bxx118C55","author":"Hussain","year":"2016"},{"key":"key\n\t\t\t\t20180827114419_bxx118C56","volume-title":"Time Series Analysis: Forecasting and Control","author":"Box","year":"2011"},{"key":"key\n\t\t\t\t20180827114419_bxx118C57","doi-asserted-by":"crossref","first-page":"449","DOI":"10.1109\/TCC.2014.2350475","article-title":"Workload prediction using ARIMA model and its impact on cloud applications\u2019 QoS","volume":"3","author":"Calheiros","year":"2015","journal-title":"IEEE Trans. Cloud Comput."},{"key":"key\n\t\t\t\t20180827114419_bxx118C58","doi-asserted-by":"crossref","first-page":"1677","DOI":"10.1007\/s11280-014-0319-8","article-title":"User-side QoS forecasting and management of cloud services","volume":"18","author":"ur Rehman","year":"2015","journal-title":"World Wide Web"},{"key":"key\n\t\t\t\t20180827114419_bxx118C59","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/S0020-7373(75)80002-2","article-title":"An experiment in linguistic synthesis with a fuzzy logic controller","volume":"7","author":"Mamdani","year":"1975","journal-title":"Int. J. Man. Mach. Stud."},{"key":"key\n\t\t\t\t20180827114419_bxx118C60","author":"CloudClimate"},{"key":"key\n\t\t\t\t20180827114419_bxx118C61","author":"P. N. Monitor"}],"container-title":["The Computer Journal"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/academic.oup.com\/comjnl\/article-pdf\/61\/9\/1306\/25570219\/bxx118.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,6]],"date-time":"2019-10-06T22:06:10Z","timestamp":1570399570000},"score":1,"resource":{"primary":{"URL":"https:\/\/academic.oup.com\/comjnl\/article\/61\/9\/1306\/4791156"}},"subtitle":[],"editor":[{"given":"Alexander","family":"Romanovsky","sequence":"additional","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2018,1,6]]},"references-count":61,"journal-issue":{"issue":"9","published-online":{"date-parts":[[2018,1,6]]},"published-print":{"date-parts":[[2018,9,1]]}},"URL":"https:\/\/doi.org\/10.1093\/comjnl\/bxx118","relation":{},"ISSN":["0010-4620","1460-2067"],"issn-type":[{"value":"0010-4620","type":"print"},{"value":"1460-2067","type":"electronic"}],"subject":[],"published-other":{"date-parts":[[2018,9]]},"published":{"date-parts":[[2018,1,6]]}}}