{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,26]],"date-time":"2026-03-26T20:15:09Z","timestamp":1774556109699,"version":"3.50.1"},"reference-count":363,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/OAPA.html"}],"funder":[{"name":"European Software Center Initiative by Chalmers University of Technology and the University of Gothenburg","award":["SLA-IoT"],"award-info":[{"award-number":["SLA-IoT"]}]},{"name":"M\u00e4lardalen University, Sweden, within the context of the XPRES Framework"},{"name":"Swedish Foundation for Strategic Research Project Future Factories in the Cloud","award":["GMT14-0032"],"award-info":[{"award-number":["GMT14-0032"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2018]]},"DOI":"10.1109\/access.2017.2744677","type":"journal-article","created":{"date-parts":[[2017,8,25]],"date-time":"2017-08-25T18:41:43Z","timestamp":1503686503000},"page":"30184-30207","source":"Crossref","is-referenced-by-count":63,"title":["Management of Service Level Agreements for Cloud Services in IoT: A Systematic Mapping Study"],"prefix":"10.1109","volume":"6","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-3242-6113","authenticated-orcid":false,"given":"Saad","family":"Mubeen","sequence":"first","affiliation":[]},{"given":"Sara Abbaspour","family":"Asadollah","sequence":"additional","affiliation":[]},{"given":"Alessandro Vittorio","family":"Papadopoulos","sequence":"additional","affiliation":[]},{"given":"Mohammad","family":"Ashjaei","sequence":"additional","affiliation":[]},{"given":"Hongyu","family":"Pei-Breivold","sequence":"additional","affiliation":[]},{"given":"Moris","family":"Behnam","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref275","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2014.618"},{"key":"ref274","first-page":"60","article-title":"Dynamic SLA based elastic cloud service management: A SaaS perspective","author":"nandi","year":"2013","journal-title":"Proc IFIP\/IEEE Int Symp Integr Netw Manage"},{"key":"ref363","doi-asserted-by":"publisher","DOI":"10.11613\/BM.2012.031"},{"key":"ref277","doi-asserted-by":"publisher","DOI":"10.1504\/IJGUC.2016.077488"},{"key":"ref362","doi-asserted-by":"publisher","DOI":"10.1037\/h0031619"},{"key":"ref276","doi-asserted-by":"publisher","DOI":"10.1109\/Grid.2012.18"},{"key":"ref361","doi-asserted-by":"publisher","DOI":"10.1177\/001316446002000104"},{"key":"ref271","first-page":"522","article-title":"M4cloud&#x2014;Generic application level monitoring for resource-shared cloud environments","author":"mastelic","year":"2012","journal-title":"Proc 2nd Int Conf Cloud Comput Services Sci"},{"key":"ref360","doi-asserted-by":"publisher","DOI":"10.3906\/elk-1403-45"},{"key":"ref270","doi-asserted-by":"publisher","DOI":"10.1109\/WETICE.2014.12"},{"key":"ref273","doi-asserted-by":"publisher","DOI":"10.1145\/2446224.2446228"},{"key":"ref170","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-11587-0_19"},{"key":"ref272","doi-asserted-by":"publisher","DOI":"10.1109\/ISCC.2011.5984008"},{"key":"ref172","first-page":"366","article-title":"Generating an excerpt of a service level agreement from a formal definition of non-functional aspects using OWL","volume":"20","author":"rady","year":"2014","journal-title":"J Universal Comput Sci"},{"key":"ref171","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-53856-8_24"},{"key":"ref174","doi-asserted-by":"publisher","DOI":"10.1109\/DASC.2011.184"},{"key":"ref173","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-44482-6_3"},{"key":"ref176","doi-asserted-by":"publisher","DOI":"10.1109\/ICON.2012.6506525"},{"key":"ref175","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-14609-6_11"},{"key":"ref178","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2015.03.018"},{"key":"ref177","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2011.11.004"},{"key":"ref168","doi-asserted-by":"publisher","DOI":"10.1109\/ICOS.2012.6417613"},{"key":"ref169","doi-asserted-by":"publisher","DOI":"10.1007\/s13740-016-0070-7"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/SCC.2016.87"},{"key":"ref38","first-page":"598","article-title":"Towards a security SLA-based cloud monitoring service","author":"petcu","year":"2014","journal-title":"Proc 4th Int Conf Cloud Comput Services Sci"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-36110-3_6"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/DEST.2010.5610586"},{"key":"ref359","first-page":"2050","article-title":"A negotiation framework for the cloud management system using similarity and gale shapely stable matching approach","volume":"9","author":"rajavel","year":"2015","journal-title":"KSII Trans Internet Inf Syst"},{"key":"ref31","first-page":"1","article-title":"Service level agreement in cloud computing","author":"patel","year":"2009","journal-title":"Proc of OOPSLA Cloud Computing Workshop"},{"key":"ref30","year":"2017","journal-title":"Automated Cloud SLA Negotiation"},{"key":"ref357","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2015.12.007"},{"key":"ref267","first-page":"777","article-title":"Verifying cloud service level agreement","author":"ye","year":"2012","journal-title":"Proc IEEE Global Commun Conf (GLOBECOM)"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-21878-1_72"},{"key":"ref358","doi-asserted-by":"publisher","DOI":"10.1155\/2015\/858975"},{"key":"ref268","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2013.09.017"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/FTDCS.2003.1204317"},{"key":"ref355","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2013.11.001"},{"key":"ref269","doi-asserted-by":"publisher","DOI":"10.3844\/jcssp.2011.1596.1604"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1023\/A:1022445108617"},{"key":"ref356","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2015.03.011"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1145\/1463788.1463802"},{"key":"ref352","doi-asserted-by":"publisher","DOI":"10.1109\/ARES.2011.34"},{"key":"ref288","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-15392-6_19"},{"key":"ref351","doi-asserted-by":"publisher","DOI":"10.1109\/SERVICES.2013.74"},{"key":"ref287","first-page":"506","article-title":"Slam: SLA monitoring framework for federated cloud services","author":"moustafa","year":"2015","journal-title":"Proc IEEE\/ACM 8th Int Conf Utility Cloud Comput (UCC)"},{"key":"ref354","first-page":"61","article-title":"A cloud service broker for SLA-based SaaS provisioning","author":"badidi","year":"2013","journal-title":"Proc Int Conf Inf Soc (i-Soc )"},{"key":"ref286","doi-asserted-by":"publisher","DOI":"10.1109\/CCIS.2011.6045091"},{"key":"ref353","doi-asserted-by":"publisher","DOI":"10.1109\/ICCP.2012.6356201"},{"key":"ref285","doi-asserted-by":"publisher","DOI":"10.1109\/CloudTech.2015.7336999"},{"key":"ref284","doi-asserted-by":"publisher","DOI":"10.1109\/ICCW.2014.6881255"},{"key":"ref181","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-23201-0_17"},{"key":"ref283","doi-asserted-by":"publisher","DOI":"10.2991\/ccis-13.2013.110"},{"key":"ref180","doi-asserted-by":"publisher","DOI":"10.1109\/MIPRO.2016.7522239"},{"key":"ref350","first-page":"331","article-title":"The SLA evaluation model for cloud computing","volume":"30","author":"chenkang","year":"2013","journal-title":"Proc Int Conf Comput Netw Commun Eng (ICCNCE)"},{"key":"ref282","doi-asserted-by":"publisher","DOI":"10.1145\/2593793.2593794"},{"key":"ref281","doi-asserted-by":"publisher","DOI":"10.1109\/HONET.2015.7395426"},{"key":"ref280","doi-asserted-by":"publisher","DOI":"10.1109\/IC2E.2016.14"},{"key":"ref185","doi-asserted-by":"publisher","DOI":"10.1109\/SKG.2011.10"},{"key":"ref184","first-page":"663","article-title":"Service level agreements as a service&#x2014;Towards security risks aware SLA management","author":"stamou","year":"2012","journal-title":"Proc 2nd Int Conf Cloud Comput Services Sci"},{"key":"ref183","first-page":"831","article-title":"QoE metrics aggregation for hierarchical service level agreement in cross-layered SLA architecture","author":"shin","year":"2015","journal-title":"Proc Int Conf Ubiquitous Future Netw"},{"key":"ref182","doi-asserted-by":"publisher","DOI":"10.1109\/CloudTech.2015.7336975"},{"key":"ref189","doi-asserted-by":"publisher","DOI":"10.1109\/SITIS.2012.82"},{"key":"ref188","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-09339-0_44"},{"key":"ref187","doi-asserted-by":"publisher","DOI":"10.1109\/ChinaGrid.2012.14"},{"key":"ref186","doi-asserted-by":"publisher","DOI":"10.1109\/CSAE.2012.6272592"},{"key":"ref28","first-page":"324","article-title":"Service level agreement in cloud computing: A survey","volume":"14","author":"wazir","year":"2016","journal-title":"Int J Comput Sci Inf Secur"},{"key":"ref27","doi-asserted-by":"crossref","DOI":"10.1145\/2843890","article-title":"A systematic review of service level management in the cloud","volume":"48","author":"faniyi","year":"2016","journal-title":"ACM Comput Surv"},{"key":"ref179","doi-asserted-by":"publisher","DOI":"10.1109\/CloudCom.2013.44"},{"key":"ref29","first-page":"42","article-title":"QoS parameters to network performance metrics mapping for SLA monitoring","volume":"5","author":"lee","year":"2003","journal-title":"KNOM Rev"},{"key":"ref348","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2014.2305641"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2015.03.007"},{"key":"ref349","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-01671-4_3"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/3PGCIC.2013.45"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/s11219-015-9301-7"},{"key":"ref344","first-page":"1","volume":"7714","author":"yaqub","year":"2012","journal-title":"A Protocol Development Framework for SLA Negotiations in Cloud and Service Computing"},{"key":"ref24","first-page":"1","article-title":"An extensive survey on QoS in cloud computing","volume":"5","author":"mary","year":"2014","journal-title":"Int J Comput Sci Inf Technol"},{"key":"ref345","first-page":"1","author":"patel","year":"2009","journal-title":"Service Level Agreement in Cloud Computing Cloud Workshops at OOPSLA09"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.14445\/22312803\/IJCTT-V27P110"},{"key":"ref346","first-page":"77","article-title":"Resource allocation avoiding SLA violations in cloud framework for SaaS","volume":"15","author":"sasane","year":"2015","journal-title":"Int J Comput Sci Netw Secur"},{"key":"ref278","doi-asserted-by":"publisher","DOI":"10.1145\/2494444.2494468"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2014.12.015"},{"key":"ref347","doi-asserted-by":"publisher","DOI":"10.1109\/CBD.2013.18"},{"key":"ref279","doi-asserted-by":"publisher","DOI":"10.1109\/CIT.2011.67"},{"key":"ref25","first-page":"118","article-title":"A comprehensive survey on quality of service implementations in cloud computing","volume":"4","author":"firdhous","year":"2013","journal-title":"Int J Sci Eng Res"},{"key":"ref293","doi-asserted-by":"publisher","DOI":"10.4108\/icst.collaboratecom.2014.257551"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2015.09.066"},{"key":"ref292","doi-asserted-by":"publisher","DOI":"10.2991\/ccis-13.2013.2"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2011.08.018"},{"key":"ref295","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-20294-5_38"},{"key":"ref294","doi-asserted-by":"publisher","DOI":"10.14569\/IJACSA.2015.061027"},{"key":"ref297","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-14325-5_31"},{"key":"ref296","doi-asserted-by":"publisher","DOI":"10.1109\/UCC.2013.58"},{"key":"ref299","first-page":"3813","article-title":"Service level agreement as an instrument to enhance trust in cloud computing&#x2014;An analysis of infrastructure-as-a-service providers","volume":"5","author":"stankov","year":"2012","journal-title":"Proc 18th Amer Conf Inf Syst"},{"key":"ref298","doi-asserted-by":"publisher","DOI":"10.1109\/INM.2015.7140339"},{"key":"ref154","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.2944"},{"key":"ref153","doi-asserted-by":"publisher","DOI":"10.3233\/MGS-130203"},{"key":"ref156","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2010.10.016"},{"key":"ref155","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2013.11.014"},{"key":"ref150","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-16132-2_23"},{"key":"ref291","doi-asserted-by":"publisher","DOI":"10.1109\/CLOUD.2013.61"},{"key":"ref152","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-03864-8_5"},{"key":"ref290","doi-asserted-by":"publisher","DOI":"10.1109\/ICPADS.2012.35"},{"key":"ref151","doi-asserted-by":"publisher","DOI":"10.1109\/CCEM.2014.7015474"},{"key":"ref146","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom.2012.97"},{"key":"ref147","doi-asserted-by":"publisher","DOI":"10.1109\/DASC.2011.120"},{"key":"ref148","doi-asserted-by":"publisher","DOI":"10.1109\/SCC.2013.24"},{"key":"ref149","doi-asserted-by":"publisher","DOI":"10.1109\/CSCWD.2015.7231026"},{"key":"ref289","doi-asserted-by":"publisher","DOI":"10.1109\/EUROCON.2015.7313734"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.5220\/0005873100590066"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-24912-4_2"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1016\/j.datak.2011.01.006"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1109\/SOSE.2011.6139087"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/ICITSI.2014.7048278"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2015.11.026"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2016.05.014"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2012.06.006"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2014.03.004"},{"key":"ref167","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2014.08.066"},{"key":"ref166","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-30767-6_25"},{"key":"ref165","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSAC.2012.68"},{"key":"ref164","doi-asserted-by":"publisher","DOI":"10.1145\/1929566.1929567"},{"key":"ref163","doi-asserted-by":"publisher","DOI":"10.1109\/WETICE.2015.36"},{"key":"ref162","doi-asserted-by":"publisher","DOI":"10.1109\/UCC.2014.53"},{"key":"ref161","doi-asserted-by":"publisher","DOI":"10.1109\/CCGrid.2013.66"},{"key":"ref160","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-33999-8_3"},{"key":"ref4","author":"kyriazis","year":"2013","journal-title":"Cloud computing service level agreements&#x2014;Exploitation of research results European Commission Directorate General Communications Networks Content and Technology Unit E2&#x2014;Software and Services Cloud"},{"key":"ref3","year":"2017","journal-title":"Internet of the Things"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/REV.2014.6784271"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ETFA.2013.6648080"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/CLOUD.2014.86"},{"key":"ref159","doi-asserted-by":"publisher","DOI":"10.1109\/GCCT.2015.7342625"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/DSDIS.2015.11"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2012.04.126"},{"key":"ref157","first-page":"586","article-title":"CSLA: A Language for improving Cloud SLA Management","author":"kouki","year":"2012","journal-title":"Proc 2nd Int Conf Cloud Comput Services Sci"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2014.2359894"},{"key":"ref158","doi-asserted-by":"publisher","DOI":"10.1109\/CCGrid.2014.17"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1007\/s11761-015-0187-9"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2016.06.004"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2013.04.005"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/UCC.2011.38"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2015.03.016"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2016.07.013"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2010.05.011"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1007\/s00766-005-0021-6"},{"key":"ref320","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-016-1686-y"},{"key":"ref321","volume":"121","author":"son","year":"2010","journal-title":"An Adaptive Tradeoff Algorithm for Multi-issue SLA Negotiation"},{"key":"ref73","first-page":"457","article-title":"Adaptable service level objective agreement (A-SLO-A) for cloud services","author":"frey","year":"2013","journal-title":"Proc 3rd Int Conf Cloud Comput Services Sci"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1109\/CLOUD.2012.135"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1109\/DASC.2011.172"},{"key":"ref70","first-page":"1","article-title":"Performance analysis of a framework for multi-interfaced service level agreements on mobile devices","author":"aijaz","year":"2011","journal-title":"Proc 17th Eur Wireless Sustain Wireless Technol"},{"key":"ref318","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCN.2015.7288394"},{"key":"ref76","first-page":"611","article-title":"SLA negotiation and brokering for sky computing","author":"amato","year":"2012","journal-title":"Proc of CLOSER"},{"key":"ref317","doi-asserted-by":"publisher","DOI":"10.1109\/CloudCom.2015.87"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-10-1678-3_62"},{"key":"ref316","doi-asserted-by":"publisher","DOI":"10.1109\/LatinCloud.2013.6842223"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1109\/IAdCC.2014.6779430"},{"key":"ref315","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-012-0861-z"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1109\/ICRIIS.2013.6716773"},{"key":"ref314","first-page":"168","article-title":"Negotiation-based flexible SLA establishment with SLA-driven resource allocation in cloud computing","author":"son","year":"2013","journal-title":"Proc 13th IEEE\/ACM Int Symp Cluster Cloud Grid Comput"},{"key":"ref313","doi-asserted-by":"publisher","DOI":"10.1109\/GCC.2010.67"},{"key":"ref312","doi-asserted-by":"publisher","DOI":"10.1109\/APNOMS.2015.7275375"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2014.04.011"},{"key":"ref311","doi-asserted-by":"publisher","DOI":"10.1109\/WETICE.2016.69"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1145\/2835075.2835078"},{"key":"ref319","doi-asserted-by":"publisher","DOI":"10.1002\/sec.740"},{"key":"ref310","doi-asserted-by":"publisher","DOI":"10.1109\/CSCWD.2014.6846924"},{"key":"ref60","first-page":"533","article-title":"A semantic discovery frame work to support supply-demand matchmaking in cloud service markets","author":"modica","year":"2012","journal-title":"Proc 2nd Int Conf Cloud Comput Services Sci"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-38904-2_11"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1109\/INNOVATIONS.2011.5893834"},{"key":"ref305","doi-asserted-by":"publisher","DOI":"10.1145\/2428955.2429005"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1145\/2896387.2896442"},{"key":"ref304","doi-asserted-by":"publisher","DOI":"10.1504\/IJGUC.2014.065391"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2011.11.1043"},{"key":"ref307","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2012.6195591"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2015.03.027"},{"key":"ref306","first-page":"361","article-title":"PAEAN4cloud - a framework for monitoring and managing the SLA violation of cloud service-based applications","author":"taher","year":"2014","journal-title":"Proc 4th Int Conf Cloud Comput Services Sci"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2013.10.005"},{"key":"ref301","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-15681-6_12"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2014.07.030"},{"key":"ref300","doi-asserted-by":"publisher","DOI":"10.1109\/CloudCom.2012.6427519"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1109\/CSCI.2014.52"},{"key":"ref303","first-page":"573","volume":"435","author":"sheshasaayee","year":"2016","journal-title":"SLA Based Utility Analysis for Improving QoS in Cloud Computing"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1109\/ICSAI.2012.6223574"},{"key":"ref302","first-page":"843","article-title":"An exploratory study of cloud service level agreements&#x2014;State of the art review","volume":"9","author":"saravanan","year":"2015","journal-title":"KSII Trans Internet Inf Syst"},{"key":"ref309","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-013-1047-z"},{"key":"ref308","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-28675-9_2"},{"key":"ref197","doi-asserted-by":"publisher","DOI":"10.1186\/s40064-016-1938-6"},{"key":"ref198","doi-asserted-by":"publisher","DOI":"10.1109\/NOMS.2014.6838336"},{"key":"ref199","doi-asserted-by":"publisher","DOI":"10.1109\/NCCA.2014.17"},{"key":"ref193","doi-asserted-by":"publisher","DOI":"10.1109\/AICCSA.2015.7507243"},{"key":"ref194","doi-asserted-by":"publisher","DOI":"10.1109\/3PGCIC.2013.45"},{"key":"ref195","doi-asserted-by":"publisher","DOI":"10.1109\/CSC.2012.38"},{"key":"ref196","first-page":"966","article-title":"SLA approach for &#x2018;cloud as a service","author":"ayadi","year":"2013","journal-title":"Proc IEEE 6th Int Conf Cloud Comput"},{"key":"ref95","doi-asserted-by":"publisher","DOI":"10.1166\/jctn.2014.3405"},{"key":"ref94","doi-asserted-by":"publisher","DOI":"10.1109\/MESOCA.2011.6049039"},{"key":"ref190","doi-asserted-by":"publisher","DOI":"10.1109\/SCC.2014.45"},{"key":"ref93","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2015.02.028"},{"key":"ref191","first-page":"299","article-title":"A cloud application for security service level agreement evaluation","author":"casola","year":"2014","journal-title":"Proc 4th Int Conf Cloud Comput Services Sci (CLOSER)"},{"key":"ref92","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-25106-1_4"},{"key":"ref192","doi-asserted-by":"publisher","DOI":"10.1109\/IGCC.2013.6604493"},{"key":"ref342","doi-asserted-by":"publisher","DOI":"10.1109\/CSCWD.2013.6580957"},{"key":"ref91","doi-asserted-by":"publisher","DOI":"10.1109\/MESOCA.2015.7328126"},{"key":"ref343","doi-asserted-by":"publisher","DOI":"10.1109\/SCC.2014.17"},{"key":"ref90","doi-asserted-by":"publisher","DOI":"10.1145\/1555301.1555302"},{"key":"ref340","doi-asserted-by":"publisher","DOI":"10.1109\/CGC.2012.75"},{"key":"ref341","doi-asserted-by":"publisher","DOI":"10.1109\/ICGCE.2013.6823523"},{"key":"ref336","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCN.2014.6911762"},{"key":"ref335","doi-asserted-by":"publisher","DOI":"10.1109\/AICCSA.2014.7073248"},{"key":"ref334","doi-asserted-by":"publisher","DOI":"10.1109\/HPCC.and.EUC.2013.68"},{"key":"ref333","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-39324-7_18"},{"key":"ref98","doi-asserted-by":"publisher","DOI":"10.1117\/12.2001754"},{"key":"ref339","doi-asserted-by":"publisher","DOI":"10.1109\/MESOCA.2013.6632741"},{"key":"ref99","first-page":"64","article-title":"Quantitative assessment of cloud security level agreements: A case study","author":"luna","year":"2012","journal-title":"Proc Int Conf Secur Cryptogr"},{"key":"ref338","first-page":"235","article-title":"Automated SLA negotiation framework for cloud computing","author":"wu","year":"2013","journal-title":"Proc 13th IEEE\/ACM Int Symp Cluster Cloud Grid Comput"},{"key":"ref96","first-page":"204","article-title":"Monitoring and management of service level agreements in cloud computing","author":"anithakumari","year":"2015","journal-title":"Proc Int Conf Cloud Autonomic Comput"},{"key":"ref337","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE.2013.6698895"},{"key":"ref97","doi-asserted-by":"publisher","DOI":"10.1109\/INM.2015.7140442"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1109\/ISDA.2015.7489170"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2012.07.004"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-54525-2_13"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.1109\/TCC.2015.2415783"},{"key":"ref330","doi-asserted-by":"publisher","DOI":"10.1109\/IMCCC.2012.339"},{"key":"ref331","doi-asserted-by":"publisher","DOI":"10.1109\/NOMS.2014.6838320"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2016.05.090"},{"key":"ref332","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-22709-7_46"},{"key":"ref323","doi-asserted-by":"publisher","DOI":"10.1109\/UIC-ATC.2013.14"},{"key":"ref89","doi-asserted-by":"publisher","DOI":"10.4018\/ijisss.2015010102"},{"key":"ref322","doi-asserted-by":"publisher","DOI":"10.1109\/CBD.2015.28"},{"key":"ref325","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2013.49"},{"key":"ref324","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCSW.2014.39"},{"key":"ref327","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-21878-1_39"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.1109\/CCEM.2014.7015489"},{"key":"ref326","doi-asserted-by":"publisher","DOI":"10.1007\/s10796-013-9432-y"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-54420-0_11"},{"key":"ref329","doi-asserted-by":"publisher","DOI":"10.1109\/ICoCS.2014.7060961"},{"key":"ref87","doi-asserted-by":"publisher","DOI":"10.1109\/WETICE.2016.27"},{"key":"ref328","doi-asserted-by":"publisher","DOI":"10.1109\/ARES.2015.74"},{"key":"ref88","doi-asserted-by":"publisher","DOI":"10.5220\/0005804301380145"},{"key":"ref200","doi-asserted-by":"publisher","DOI":"10.1109\/NOMS.2016.7502967"},{"key":"ref101","doi-asserted-by":"publisher","DOI":"10.1504\/IJWGS.2015.067163"},{"key":"ref100","doi-asserted-by":"publisher","DOI":"10.1109\/ICCS.2010.5686693"},{"key":"ref209","doi-asserted-by":"publisher","DOI":"10.1109\/SOSE.2015.32"},{"key":"ref203","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-22885-3_21"},{"key":"ref204","doi-asserted-by":"publisher","DOI":"10.1109\/WETICE.2014.36"},{"key":"ref201","doi-asserted-by":"publisher","DOI":"10.1145\/2378975.2378981"},{"key":"ref202","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2014.6883417"},{"key":"ref207","doi-asserted-by":"publisher","DOI":"10.1109\/SCC.2009.84"},{"key":"ref208","doi-asserted-by":"publisher","DOI":"10.1109\/CloudCom.2012.6427508"},{"key":"ref205","first-page":"801","volume":"236","author":"rajavel","year":"2014","journal-title":"SLAOCMS A Layered Architecture of SLA Oriented Cloud Management System for Achieving Agreement During Resource Failure"},{"key":"ref206","doi-asserted-by":"publisher","DOI":"10.1109\/NCA.2014.48"},{"key":"ref211","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-16949-6_12"},{"key":"ref210","doi-asserted-by":"publisher","DOI":"10.1145\/2716319"},{"key":"ref212","first-page":"466","article-title":"Performance collection model with agent and server interface for cloud computing","author":"bin","year":"2012","journal-title":"Proc 7th Int Conf Comput Converg Technol (ICCCT)"},{"key":"ref213","first-page":"321","article-title":"QoS-aware clouds","author":"ferretti","year":"2010","journal-title":"Proc IEEE 3rd Int Conf Cloud Comput"},{"key":"ref214","first-page":"691","article-title":"Multi-dimensional resource allocation for data-intensive large-scale cloud applications","author":"jrad","year":"2014","journal-title":"Proc 4th Int Conf Cloud Comput Services Sci"},{"key":"ref215","doi-asserted-by":"publisher","DOI":"10.1109\/NOMS.2014.6838413"},{"key":"ref216","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-29740-3_13"},{"key":"ref217","doi-asserted-by":"publisher","DOI":"10.1109\/WAINA.2013.208"},{"key":"ref218","doi-asserted-by":"publisher","DOI":"10.1145\/2505515.2508196"},{"key":"ref219","doi-asserted-by":"publisher","DOI":"10.1145\/2567948.2567952"},{"key":"ref220","doi-asserted-by":"crossref","first-page":"83","DOI":"10.1007\/978-3-319-14609-6_6","article-title":"Energy-aware cloud management through progressive SLA specification","author":"lu?anin","year":"2014","journal-title":"Economics of Grids Clouds Systems and Services"},{"key":"ref222","doi-asserted-by":"publisher","DOI":"10.1504\/IJCSE.2015.067056"},{"key":"ref221","doi-asserted-by":"publisher","DOI":"10.1109\/ICCTIM.2015.7224588"},{"key":"ref229","doi-asserted-by":"publisher","DOI":"10.1504\/IJCNDS.2015.066001"},{"key":"ref228","doi-asserted-by":"publisher","DOI":"10.1109\/CloudCom.2013.165"},{"key":"ref227","doi-asserted-by":"publisher","DOI":"10.1109\/CCECE.2013.6567740"},{"key":"ref226","doi-asserted-by":"publisher","DOI":"10.1109\/HASE.2015.33"},{"key":"ref225","doi-asserted-by":"publisher","DOI":"10.1109\/CyberC.2011.32"},{"key":"ref224","doi-asserted-by":"publisher","DOI":"10.1109\/WAINA.2012.280"},{"key":"ref223","doi-asserted-by":"publisher","DOI":"10.1109\/CASoN.2012.6412401"},{"key":"ref127","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-45391-9_49"},{"key":"ref126","doi-asserted-by":"publisher","DOI":"10.1145\/2318716.2318720"},{"key":"ref125","doi-asserted-by":"publisher","DOI":"10.1002\/sec.1086"},{"key":"ref124","first-page":"87","article-title":"A methodology of assessing security risk of cloud computing in user perspective for security-service-level agreements","author":"na","year":"2014","journal-title":"proc of Int Conf on Innovative Computing Technology (INTECH)"},{"key":"ref129","doi-asserted-by":"publisher","DOI":"10.1109\/SCC.2015.40"},{"key":"ref128","doi-asserted-by":"publisher","DOI":"10.3233\/AIC-140626"},{"key":"ref130","first-page":"636","article-title":"Security in Service Level Agreements for Cloud computing","author":"bernsmed","year":"2011","journal-title":"Proc 1st Int Conf Cloud Comput Services Sci"},{"key":"ref133","doi-asserted-by":"publisher","DOI":"10.1109\/NCCA.2011.11"},{"key":"ref134","doi-asserted-by":"publisher","DOI":"10.1109\/ECOWS.2011.23"},{"key":"ref131","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-39200-9_34"},{"key":"ref132","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSACW.2010.70"},{"key":"ref232","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-34321-6_18"},{"key":"ref233","doi-asserted-by":"publisher","DOI":"10.1109\/MCC.2015.52"},{"key":"ref230","doi-asserted-by":"publisher","DOI":"10.1109\/ICDEW.2014.6818324"},{"key":"ref231","doi-asserted-by":"publisher","DOI":"10.1109\/UCC.2014.167"},{"key":"ref239","doi-asserted-by":"publisher","DOI":"10.1504\/IJIMS.2014.070695"},{"key":"ref238","doi-asserted-by":"publisher","DOI":"10.1109\/CLOUD.2012.11"},{"key":"ref235","first-page":"447","article-title":"Practical aspects for effective monitoring of SLAs in cloud computing and virtual platforms","author":"jehangiri","year":"2013","journal-title":"Proc 3rd Int Conf Cloud Comput Services Sci"},{"key":"ref234","doi-asserted-by":"publisher","DOI":"10.1109\/3PGCIC.2015.106"},{"key":"ref237","doi-asserted-by":"publisher","DOI":"10.1109\/SERVICES.2010.26"},{"key":"ref236","first-page":"4065","article-title":"Profit-driven cloud service request scheduling under SLA constraints","volume":"9","author":"liu","year":"2012","journal-title":"J Inf Comput Sci"},{"key":"ref136","first-page":"271","article-title":"A computing resource selection approach based on genetic algorithm for inter-cloud workload migration","volume":"1","author":"nodehi","year":"2014","journal-title":"Adv Transdiscipl Eng"},{"key":"ref135","doi-asserted-by":"publisher","DOI":"10.1007\/s10586-012-0232-9"},{"key":"ref138","doi-asserted-by":"publisher","DOI":"10.5220\/0005807801860193"},{"key":"ref137","doi-asserted-by":"publisher","DOI":"10.1007\/978-81-322-2012-1_35"},{"key":"ref139","doi-asserted-by":"publisher","DOI":"10.1109\/ICIN.2010.5640923"},{"key":"ref140","doi-asserted-by":"publisher","DOI":"10.1109\/ICMCS.2014.6911305"},{"key":"ref141","doi-asserted-by":"publisher","DOI":"10.14257\/ijseia.2015.9.7.17"},{"key":"ref142","doi-asserted-by":"publisher","DOI":"10.1109\/SCC.2015.68"},{"key":"ref143","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom.2012.84"},{"key":"ref2","author":"ashton","year":"2009","journal-title":"That &#x2018;Internet of Things&#x2019; Thing in the Real World Things Matter More Than Ideas"},{"key":"ref144","doi-asserted-by":"publisher","DOI":"10.5220\/0005451805210528"},{"key":"ref1","author":"sosinsky","year":"2011","journal-title":"Cloud Computing Bible"},{"key":"ref145","doi-asserted-by":"publisher","DOI":"10.1109\/CTS.2014.6867617"},{"key":"ref241","doi-asserted-by":"publisher","DOI":"10.4018\/IJGHPC.2015100101"},{"key":"ref242","doi-asserted-by":"publisher","DOI":"10.1109\/IC2E.2015.63"},{"key":"ref243","doi-asserted-by":"publisher","DOI":"10.1109\/ICOIN.2016.7427071"},{"key":"ref244","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-17694-4_3"},{"key":"ref240","first-page":"533","article-title":"Negotiating and brokering cloud resources based on security level agreements","author":"luna","year":"2013","journal-title":"Proc 3rd Int Conf Cloud Comput Services Sci"},{"key":"ref248","doi-asserted-by":"publisher","DOI":"10.1109\/CLOUD.2009.56"},{"key":"ref247","doi-asserted-by":"publisher","DOI":"10.1109\/BigData.2013.6691769"},{"key":"ref246","doi-asserted-by":"publisher","DOI":"10.1109\/ICIST.2015.7288964"},{"key":"ref245","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-23400-2_42"},{"key":"ref249","doi-asserted-by":"publisher","DOI":"10.1145\/2536146.2536153"},{"key":"ref109","doi-asserted-by":"publisher","DOI":"10.1109\/SCC.2011.71"},{"key":"ref108","doi-asserted-by":"publisher","DOI":"10.14257\/ijgdc.2015.8.5.02"},{"key":"ref107","doi-asserted-by":"publisher","DOI":"10.1109\/CCEM.2014.7015497"},{"key":"ref106","doi-asserted-by":"publisher","DOI":"10.1109\/NBiS.2010.67"},{"key":"ref105","doi-asserted-by":"publisher","DOI":"10.1109\/ICMCS.2012.6320195"},{"key":"ref104","doi-asserted-by":"publisher","DOI":"10.1109\/CloudCom.2012.6427532"},{"key":"ref103","doi-asserted-by":"publisher","DOI":"10.1109\/SCC.2014.69"},{"key":"ref102","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2014.12.003"},{"key":"ref111","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-14224-1_1"},{"key":"ref112","first-page":"103","article-title":"A vendor perspective on issues with security, governance and risk for Cloud Computing","author":"maher","year":"2013","journal-title":"Proceedings of BLED"},{"key":"ref110","doi-asserted-by":"publisher","DOI":"10.1109\/ICIW.2010.91"},{"key":"ref250","doi-asserted-by":"publisher","DOI":"10.1109\/SITA.2015.7358406"},{"key":"ref251","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-28675-9_7"},{"key":"ref254","doi-asserted-by":"publisher","DOI":"10.1109\/SOCA.2011.6166239"},{"key":"ref255","doi-asserted-by":"publisher","DOI":"10.1186\/s13673-015-0031-4"},{"key":"ref252","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSACW.2012.65"},{"key":"ref253","doi-asserted-by":"publisher","DOI":"10.1109\/DCABES.2013.32"},{"key":"ref257","first-page":"440","article-title":"Service level agreement(SLA) based SaaS cloud management system","author":"wu","year":"2016","journal-title":"Proc IEEE 21st Int Conf Parallel Distrib Syst (ICPADS)"},{"key":"ref256","doi-asserted-by":"publisher","DOI":"10.1109\/ISTEL.2012.6483055"},{"key":"ref259","doi-asserted-by":"publisher","DOI":"10.1109\/SCC.2015.74"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2682499"},{"key":"ref258","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2011.05.023"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2016.2647499"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2016.2517298"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2016.2549047"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2016.2529723"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2015.2497312"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2704444"},{"key":"ref118","doi-asserted-by":"publisher","DOI":"10.1145\/2462326.2462336"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2666839"},{"key":"ref117","doi-asserted-by":"publisher","DOI":"10.1109\/SACI.2016.7507405"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/FiCloudW.2017.70"},{"key":"ref19","first-page":"68","article-title":"Systematic mapping studies in software engineering","author":"petersen","year":"2008","journal-title":"Proc Int Conf Eval Assessment Softw Eng (EASE)"},{"key":"ref119","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2015.2499749"},{"key":"ref114","first-page":"76","article-title":"SLA based service brokering in intercloud environments","author":"jrad","year":"2012","journal-title":"Proc 2nd Int Conf Cloud Comput Services Sci"},{"key":"ref113","doi-asserted-by":"publisher","DOI":"10.1109\/SYNASC.2015.59"},{"key":"ref116","doi-asserted-by":"publisher","DOI":"10.1093\/comjnl\/bxv053"},{"key":"ref115","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-15681-6_4"},{"key":"ref120","doi-asserted-by":"publisher","DOI":"10.1080\/17517575.2013.830342"},{"key":"ref121","doi-asserted-by":"publisher","DOI":"10.1109\/ICSSI.2013.48"},{"key":"ref122","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-20898-0_23"},{"key":"ref123","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-17199-9_2"},{"key":"ref260","doi-asserted-by":"publisher","DOI":"10.1093\/comjnl\/bxu129"},{"key":"ref261","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-48616-0_9"},{"key":"ref262","doi-asserted-by":"publisher","DOI":"10.1109\/SITIS.2014.30"},{"key":"ref263","doi-asserted-by":"publisher","DOI":"10.1109\/ISCOS.2012.30"},{"key":"ref264","doi-asserted-by":"publisher","DOI":"10.1109\/DSDIS.2015.104"},{"key":"ref265","doi-asserted-by":"publisher","DOI":"10.1109\/ICSESS.2014.6933614"},{"key":"ref266","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2013.5"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/8274985\/08016558.pdf?arnumber=8016558","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,10,11]],"date-time":"2021-10-11T03:00:25Z","timestamp":1633921225000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8016558\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"references-count":363,"URL":"https:\/\/doi.org\/10.1109\/access.2017.2744677","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018]]}}}