{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T15:24:41Z","timestamp":1730215481575,"version":"3.28.0"},"reference-count":20,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,6,29]],"date-time":"2023-06-29T00:00:00Z","timestamp":1687996800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,6,29]],"date-time":"2023-06-29T00:00:00Z","timestamp":1687996800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,6,29]]},"DOI":"10.1109\/ecai58194.2023.10194163","type":"proceedings-article","created":{"date-parts":[[2023,8,2]],"date-time":"2023-08-02T13:33:22Z","timestamp":1690983202000},"page":"1-5","source":"Crossref","is-referenced-by-count":0,"title":["Security Considerations at the Service Level Agreement in Cloud Computing Services"],"prefix":"10.1109","author":[{"given":"Malin","family":"Stefan","sequence":"first","affiliation":[{"name":"Polytechnic University of Bucharest,SD-ETTI,Bucharest,Romania"}]},{"given":"Mandita","family":"Dragos","sequence":"additional","affiliation":[{"name":"Polytechnic University of Bucharest,SD-ETTI,Bucharest,Romania"}]},{"given":"Chirana","family":"Paul","sequence":"additional","affiliation":[{"name":"Polytechnic University of Bucharest,SD-ETTI,Bucharest,Romania"}]},{"given":"Babarada","family":"Florin","sequence":"additional","affiliation":[{"name":"Polytechnic University of Bucharest,DCAE-ETTI,Bucharest,Romania"}]}],"member":"263","reference":[{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ECAI.2018.8679086"},{"key":"ref12","article-title":"The Analyzes of Anticancer Drug Sensitivity of Lung Cancer Cell Lines by Using Machine Learning Clustering Techniques","volume":"8","author":"wanigasooriya","year":"2017","journal-title":"International Journal of Advanced Computer Science and Applications (IJACSA)"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ICACCI.2017.8125881"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/GIOTS.2017.8016213"},{"journal-title":"Analysis of cloud best practices and pilots for the public sector","year":"2013","author":"bonneau","key":"ref20"},{"journal-title":"*** Eurostat","year":"2017","key":"ref11"},{"key":"ref10","first-page":"27","article-title":"Internet of Things and Cloud Computing for Agriculture in India","volume":"2","author":"bidua","year":"2015","journal-title":"International Journal of Innovative and Emerging Research in Engineering"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/ECAI46879.2019.9042030"},{"key":"ref1","first-page":"457","article-title":"Quantitative reasoning about cloud security using service level agreements. IEEE Transactions on Cloud Computing","volume":"5","author":"luna","year":"2017","journal-title":"*** (SQuaRE)-System and software quality models BS ISO\/IEC 25010 2011"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.24846\/v27i3y201811"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-70688-7_7"},{"key":"ref19","article-title":"A Study on Service Level Agreement Management Techniques in Cloud","volume":"5","author":"chandana","year":"2017","journal-title":"International Journal"},{"key":"ref18","first-page":"122","article-title":"Policy Based Context Aware Service Level Agreement (SLA) Management in the Cloud","author":"chraibi","year":"0","journal-title":"CLOUD COMPUTING 2017 The 8th International Conference on Cloud Computing GRIDs and Virtualization"},{"key":"ref8","article-title":"Energy efficient trust-based security mechanism for wireless sensors and unmanned aerial vehicles","author":"vladuta","year":"0","journal-title":"ECAI 2019 - International Conference"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ECAI.2018.8678949"},{"key":"ref9","first-page":"1","article-title":"Impact of Different Data Types on Classifier Performance of Random Forest, Naive Bayes, and k-Nearest Neighbors Algorithms","volume":"8","author":"singh","year":"2017","journal-title":"International Journal of Advanced Computer Science and Applications (IJACSA)"},{"key":"ref4","first-page":"67","article-title":"Factorul uman vs. securitatea cibernetica","volume":"28","author":"vevera","year":"2018","journal-title":"Romanian Journal of Information Technology and Automatic Control-Revista Romana de Informatica si Automatica"},{"key":"ref3","first-page":"31","volume":"29","year":"2019","journal-title":"Romanian Journal of Information Technology and Automatic Control"},{"journal-title":"Service Level Agreement Complexity Processing Concerns for Standalone and Aggregate SLAs Department of Electrical and computer Engineering","year":"2014","author":"lamb","key":"ref6"},{"journal-title":"Analysis of cloud best practices and pilots for the public sector","year":"2013","author":"bonneau","key":"ref5"}],"event":{"name":"2023 15th International Conference on Electronics, Computers and Artificial Intelligence (ECAI)","start":{"date-parts":[[2023,6,29]]},"location":"Bucharest, Romania","end":{"date-parts":[[2023,6,30]]}},"container-title":["2023 15th International Conference on Electronics, Computers and Artificial Intelligence (ECAI)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10193876\/10193857\/10194163.pdf?arnumber=10194163","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,8,21]],"date-time":"2023-08-21T13:42:52Z","timestamp":1692625372000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10194163\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,6,29]]},"references-count":20,"URL":"https:\/\/doi.org\/10.1109\/ecai58194.2023.10194163","relation":{},"subject":[],"published":{"date-parts":[[2023,6,29]]}}}