{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T00:37:10Z","timestamp":1730248630940,"version":"3.28.0"},"reference-count":31,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,12]]},"DOI":"10.1109\/icitst.2013.6750199","type":"proceedings-article","created":{"date-parts":[[2014,3,27]],"date-time":"2014-03-27T11:20:46Z","timestamp":1395919246000},"page":"244-251","source":"Crossref","is-referenced-by-count":10,"title":["Broker-based Cross-Cloud Federation Manager"],"prefix":"10.1109","author":[{"given":"Jacques Bou","family":"Abdo","sequence":"first","affiliation":[]},{"given":"Jacques","family":"Demerjian","sequence":"additional","affiliation":[]},{"given":"Hakima","family":"Chaouchi","sequence":"additional","affiliation":[]},{"given":"Kabalan","family":"Barbar","sequence":"additional","affiliation":[]},{"given":"Guy","family":"Pujolle","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1145\/776322.776346"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.4304\/jcm.3.7.44-51"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2005.07.011"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1145\/775240.775242"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2009.45"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/CISIS.2012.161"},{"key":"14","first-page":"383","article-title":"Research of peer discovery method in peer-to-peer network","volume":"1","author":"li","year":"2002","journal-title":"IEEE Region 10 Conference on Computers Communications Control and Power Engineering (TENCON'02)"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/EDOC.2012.28"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/ICET.2012.6375445"},{"key":"21","article-title":"The nIST definition of cloud computing","author":"mell","year":"2011","journal-title":"National Institute of Standards and Technology Special Publication 800-145"},{"key":"20","article-title":"Advanced peer to peer discovery and interaction framework","author":"tugnawat","year":"2003","journal-title":"18th Annual ACM SIGPLAN Conference on Object-Oriented Programming"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1109\/CLOUD.2009.5071529"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1109\/DASC.2009.139"},{"key":"24","volume":"87","author":"buyya","year":"0","journal-title":"Cloud Computing Principles and Paradigms Wiley"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2009.119"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2012.76"},{"journal-title":"UDDI Version 2 04 API Specification","year":"2002","key":"27"},{"key":"28","doi-asserted-by":"publisher","DOI":"10.1109\/MISE.2012.6226014"},{"key":"29","doi-asserted-by":"publisher","DOI":"10.1109\/APSCC.2012.75"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/3PGCIC.2010.40"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jcss.2011.12.017"},{"year":"0","key":"10"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/AFIN.2010.23"},{"key":"30","first-page":"53","article-title":"Trust-aware federated idM in consumer cloud computing","author":"guerrero","year":"2012","journal-title":"Proc IEEE Int Conf Consumer Electronics (ICCE)"},{"key":"7","article-title":"The evolution of the cloud computing market","author":"bittman","year":"2008","journal-title":"Gartner Blog Network"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/CLOUD.2010.46"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/NUiConE.2011.6153227"},{"key":"31","article-title":"Security and high availability in cloud computing environments","author":"guerrero","year":"0","journal-title":"IBM White Paper"},{"key":"4","first-page":"891","article-title":"Single-Sign-On (SSO) across open cloud computing federation","author":"meniya","year":"0","journal-title":"International Journal of Engineering Research and Applications (IJERA)"},{"key":"9","first-page":"79","article-title":"Evaluating a distributed identity provider trusted network with delegated authentications for cloud federation","author":"celesti","year":"2011","journal-title":"The Second International Conference on Cloud Computing GRIDs and Virtualization"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/ICASID.2012.6325350"}],"event":{"name":"2013 8th International Conference for Internet Technology and Secured Transactions (ICITST)","start":{"date-parts":[[2013,12,9]]},"location":"London, United Kingdom","end":{"date-parts":[[2013,12,12]]}},"container-title":["8th International Conference for Internet Technology and Secured Transactions (ICITST-2013)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6745432\/6750143\/06750199.pdf?arnumber=6750199","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,23]],"date-time":"2017-03-23T18:47:59Z","timestamp":1490294879000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6750199\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,12]]},"references-count":31,"URL":"https:\/\/doi.org\/10.1109\/icitst.2013.6750199","relation":{},"subject":[],"published":{"date-parts":[[2013,12]]}}}