{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T13:29:53Z","timestamp":1730294993336,"version":"3.28.0"},"reference-count":25,"publisher":"IEEE","license":[{"start":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T00:00:00Z","timestamp":1559347200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T00:00:00Z","timestamp":1559347200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T00:00:00Z","timestamp":1559347200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,6]]},"DOI":"10.1109\/sds.2019.8768726","type":"proceedings-article","created":{"date-parts":[[2019,7,25]],"date-time":"2019-07-25T19:53:52Z","timestamp":1564084432000},"page":"179-185","source":"Crossref","is-referenced-by-count":2,"title":["Fuzzy-GRA Trust Model for Cloud Risk Management"],"prefix":"10.1109","author":[{"given":"Abdul","family":"Razaque","sequence":"first","affiliation":[]},{"given":"Muder","family":"Almiani","sequence":"additional","affiliation":[]},{"given":"Meer Jaro","family":"Khan","sequence":"additional","affiliation":[]},{"given":"Basel","family":"Magableh","sequence":"additional","affiliation":[]},{"given":"Ayman","family":"Al-Dmour","sequence":"additional","affiliation":[]},{"given":"Amer","family":"Al-Rahayfeh","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.proeng.2011.08.537"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1504\/IJCNDS.2012.047897"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-10-1841-1"},{"key":"ref13","doi-asserted-by":"crossref","first-page":"140","DOI":"10.1016\/j.neunet.2015.03.013","article-title":"Incremental learning for V-support vector regression","volume":"67","author":"bin","year":"2015","journal-title":"Neural Netw"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/SCC.2011.114"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/2245276.2232111"},{"key":"ref16","doi-asserted-by":"crossref","first-page":"141","DOI":"10.1613\/jair.2934","article-title":"From frequency to meaning: Vector space models of semantics","volume":"37","author":"pantel","year":"2010","journal-title":"J Artif Intell Res"},{"year":"2013","key":"ref17"},{"key":"ref18","article-title":"Self-Hosting vs. Cloud Hosting: Accounting for the Security Impact of Hosting in the Cloud","author":"molnar","year":"2010","journal-title":"WEIS"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2016.05.037"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-015-1573-y"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/HPCC-CSS-ICESS.2015.277"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.4018\/jwsr.2012070102"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/SDS.2018.8370438"},{"journal-title":"Modeling and Validation of Biased Human Trust","year":"2011","author":"hoogendoom","key":"ref8"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/2697389"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/LISAT.2016.7494149"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-20344-2_5"},{"key":"ref1","article-title":"Privacy preserving model: a new scheme for auditing cloud stakeholders","volume":"6","author":"razaque","year":"2017","journal-title":"Journal of cloud computing"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2018.05.044"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1016\/j.neunet.2018.08.005"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2019.03.004"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.12733\/jics20102112"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/1120717.1120721"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2012.26"}],"event":{"name":"2019 Sixth International Conference on Software Defined Systems (SDS)","start":{"date-parts":[[2019,6,10]]},"location":"Rome, Italy","end":{"date-parts":[[2019,6,13]]}},"container-title":["2019 Sixth International Conference on Software Defined Systems (SDS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8764267\/8768486\/08768726.pdf?arnumber=8768726","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,18]],"date-time":"2022-07-18T11:20:46Z","timestamp":1658143246000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8768726\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,6]]},"references-count":25,"URL":"https:\/\/doi.org\/10.1109\/sds.2019.8768726","relation":{},"subject":[],"published":{"date-parts":[[2019,6]]}}}