{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,8]],"date-time":"2026-01-08T21:41:51Z","timestamp":1767908511280,"version":"3.49.0"},"reference-count":30,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"1","license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Serv. Comput."],"published-print":{"date-parts":[[2020,1,1]]},"DOI":"10.1109\/tsc.2017.2657505","type":"journal-article","created":{"date-parts":[[2017,1,24]],"date-time":"2017-01-24T19:19:55Z","timestamp":1485285595000},"page":"30-43","source":"Crossref","is-referenced-by-count":34,"title":["A Semi-Automatic and Trustworthy Scheme for Continuous Cloud Service Certification"],"prefix":"10.1109","volume":"13","author":[{"given":"Marco","family":"Anisetti","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7426-4795","authenticated-orcid":false,"given":"Claudio Agostino","family":"Ardagna","sequence":"additional","affiliation":[]},{"given":"Ernesto","family":"Damiani","sequence":"additional","affiliation":[]},{"given":"Filippo","family":"Gaudenzi","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1007\/s12599-011-0155-7"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ICWS.2012.53"},{"key":"ref11","article-title":"CCRA supporting document 2004&#x2013;02-009 assurance continuity","author":"criteria","year":"2004"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/2408776.2408789"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/MCC.2015.34"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-26148-5_44"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/CLOUD.2016.0120"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/UIC-ATC-ScalCom-CBDCom-IoP.2015.268"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/SERVICES.2011.91"},{"key":"ref18","doi-asserted-by":"crossref","first-page":"20","DOI":"10.1109\/MITP.2010.128","article-title":"Establishing trust in cloud computing","volume":"12","author":"malluhi","year":"2010","journal-title":"IT Prof"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/MCC.2016.108"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/TC.1986.1676819"},{"key":"ref4","article-title":"Trusted cloud","year":"2016"},{"key":"ref27","year":"2015","journal-title":"ISO\/IEC 27001-Information Security Management ISO\/IEC"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/2460383.2460384"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1080\/09537280903441922"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/2851613.2851628"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1201\/9781420031423"},{"key":"ref8","article-title":"Incremental certification of cloud services","author":"krotsiani","year":"2013","journal-title":"7th Int Conf Emerging Secur Inf Syst Technol"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ICCAC.2014.8"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/ARES.2013.55"},{"key":"ref9","article-title":"Cloud security alliance (CSA)","year":"2016"},{"key":"ref1","article-title":"Trust is good, control is better: Creating secure clouds by continuous auditing","volume":"pp","author":"lins","year":"2016","journal-title":"IEEE Trans Cloud Comput"},{"key":"ref20","article-title":"Towards trustworthy multi-cloud services communities: A trust-based hedonic coalitional game","volume":"pp","author":"wahab","year":"2016","journal-title":"IEEE Trans Services Comput"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/ICSTW.2010.66"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/SERE.2014.26"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-72912-9_8"},{"key":"ref23","article-title":"Cloud-trust&#x2014;a security assessment model for infrastructure as a service (IaaS) clouds","volume":"pp","author":"gonzales","year":"2015","journal-title":"IEEE Trans Cloud Comput"},{"key":"ref26","year":"2015","journal-title":"U S Department of Health & Human Services Health insurance portability and accountability act"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/SCC.2015.104"}],"container-title":["IEEE Transactions on Services Computing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/4629386\/8984641\/07831357.pdf?arnumber=7831357","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,4,27]],"date-time":"2022-04-27T17:12:36Z","timestamp":1651079556000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/7831357\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,1,1]]},"references-count":30,"journal-issue":{"issue":"1"},"URL":"https:\/\/doi.org\/10.1109\/tsc.2017.2657505","relation":{},"ISSN":["1939-1374","2372-0204"],"issn-type":[{"value":"1939-1374","type":"electronic"},{"value":"2372-0204","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,1,1]]}}}