{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,13]],"date-time":"2025-11-13T07:02:52Z","timestamp":1763017372420,"version":"3.28.0"},"reference-count":38,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,12]]},"DOI":"10.1109\/wsc.2013.6721436","type":"proceedings-article","created":{"date-parts":[[2014,1,31]],"date-time":"2014-01-31T17:35:58Z","timestamp":1391189758000},"page":"389-400","source":"Crossref","is-referenced-by-count":46,"title":["Modeling and simulation as a cloud service: A survey"],"prefix":"10.1109","author":[{"given":"Erdal","family":"Cayirci","sequence":"first","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1111\/j.1539-6924.1981.tb01350.x"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1109\/SCC.2009.84"},{"key":"35","first-page":"65","article-title":"An implementation approach for inter-cloud service combination","volume":"5","author":"tao","year":"2012","journal-title":"International Journal On Advances in Software"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1109\/ISTMWC.2007.4299297"},{"key":"36","doi-asserted-by":"publisher","DOI":"10.1002\/9781118180310"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/CLOUD.2009.60"},{"key":"33","doi-asserted-by":"publisher","DOI":"10.1145\/2248371.2248394"},{"key":"16","article-title":"Evaluating the applicability of cloud computing enterprises in support of next generation of modelling and simulation architectures","author":"johnson","year":"2013","journal-title":"Spring Simulation Multi-Conference"},{"key":"34","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2010.07.006"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1145\/1921641.1921646"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1145\/1810931.1810937"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1111\/j.1539-6924.2010.01401.x"},{"key":"37","doi-asserted-by":"publisher","DOI":"10.1109\/HPCC.2011.44"},{"key":"12","article-title":"Security in multitenancy","author":"jasti","year":"2010","journal-title":"IEEE International Carnahan Conference on Security Technology"},{"key":"38","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2008.84"},{"key":"21","article-title":"Virtualization security for cloud computing services","author":"lin","year":"2011","journal-title":"IEEE International Conference on Cloud and Service Computing"},{"key":"20","article-title":"Toward authorization as a service: A study of the XACML standard","author":"laborde","year":"2013","journal-title":"Spring Simulation Multi-Conference"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.5465\/AMR.1995.9508080335"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1177\/089443930101900104"},{"key":"24","article-title":"Privacy, security and trust in cloud computing","author":"pearson","year":"2012","journal-title":"Privacy and Security for Cloud Computting"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.5121\/ijccsa.2012.2201"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1109\/WSC.2012.6465196"},{"key":"27","doi-asserted-by":"publisher","DOI":"10.5465\/AMR.1998.926617"},{"key":"28","article-title":"Trustcloud: A framework for accountability and trust in cloud computing","author":"ryan","year":"2011","journal-title":"2nd IEEE Cloud Fo-rum for Practitioners (ICFP)"},{"key":"29","article-title":"Security problems of platform as a service","author":"sandikkaya","year":"2012","journal-title":"Proc of the 22nd Int Symp on Reliable Distributed Systems"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/TCOM.1964.1088883"},{"key":"2","first-page":"146","author":"badger","year":"2012","journal-title":"Draft Cloud Computing Synopsis and Recom-mendations"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/WSC.2007.4419682"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1145\/1721654.1721672"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/WSC.2013.6721521"},{"key":"30","doi-asserted-by":"publisher","DOI":"10.1109\/MPRV.2009.82"},{"key":"6","article-title":"Intercloud for simulation federations","author":"cayirci","year":"2011","journal-title":"The Second International Workshop on Cloud Computing Interoperability and Services (Intercloud 2011)"},{"key":"5","doi-asserted-by":"crossref","DOI":"10.1002\/9780470498620","author":"cayirci","year":"2009","journal-title":"Computer Assisted Exercises and Training A Reference Guide"},{"key":"32","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2013.46"},{"key":"4","doi-asserted-by":"crossref","first-page":"13","DOI":"10.1007\/978-3-642-13119-6_2","article-title":"Intercloud: Utility-oriented federation of cloud computing environments for scaling of application services","author":"buyya","year":"2010","journal-title":"Proceedings of the 10th International Conference on Algorithms and Architectures for Parallel Processing (ICA3PP'10)"},{"key":"31","doi-asserted-by":"publisher","DOI":"10.1145\/1738826.1738846"},{"journal-title":"Top Threats to Cloud Computing","year":"2010","key":"9"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1177\/0037549713501574"}],"event":{"name":"2013 Winter Simulation Conference - (WSC 2013)","start":{"date-parts":[[2013,12,8]]},"location":"Washington, DC, USA","end":{"date-parts":[[2013,12,11]]}},"container-title":["2013 Winter Simulations Conference (WSC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6709837\/6721384\/06721436.pdf?arnumber=6721436","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,7,10]],"date-time":"2023-07-10T01:21:31Z","timestamp":1688952091000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6721436\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,12]]},"references-count":38,"URL":"https:\/\/doi.org\/10.1109\/wsc.2013.6721436","relation":{},"subject":[],"published":{"date-parts":[[2013,12]]}}}