{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,16]],"date-time":"2026-03-16T17:48:09Z","timestamp":1773683289194,"version":"3.50.1"},"reference-count":87,"publisher":"Association for Computing Machinery (ACM)","issue":"2","license":[{"start":{"date-parts":[[2013,7,23]],"date-time":"2013-07-23T00:00:00Z","timestamp":1374537600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["SIGOPS Oper. Syst. Rev."],"published-print":{"date-parts":[[2013,7,23]]},"abstract":"<jats:p>As cloud-based services gain popularity in both private and enterprise domains, cloud consumers are still lacking in tools to verify that these services work as expected. Such tools should consider properties such as functional correctness, service availability, reliability, performance and security guarantees. In this paper we survey existing work in these areas and identify gaps in existing cloud technology in terms of the verification tools provided to users. We also discuss challenges and new research directions that can help bridge these gaps.<\/jats:p>","DOI":"10.1145\/2506164.2506167","type":"journal-article","created":{"date-parts":[[2013,7,25]],"date-time":"2013-07-25T19:12:41Z","timestamp":1374779561000},"page":"6-19","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":49,"title":["Verifying cloud services"],"prefix":"10.1145","volume":"47","author":[{"given":"Sara","family":"Bouchenak","sequence":"first","affiliation":[{"name":"University of Grenoble -- LIG, Grenoble, France"}]},{"given":"Gregory","family":"Chockler","sequence":"additional","affiliation":[{"name":"IBM Research and Royal Holloway, University of London"}]},{"given":"Hana","family":"Chockler","sequence":"additional","affiliation":[{"name":"IBM Research, Haifa, Israel"}]},{"given":"Gabriela","family":"Gheorghe","sequence":"additional","affiliation":[{"name":"SnT, University of Luxembourg"}]},{"given":"Nuno","family":"Santos","sequence":"additional","affiliation":[{"name":"MPI-SWS, Germany"}]},{"given":"Alexander","family":"Shraer","sequence":"additional","affiliation":[{"name":"Google, Mountain View, CA"}]}],"member":"320","published-online":{"date-parts":[[2013,7,23]]},"reference":[{"key":"e_1_2_1_1_1","volume-title":"http:\/\/www.w3.org\/TR\/wsdl","author":"Description Web Services","year":"2001","unstructured":"Web Services Description Language (WSDL) 1.1. http:\/\/www.w3.org\/TR\/wsdl , 2001 . Web Services Description Language (WSDL) 1.1. http:\/\/www.w3.org\/TR\/wsdl, 2001."},{"key":"e_1_2_1_2_1","volume-title":"Messaging Framework","author":"SOAP","year":"2007","unstructured":"SOAP Version 1.2 Part 1 : Messaging Framework ( Second Edition). http:\/\/www.w3.org\/TR\/soap12-part1, 2007 . SOAP Version 1.2 Part 1: Messaging Framework (Second Edition). http:\/\/www.w3.org\/TR\/soap12-part1, 2007."},{"key":"e_1_2_1_3_1","volume-title":"https:\/\/aws.amazon.com\/ec2-sla\/","author":"Amazon","year":"2012","unstructured":"Amazon EC2 SLA. https:\/\/aws.amazon.com\/ec2-sla\/ , 2012 . Amazon EC2 SLA. https:\/\/aws.amazon.com\/ec2-sla\/, 2012."},{"key":"e_1_2_1_4_1","volume-title":"https:\/\/aws.amazon.com\/simpledb\/","author":"Amazon","year":"2012","unstructured":"Amazon S3 SLA. https:\/\/aws.amazon.com\/simpledb\/ , 2012 . Amazon S3 SLA. https:\/\/aws.amazon.com\/simpledb\/, 2012."},{"key":"e_1_2_1_5_1","volume-title":"http:\/\/www.rackspace.com\/cloud\/legal\/sla\/","author":"Rackspace","year":"2012","unstructured":"Rackspace SLA. http:\/\/www.rackspace.com\/cloud\/legal\/sla\/ , 2012 . Rackspace SLA. http:\/\/www.rackspace.com\/cloud\/legal\/sla\/, 2012."},{"key":"e_1_2_1_6_1","volume-title":"https:\/\/www.microsoft.com\/download\/en\/details.aspx?displaylang=en\\&id=24434","author":"Windows Azure","year":"2012","unstructured":"Windows Azure Compute SLA. https:\/\/www.microsoft.com\/download\/en\/details.aspx?displaylang=en\\&id=24434 , 2012 . Windows Azure Compute SLA. https:\/\/www.microsoft.com\/download\/en\/details.aspx?displaylang=en\\&id=24434, 2012."},{"key":"e_1_2_1_7_1","volume-title":"https:\/\/www.microsoft.com\/windowsazure\/features\/storage\/","author":"Windows Azure","year":"2012","unstructured":"Windows Azure Storage SLA. https:\/\/www.microsoft.com\/windowsazure\/features\/storage\/ , 2012 . Windows Azure Storage SLA. https:\/\/www.microsoft.com\/windowsazure\/features\/storage\/, 2012."},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/IPDPSW.2012.128"},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.5555\/795665.796499"},{"key":"e_1_2_1_10_1","unstructured":"American Express may have failed to encrypt data. http:\/\/www.scmagazine.com\/american-express-may-have-failed-to-encrypt-data\/article\/170997\/.  American Express may have failed to encrypt data. http:\/\/www.scmagazine.com\/american-express-may-have-failed-to-encrypt-data\/article\/170997\/."},{"key":"e_1_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.5555\/1924908.1924919"},{"key":"e_1_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/1315245.1315318"},{"key":"e_1_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.5555\/2354410.2355148"},{"key":"e_1_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/2331576.2331586"},{"key":"e_1_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/1966445.1966449"},{"key":"e_1_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/2414456.2414505"},{"key":"e_1_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653686"},{"key":"e_1_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/1655008.1655015"},{"key":"e_1_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046766"},{"key":"e_1_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382226"},{"key":"e_1_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-01957-9_24"},{"key":"e_1_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1137\/090751062"},{"key":"e_1_2_1_23_1","doi-asserted-by":"crossref","unstructured":"C. Cachin and M. Schunter. A Cloud You Can Trust. http:\/\/spectrum.ieee.org\/computing\/networks\/ a-cloud-you-can-trust 2011.  C. Cachin and M. Schunter. A Cloud You Can Trust. http:\/\/spectrum.ieee.org\/computing\/networks\/ a-cloud-you-can-trust 2011.","DOI":"10.1109\/MSPEC.2011.6085778"},{"key":"e_1_2_1_24_1","first-page":"209","volume-title":"Proceedings of the 8th USENIX conference on Operating systems design and implementation, OSDI'08","author":"Cadar C.","year":"2008","unstructured":"C. Cadar , D. Dunbar , and D. Engler . Klee: unassisted and automatic generation of high-coverage tests for complex systems programs . In Proceedings of the 8th USENIX conference on Operating systems design and implementation, OSDI'08 , pages 209 -- 224 , Berkeley, CA, USA , 2008 . USENIX Association. C. Cadar, D. Dunbar, and D. Engler. Klee: unassisted and automatic generation of high-coverage tests for complex systems programs. In Proceedings of the 8th USENIX conference on Operating systems design and implementation, OSDI'08, pages 209--224, Berkeley, CA, USA, 2008. USENIX Association."},{"key":"e_1_2_1_25_1","unstructured":"R. Cellan-Jones. The Sidekick Cloud Disaster. http:\/\/www.bbc.co.uk\/blogs\/technology\/2009\/10\/the_sidekick_cloud_disaster.html 2009.  R. Cellan-Jones. The Sidekick Cloud Disaster. http:\/\/www.bbc.co.uk\/blogs\/technology\/2009\/10\/the_sidekick_cloud_disaster.html 2009."},{"key":"e_1_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/CCGrid.2012.116"},{"key":"e_1_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/1950365.1950396"},{"key":"e_1_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/2110356.2110358"},{"key":"e_1_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.tcs.2004.08.004"},{"key":"e_1_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/2307636.2307650"},{"key":"e_1_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/1323293.1294280"},{"key":"e_1_2_1_32_1","volume-title":"https:\/\/cloudsecurityalliance.org\/star\/","author":"Alliance Cloud Security","year":"2011","unstructured":"Cloud Security Alliance . CSA - Security , Trust, and Assurance Registry . https:\/\/cloudsecurityalliance.org\/star\/ , 2011 . Cloud Security Alliance. CSA - Security, Trust, and Assurance Registry. https:\/\/cloudsecurityalliance.org\/star\/, 2011."},{"key":"e_1_2_1_33_1","unstructured":"CNN Money. Amazon EC2 outage downs Reddit Quora. http:\/\/money.cnn.com\/2011\/04\/21\/technology\/amazon_server_outage\/index.htm 2011.  CNN Money. Amazon EC2 outage downs Reddit Quora. http:\/\/money.cnn.com\/2011\/04\/21\/technology\/amazon_server_outage\/index.htm 2011."},{"key":"e_1_2_1_34_1","volume-title":"PCI Data Security Standard, v2. https:\/\/www.pcisecuritystandards.org\/security_standards\/documents.php?document=pci_dss_v2-0#pci_dss_v2-0","author":"P. S. S. Council","year":"2010","unstructured":"P. S. S. Council . PCI Data Security Standard, v2. https:\/\/www.pcisecuritystandards.org\/security_standards\/documents.php?document=pci_dss_v2-0#pci_dss_v2-0 , 2010 . P. S. S. Council. PCI Data Security Standard, v2. https:\/\/www.pcisecuritystandards.org\/security_standards\/documents.php?document=pci_dss_v2-0#pci_dss_v2-0, 2010."},{"key":"e_1_2_1_35_1","unstructured":"R. DeVries. RichardDeVries's Journal: How Google handles a bug report. http:\/\/slashdot.org\/~RichardDeVries\/journal\/225229 2009.  R. DeVries. RichardDeVries's Journal: How Google handles a bug report. http:\/\/slashdot.org\/~RichardDeVries\/journal\/225229 2009."},{"key":"e_1_2_1_36_1","volume-title":"OSDI","author":"Feldman A.","year":"2010","unstructured":"A. Feldman , W. Zeller , M. Freedman , and E. Felten . Sporc: Group collaboration using untrusted cloud resources . OSDI , Oct , 2010 . A. Feldman, W. Zeller, M. Freedman, and E. Felten. Sporc: Group collaboration using untrusted cloud resources. OSDI, Oct, 2010."},{"key":"e_1_2_1_37_1","volume-title":"Yesterday's Authentication Bug. https:\/\/blog.dropbox.com\/?p=821","author":"Ferdowsi A.","year":"2011","unstructured":"A. Ferdowsi . The Dropbox blog : Yesterday's Authentication Bug. https:\/\/blog.dropbox.com\/?p=821 , 2011 . A. Ferdowsi. The Dropbox blog: Yesterday's Authentication Bug. https:\/\/blog.dropbox.com\/?p=821, 2011."},{"key":"e_1_2_1_38_1","volume-title":"University of California","author":"Fielding R. T.","year":"2000","unstructured":"R. T. Fielding . Chapter 5 : Representational State Transfer (REST) . University of California , Irvine , 2000 . Ph.D. Thesis. R. T. Fielding. Chapter 5: Representational State Transfer (REST). University of California, Irvine, 2000. Ph.D. Thesis."},{"key":"e_1_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046660.2046678"},{"key":"e_1_2_1_40_1","volume-title":"Revision 130","author":"T. C. Group","year":"2006","unstructured":"T. C. Group . TPM Main Specification Level 2 Version 1.2 , Revision 130 , 2006 . T. C. Group. TPM Main Specification Level 2 Version 1.2, Revision 130, 2006."},{"key":"e_1_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.v22:1"},{"key":"e_1_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/78969.78972"},{"key":"e_1_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1109\/CLOUD.2011.45"},{"key":"e_1_2_1_44_1","unstructured":"P. Institute. Security of Cloud Computing Providers Study. http:\/\/www.ca.com\/~\/media\/Files\/IndustryResearch\/security-of-cloud-computing-providers-final-april-2011. pdf 2011.  P. Institute. Security of Cloud Computing Providers Study. http:\/\/www.ca.com\/~\/media\/Files\/IndustryResearch\/security-of-cloud-computing-providers-final-april-2011. pdf 2011."},{"key":"e_1_2_1_45_1","doi-asserted-by":"crossref","unstructured":"M.\n      Jaatun K.\n      Bernsmed and \n      A.\n      Undheim\n  . \n  Security SLAs -- An Idea Whose Time Has Come? In Multidisciplinary Research and Practice for Information Systems volume \n  7465\n   of \n  Lecture Notes in Computer Science pages \n  123\n  --\n  130\n  . \n  Springer Berlin Heidelberg 2012\n  .  M. Jaatun K. Bernsmed and A. Undheim. Security SLAs -- An Idea Whose Time Has Come? In Multidisciplinary Research and Practice for Information Systems volume 7465 of Lecture Notes in Computer Science pages 123--130. Springer Berlin Heidelberg 2012.","DOI":"10.1007\/978-3-642-32498-7_10"},{"key":"e_1_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/1315245.1315317"},{"key":"e_1_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/800027.808444"},{"key":"e_1_2_1_48_1","unstructured":"M. Krigsman. Intuit: Pain and Pleasure in the Cloud. http:\/\/www.zdnet.com\/blog\/projectfailures\/intuit-pain-and-pleasure-in-the-cloud\/14880 2011.  M. Krigsman. Intuit: Pain and Pleasure in the Cloud. http:\/\/www.zdnet.com\/blog\/projectfailures\/intuit-pain-and-pleasure-in-the-cloud\/14880 2011."},{"key":"e_1_2_1_49_1","volume-title":"Dependable Computing and Fault-Tolerance: Concepts and Terminology. In IEEE Int. Symp. on Fault-Tolerant Computing (FTCS)","author":"Laprie J. C.","year":"1985","unstructured":"J. C. Laprie . Dependable Computing and Fault-Tolerance: Concepts and Terminology. In IEEE Int. Symp. on Fault-Tolerant Computing (FTCS) , 1985 . J. C. Laprie. Dependable Computing and Fault-Tolerance: Concepts and Terminology. In IEEE Int. Symp. on Fault-Tolerant Computing (FTCS), 1985."},{"key":"e_1_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1109\/CLOUD.2011.80"},{"key":"e_1_2_1_51_1","first-page":"121","volume-title":"OSDI","author":"Li J.","year":"2004","unstructured":"J. Li , M. N. Krohn , D. Mazi\u00e0res , and D. Shasha . Secure untrusted data repository (sundr) . In OSDI , pages 121 -- 136 , 2004 . J. Li, M. N. Krohn, D. Mazi\u00e0res, and D. Shasha. Secure untrusted data repository (sundr). In OSDI, pages 121--136, 2004."},{"key":"e_1_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/1866835.1866849"},{"key":"e_1_2_1_53_1","volume-title":"High-Performance Client\/Server","author":"Loosley C.","year":"1997","unstructured":"C. Loosley , F. Douglas , and A. Mimo . High-Performance Client\/Server . John Wiley & Sons , Nov. 1997 . C. Loosley, F. Douglas, and A. Mimo. High-Performance Client\/Server. John Wiley & Sons, Nov. 1997."},{"key":"e_1_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1109\/CCGrid.2012.15"},{"key":"e_1_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2010.164"},{"key":"e_1_2_1_56_1","volume-title":"Secure Data Capsules for Deployable Data Protection. In HotOS","author":"Maniatis P.","year":"2011","unstructured":"P. Maniatis , D. Akhawe , K. Fall , E. Shi , S. McCamant , and D. Song . Do You Know Where Your Data Are ? Secure Data Capsules for Deployable Data Protection. In HotOS , 2011 . P. Maniatis, D. Akhawe, K. Fall, E. Shi, S. McCamant, and D. Song. Do You Know Where Your Data Are? Secure Data Capsules for Deployable Data Protection. In HotOS, 2011."},{"key":"e_1_2_1_57_1","volume-title":"Blueprints for High Availability","author":"Marcus E.","year":"2003","unstructured":"E. Marcus and H. Stern . Blueprints for High Availability . Wiley , Sept. 2003 . E. Marcus and H. Stern. Blueprints for High Availability. Wiley, Sept. 2003."},{"key":"e_1_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1145\/571825.571840"},{"key":"e_1_2_1_59_1","first-page":"638","volume-title":"CLOSER","author":"Meland P. H.","year":"2012","unstructured":"P. H. Meland , K. Bernsmed , M. G. Jaatun , A. Undheim , and H. Castejon . Expressing cloud security requirements in deontic contract languages . In CLOSER , pages 638 -- 646 . SciTePress , 2012 . P. H. Meland, K. Bernsmed, M. G. Jaatun, A. Undheim, and H. Castejon. Expressing cloud security requirements in deontic contract languages. In CLOSER, pages 638--646. SciTePress, 2012."},{"key":"e_1_2_1_60_1","volume-title":"Capacity Planning for Web Services: Metrics, Models, and Methods","author":"Menasc\u00e9 D. A.","year":"2001","unstructured":"D. A. Menasc\u00e9 and V. A. F. Almeida . Capacity Planning for Web Services: Metrics, Models, and Methods . Prentice Hall , 2001 . D. A. Menasc\u00e9 and V. A. F. Almeida. Capacity Planning for Web Services: Metrics, Models, and Methods. Prentice Hall, 2001."},{"key":"e_1_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.1980.10006"},{"key":"e_1_2_1_62_1","unstructured":"B. Monahan and M. Yearworth. Meaningful Security SLAs. http:\/\/www.hpl.hp.com\/techreports\/2005\/HPL-2005-218R1.html 2008.  B. Monahan and M. Yearworth. Meaningful Security SLAs. http:\/\/www.hpl.hp.com\/techreports\/2005\/HPL-2005-218R1.html 2008."},{"key":"e_1_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1007\/11864219_18"},{"key":"e_1_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1145\/2381913.2381931"},{"key":"e_1_2_1_65_1","volume-title":"SAMS Publishing","author":"Patton R.","year":"2005","unstructured":"R. Patton . Software Testing . SAMS Publishing , second edition, 2005 . R. Patton. Software Testing. SAMS Publishing, second edition, 2005."},{"key":"e_1_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.1109\/CloudCom.2010.66"},{"key":"e_1_2_1_67_1","volume-title":"Software Testing and Analysis: Process, Principles and Techniques","author":"Pezze M.","year":"2007","unstructured":"M. Pezze and M. Young . Software Testing and Analysis: Process, Principles and Techniques . Wiley , 2007 . M. Pezze and M. Young. Software Testing and Analysis: Process, Principles and Techniques. Wiley, 2007."},{"key":"e_1_2_1_68_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSNW.2011.5958798"},{"key":"e_1_2_1_69_1","doi-asserted-by":"publisher","DOI":"10.1109\/SRDS.2012.12"},{"key":"e_1_2_1_70_1","volume-title":"HotCloud","author":"Santos N.","year":"2009","unstructured":"N. Santos , K. P. Gummadi , and R. Rodrigues . Towards Trusted Cloud Computing . In HotCloud , 2009 . N. Santos, K. P. Gummadi, and R. Rodrigues. Towards Trusted Cloud Computing. In HotCloud, 2009."},{"key":"e_1_2_1_71_1","volume-title":"USENIX Security","author":"Santos N.","year":"2012","unstructured":"N. Santos , R. Rodrigues , K. Gummadi , and S. Saroiu . Policy-Sealed Data: A New Abstraction For Building Trusted Cloud Services . In USENIX Security , 2012 . N. Santos, R. Rodrigues, K. Gummadi, and S. Saroiu. Policy-Sealed Data: A New Abstraction For Building Trusted Cloud Services. In USENIX Security, 2012."},{"key":"e_1_2_1_72_1","doi-asserted-by":"publisher","DOI":"10.1145\/1866835.1866843"},{"key":"e_1_2_1_73_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046660.2046666"},{"key":"e_1_2_1_74_1","volume-title":"DEF CON 17 Conference. Clobbering the Cloud","author":"Blog SensePost","year":"2009","unstructured":"SensePost Blog , DEF CON 17 Conference. Clobbering the Cloud , 2009 . http:\/\/www.sensepost.com\/blog\/3706.html. SensePost Blog, DEF CON 17 Conference. Clobbering the Cloud, 2009. http:\/\/www.sensepost.com\/blog\/3706.html."},{"key":"e_1_2_1_75_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-89255-7_7"},{"key":"e_1_2_1_76_1","doi-asserted-by":"publisher","DOI":"10.1145\/1866835.1866841"},{"key":"e_1_2_1_77_1","doi-asserted-by":"publisher","DOI":"10.1145\/2043556.2043580"},{"key":"e_1_2_1_78_1","unstructured":"The Guardian. PlayStation Network hack: why it took Sony seven days to tell the world. http:\/\/www.guardian.co.uk\/technology\/gamesblog\/2011\/apr\/27\/playstation-network-hack-sony 2011.  The Guardian. PlayStation Network hack: why it took Sony seven days to tell the world. http:\/\/www.guardian.co.uk\/technology\/gamesblog\/2011\/apr\/27\/playstation-network-hack-sony 2011."},{"key":"e_1_2_1_79_1","volume-title":"States Congress. Health Insurance Portability Act. http:\/\/www.gpo.gov\/fdsys\/pkg\/PLAW-104publ191\/html\/ PLAW-104publ191","author":"United","year":"1996","unstructured":"United States Congress. Health Insurance Portability Act. http:\/\/www.gpo.gov\/fdsys\/pkg\/PLAW-104publ191\/html\/ PLAW-104publ191 .htm, 1996 . United States Congress. Health Insurance Portability Act. http:\/\/www.gpo.gov\/fdsys\/pkg\/PLAW-104publ191\/html\/ PLAW-104publ191.htm, 1996."},{"key":"e_1_2_1_80_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382227"},{"key":"e_1_2_1_81_1","first-page":"18","volume-title":"Proceedings of the 2nd USENIX conference on Hot topics in cloud computing, HotCloud'10","author":"Wang C.","year":"2010","unstructured":"C. Wang and Y. Zhou . A collaborative monitoring mechanism for making a multitenant platform accountable . In Proceedings of the 2nd USENIX conference on Hot topics in cloud computing, HotCloud'10 , pages 18 -- 18 , Berkeley, CA, USA , 2010 . USENIX Association. C. Wang and Y. Zhou. A collaborative monitoring mechanism for making a multitenant platform accountable. In Proceedings of the 2nd USENIX conference on Hot topics in cloud computing, HotCloud'10, pages 18--18, Berkeley, CA, USA, 2010. USENIX Association."},{"key":"e_1_2_1_82_1","doi-asserted-by":"publisher","DOI":"10.1145\/2381913.2381926"},{"key":"e_1_2_1_83_1","doi-asserted-by":"publisher","DOI":"10.1109\/SCC.2010.83"},{"key":"e_1_2_1_84_1","doi-asserted-by":"publisher","DOI":"10.1145\/1288783.1288786"},{"key":"e_1_2_1_85_1","doi-asserted-by":"publisher","DOI":"10.1145\/2391229.2391235"},{"key":"e_1_2_1_86_1","doi-asserted-by":"publisher","DOI":"10.1145\/2043556.2043576"},{"key":"e_1_2_1_87_1","doi-asserted-by":"publisher","DOI":"10.1109\/NCA.2011.24"}],"container-title":["ACM SIGOPS Operating Systems Review"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2506164.2506167","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2506164.2506167","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T07:28:43Z","timestamp":1750231723000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2506164.2506167"}},"subtitle":["present and future"],"short-title":[],"issued":{"date-parts":[[2013,7,23]]},"references-count":87,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2013,7,23]]}},"alternative-id":["10.1145\/2506164.2506167"],"URL":"https:\/\/doi.org\/10.1145\/2506164.2506167","relation":{},"ISSN":["0163-5980"],"issn-type":[{"value":"0163-5980","type":"print"}],"subject":[],"published":{"date-parts":[[2013,7,23]]},"assertion":[{"value":"2013-07-23","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}