{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T04:45:27Z","timestamp":1725684327280},"reference-count":18,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,1]]},"DOI":"10.1109\/hase.2015.33","type":"proceedings-article","created":{"date-parts":[[2015,2,5]],"date-time":"2015-02-05T14:16:33Z","timestamp":1423145793000},"page":"166-172","source":"Crossref","is-referenced-by-count":14,"title":["Ontology of Secure Service Level Agreement"],"prefix":"10.1109","author":[{"given":"Chen-Yu","family":"Lee","sequence":"first","affiliation":[]},{"given":"Krishna M.","family":"Kavi","sequence":"additional","affiliation":[]},{"given":"Raymond A.","family":"Paul","sequence":"additional","affiliation":[]},{"given":"Mahadevan","family":"Gomathisankaran","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"ref10","DOI":"10.1109\/MVT.2013.2269188"},{"doi-asserted-by":"publisher","key":"ref11","DOI":"10.1016\/j.compeleceng.2012.04.015"},{"doi-asserted-by":"publisher","key":"ref12","DOI":"10.1109\/SERVICES.2013.27"},{"doi-asserted-by":"publisher","key":"ref13","DOI":"10.1109\/ICSC.2008.46"},{"year":"0","journal-title":"Cloud Security Alliance","article-title":"Cloud controls matrix version 3.0","key":"ref14"},{"year":"2013","journal-title":"HIPAA Administrative Simplification U S Department of Health and Human Services Office for Civil Rights Std","key":"ref15"},{"year":"2013","journal-title":"Payment Card Industry Data Security Standard Requirements and Security Assessment Procedures PCI Security Standards Council Std Rev 3 0","key":"ref16"},{"year":"2013","journal-title":"The Health Information Technology for Economic and Clinical Health (HITECH) Act","key":"ref17"},{"year":"0","article-title":"Procure Secure: A guide to monitoring of security service levels in cloud contracts","key":"ref18"},{"year":"0","journal-title":"Cloud Standards Customer Council","article-title":"Practical guide to cloud service level agreements","key":"ref4"},{"key":"ref3","article-title":"Web services agreement specification (ws-agreement)","author":"andrieux","year":"2011","journal-title":"Open Grid Forum (OGF)"},{"doi-asserted-by":"publisher","key":"ref6","DOI":"10.1109\/SERE.2013.31"},{"doi-asserted-by":"publisher","key":"ref5","DOI":"10.1109\/SKG.2012.1"},{"key":"ref8","first-page":"54","article-title":"Security service level agreements: quantifiable security for the enterprise?","author":"henning","year":"1999","journal-title":"Proc NSPW 1999"},{"doi-asserted-by":"publisher","key":"ref7","DOI":"10.1145\/1558607.1558646"},{"doi-asserted-by":"publisher","key":"ref2","DOI":"10.1023\/A:1022445108617"},{"year":"2007","article-title":"The Official Introduction to the ITIL Service Lifecycle","key":"ref1"},{"key":"ref9","article-title":"Meaningful security slas","author":"monahan","year":"2008","journal-title":"Tech Rep HPL-2005-218R1"}],"event":{"name":"2015 IEEE 16th International Symposium on High Assurance Systems Engineering (HASE)","start":{"date-parts":[[2015,1,8]]},"location":"Daytona Beach Shores, FL, USA","end":{"date-parts":[[2015,1,10]]}},"container-title":["2015 IEEE 16th International Symposium on High Assurance Systems Engineering"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7027113\/7027398\/07027428.pdf?arnumber=7027428","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,24]],"date-time":"2017-03-24T00:41:21Z","timestamp":1490316081000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7027428\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,1]]},"references-count":18,"URL":"https:\/\/doi.org\/10.1109\/hase.2015.33","relation":{},"subject":[],"published":{"date-parts":[[2015,1]]}}}