{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,11]],"date-time":"2024-09-11T19:02:37Z","timestamp":1726081357941},"publisher-location":"Cham","reference-count":25,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030459888"},{"type":"electronic","value":"9783030459895"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-45989-5_20","type":"book-chapter","created":{"date-parts":[[2020,4,23]],"date-time":"2020-04-23T23:10:08Z","timestamp":1587683408000},"page":"245-256","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Towards Multi-level Trust-Driven Data Integration in Multi-cloud Environments"],"prefix":"10.1007","author":[{"given":"Senda","family":"Romdhani","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,4,24]]},"reference":[{"issue":"1","key":"20_CR1","doi-asserted-by":"publisher","first-page":"44","DOI":"10.1109\/MCC.2017.20","volume":"4","author":"A Mohannad","year":"2017","unstructured":"Mohannad, A., Bertok, P., Tari, Z.: Trusting cloud service providers: trust phases and a taxonomy of trust factors. IEEE Cloud Comput. 4(1), 44\u201354 (2017)","journal-title":"IEEE Cloud Comput."},{"issue":"2","key":"20_CR2","doi-asserted-by":"publisher","first-page":"150","DOI":"10.1287\/mnsc.31.2.150","volume":"31","author":"DP Ballou","year":"1985","unstructured":"Ballou, D.P., Pazer, H.L.: Modeling data and process quality in multi-input, multi-output information systems. Manage. Sci. 31(2), 150\u2013162 (1985)","journal-title":"Manage. Sci."},{"key":"20_CR3","unstructured":"Wayne, J., Grance, T.: Draft NIST special publication guidelines on security and privacy in public Cloud computing. Computer Security (2011)"},{"issue":"4","key":"20_CR4","first-page":"60","volume":"39","author":"R Saint-Germain","year":"2005","unstructured":"Saint-Germain, R.: Information security management best practice based on ISO\/IEC 17799. Inf. Manag. J. Prairie Village 39(4), 60 (2005)","journal-title":"Inf. Manag. J. Prairie Village"},{"issue":"1","key":"20_CR5","doi-asserted-by":"publisher","first-page":"281","DOI":"10.1007\/s10479-013-1380-x","volume":"233","author":"P Manuel","year":"2013","unstructured":"Manuel, P.: A trust model of cloud computing based on Quality of Service. Ann. Oper. Res. 233(1), 281\u2013292 (2013). \nhttps:\/\/doi.org\/10.1007\/s10479-013-1380-x","journal-title":"Ann. Oper. Res."},{"issue":"2","key":"20_CR6","first-page":"28","volume":"48","author":"C Jin-Hee","year":"2015","unstructured":"Jin-Hee, C., Chan, K., Adali, S.: A survey on trust modeling. ACM Comput. Surv. 48(2), 28 (2015)","journal-title":"ACM Comput. Surv."},{"issue":"4","key":"20_CR7","doi-asserted-by":"publisher","first-page":"211","DOI":"10.1145\/505248.506010","volume":"45","author":"LL Pipino","year":"2002","unstructured":"Pipino, L.L., Yang, W.L., Richard, Y.W.: Data quality assessment. Commun. ACM 45(4), 211\u2013218 (2002)","journal-title":"Commun. ACM"},{"key":"20_CR8","unstructured":"Cai, L., Zhu, Y.: The challenges of data quality and data quality assessment in the big data era. Data sci. J. 14, 1\u201310 (2015)"},{"issue":"4","key":"20_CR9","doi-asserted-by":"publisher","first-page":"671","DOI":"10.1109\/TSC.2015.2475743","volume":"11","author":"X Li","year":"2018","unstructured":"Li, X., Ma, H., Yao, W., Xiaolin, G.: Data-driven and feedback-enhanced trust computing pattern for large-scale multi-cloud collaborative services. IEEE Trans. Serv. Comput. 11(4), 671\u2013684 (2018)","journal-title":"IEEE Trans. Serv. Comput."},{"issue":"8","key":"20_CR10","doi-asserted-by":"publisher","first-page":"1917","DOI":"10.1109\/TIFS.2018.2806925","volume":"13","author":"X Li","year":"2018","unstructured":"Li, X., Yuan, J., Ma, H., Yao, W.: Fast and parallel trust computing scheme based on big data analysis for collaboration cloud service. IEEE Trans. Inf. Forensics Secur. 13(8), 1917\u20131931 (2018)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"20_CR11","doi-asserted-by":"publisher","first-page":"280","DOI":"10.1016\/j.chb.2016.02.029","volume":"60","author":"M Chiregi","year":"2016","unstructured":"Chiregi, M., Navimipour, N.J.: A new method for trust and reputation evaluation in the cloud environments using the recommendations of opinion leaders\u2019 entities and removing the effect of troll entities. Comput. Hum. Behav. 60, 280\u2013292 (2016)","journal-title":"Comput. Hum. Behav."},{"key":"20_CR12","doi-asserted-by":"publisher","first-page":"109","DOI":"10.1016\/j.future.2016.07.013","volume":"67","author":"S Singh","year":"2017","unstructured":"Singh, S., Sidhu, J.: Compliance-based multi-dimensional trust evaluation system for determining trustworthiness of cloud service providers. Future Gener. Comput. Syst. 67, 109\u2013132 (2017)","journal-title":"Future Gener. Comput. Syst."},{"key":"20_CR13","doi-asserted-by":"crossref","unstructured":"Bao, L.: QoS-based trust computing scheme for SLA guarantee in cloud computing system. In: 2017 International Conference on Computing Intelligence and Information System (CIIS), Nanjing, pp. 236\u2013240 (2017)","DOI":"10.1109\/CIIS.2017.42"},{"key":"20_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"145","DOI":"10.1007\/978-3-319-22852-5_13","volume-title":"Database and Expert Systems Applications","author":"DAS Carvalho","year":"2015","unstructured":"Carvalho, D.A.S., Neto, P.A.S., Vargas-Solar, G., Bennani, N., Ghedira, C.: Can data integration quality be enhanced on multi-cloud using SLA? In: Chen, Q., Hameurlain, A., Toumani, F., Wagner, R., Decker, H. (eds.) DEXA 2015. LNCS, vol. 9262, pp. 145\u2013152. Springer, Cham (2015). \nhttps:\/\/doi.org\/10.1007\/978-3-319-22852-5_13"},{"key":"20_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"237","DOI":"10.1007\/978-3-030-33702-5_18","volume-title":"Service-Oriented Computing","author":"S Romdhani","year":"2019","unstructured":"Romdhani, S., Bennani, N., Ghedira-Guegan, C., Vargas-Solar, G.: Trusted data integration in service environments: a systematic mapping. In: Yangui, S., Bouassida Rodriguez, I., Drira, K., Tari, Z. (eds.) ICSOC 2019. LNCS, vol. 11895, pp. 237\u2013242. Springer, Cham (2019). \nhttps:\/\/doi.org\/10.1007\/978-3-030-33702-5_18"},{"key":"20_CR16","series-title":"Communications in Computer and Information Science","doi-asserted-by":"publisher","first-page":"80","DOI":"10.1007\/978-3-319-44066-8_9","volume-title":"New Trends in Databases and Information Systems","author":"DAS Carvalho","year":"2016","unstructured":"Carvalho, D.A.S., Souza Neto, P.A., Ghedira-Guegan, C., Bennani, N., Vargas-Solar, G.: Rhone: a quality-based query rewriting algorithm for data integration. In: Ivanovi\u0107, M., et al. (eds.) ADBIS 2016. CCIS, vol. 637, pp. 80\u201387. Springer, Cham (2016). \nhttps:\/\/doi.org\/10.1007\/978-3-319-44066-8_9"},{"key":"20_CR17","unstructured":"Jane, S., Jeff, P.: Cloud services measures for global use: the service measurement index (SMI). In: Annual SRII Global Conference, USA, pp. 411\u2013415. IEEE (2012)"},{"key":"20_CR18","doi-asserted-by":"crossref","unstructured":"Mrabet, M., ben Saied, Y., Saidane, L.: Modeling correlation between QoS attributes for trust computation in cloud computing environments. In: 17th IEEE\/ACM International Symposium on Cluster, Cloud and Grid Computing, Spain, pp. 488\u2013497. IEEE Press (2017)","DOI":"10.1109\/CCGRID.2017.38"},{"key":"20_CR19","doi-asserted-by":"crossref","unstructured":"Liao, L., Bixin, L., Chao, L.: A model to evaluate the credibility of service in cloud computing environment. In: 14th International Conference on Dependable, Autonomic and Secure Computing, 14th International Conference on Pervasive Intelligence and Computing, 2nd International Conference on Big Data Intelligence and Computing and Cyber Science and Technology Congress, Auckland, pp. 294\u2013301. IEEE (2016)","DOI":"10.1109\/DASC-PICom-DataCom-CyberSciTec.2016.68"},{"key":"20_CR20","doi-asserted-by":"crossref","unstructured":"Habib, S.M., Sebastian, R., Max, M.: Towards a trust management system for cloud computing. In: 10th International Conference on Trust, Security and Privacy in Computing and Communications, Changsha, pp. 933\u2013939. IEEE (2011)","DOI":"10.1109\/TrustCom.2011.129"},{"key":"20_CR21","unstructured":"Sudip, C., Roy, K.: An SLA-based framework for estimating trustworthiness of a cloud. In: 11th International Conference on Trust, Security and Privacy in Computing and Communications, Liverpool, pp. 937\u2013942. IEEE (2012)"},{"key":"20_CR22","doi-asserted-by":"crossref","unstructured":"Lu, K., Jiang, H., Li, M., Zhao, S., Ma, J.: Resources collaborative scheduling model based on trust mechanism in cloud. In: 11th International Conference on Trust, Security and Privacy in Computing and Communications, Liverpool, pp. 863\u2013868. IEEE (2012)","DOI":"10.1109\/TrustCom.2012.242"},{"key":"20_CR23","doi-asserted-by":"crossref","unstructured":"Saxena, A.B., Meenu, D.: IAAS trust in public domain: evaluative framework for service provider. In: 18th International Conference on Advanced Learning Technologies, India, pp. 458\u2013460. IEEE (2018)","DOI":"10.1109\/ICALT.2018.00114"},{"key":"20_CR24","unstructured":"Peter, M., Tim G.: The NIST definition of cloud computing (2011)"},{"key":"20_CR25","unstructured":"Codd, E.F.: The 1981 ACM Turing Award Lecture. Communications (1982)"}],"container-title":["Lecture Notes in Computer Science","Service-Oriented Computing \u2013 ICSOC 2019 Workshops"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-45989-5_20","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,4,23]],"date-time":"2020-04-23T23:13:18Z","timestamp":1587683598000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-45989-5_20"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030459888","9783030459895"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-45989-5_20","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"24 April 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICSOC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Service-Oriented Computing","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Toulouse","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"France","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"28 October 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"31 October 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"icsoc2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/icsoc-laas.fr\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Conftool pro","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"181","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"28","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"12","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"15% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"7 posters + 2 invited papers","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}