{"id":"https://openalex.org/W3008559318","doi":"https://doi.org/10.1002/nem.2103","title":"Security and trust preserving inter\u2010 and intra\u2010cloud VM migrations","display_name":"Security and trust preserving inter\u2010 and intra\u2010cloud VM migrations","publication_year":2020,"publication_date":"2020-02-17","ids":{"openalex":"https://openalex.org/W3008559318","doi":"https://doi.org/10.1002/nem.2103","mag":"3008559318"},"language":"en","primary_location":{"id":"doi:10.1002/nem.2103","is_oa":false,"landing_page_url":"https://doi.org/10.1002/nem.2103","pdf_url":null,"source":{"id":"https://openalex.org/S204585504","display_name":"International Journal of Network Management","issn_l":"1055-7148","issn":["1055-7148","1099-1190"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320595","host_organization_name":"Wiley","host_organization_lineage":["https://openalex.org/P4310320595"],"host_organization_lineage_names":["Wiley"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Network Management","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5013416173","display_name":"Mudassar Aslam","orcid":"https://orcid.org/0000-0003-3223-4234"},"institutions":[{"id":"https://openalex.org/I16076960","display_name":"COMSATS University Islamabad","ror":"https://ror.org/00nqqvk19","country_code":"PK","type":"education","lineage":["https://openalex.org/I16076960"]},{"id":"https://openalex.org/I2800664555","display_name":"RISE Research Institutes of Sweden","ror":"https://ror.org/03nnxqz81","country_code":"SE","type":"other","lineage":["https://openalex.org/I2800664555"]},{"id":"https://openalex.org/I3131573596","display_name":"Abbottabad University of Science and Technology","ror":"https://ror.org/0549hdw45","country_code":"PK","type":"education","lineage":["https://openalex.org/I3131573596"]}],"countries":["PK","SE"],"is_corresponding":true,"raw_author_name":"Mudassar Aslam","raw_affiliation_strings":["Computer Science Department COMSATS University Islamabad, Abbottabad Campus  Abbottabad Khyber Pakhtunkhwa Paksitan","RISE Cybersecurity Lab RISE Research Institutes of Sweden  Stockholm Sweden","RISE Cybersecurity Lab, RISE Research Institutes of Sweden, Stockholm, Sweden","Computer Science Department, COMSATS University Islamabad, Abbottabad Campus, Abbottabad, Khyber Pakhtunkhwa, Paksitan"],"affiliations":[{"raw_affiliation_string":"Computer Science Department COMSATS University Islamabad, Abbottabad Campus  Abbottabad Khyber Pakhtunkhwa Paksitan","institution_ids":["https://openalex.org/I3131573596"]},{"raw_affiliation_string":"RISE Cybersecurity Lab RISE Research Institutes of Sweden  Stockholm Sweden","institution_ids":["https://openalex.org/I2800664555"]},{"raw_affiliation_string":"RISE Cybersecurity Lab, RISE Research Institutes of Sweden, Stockholm, Sweden","institution_ids":["https://openalex.org/I2800664555"]},{"raw_affiliation_string":"Computer Science Department, COMSATS University Islamabad, Abbottabad Campus, Abbottabad, Khyber Pakhtunkhwa, Paksitan","institution_ids":["https://openalex.org/I3131573596","https://openalex.org/I16076960"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5055564110","display_name":"Simon Bouget","orcid":"https://orcid.org/0000-0002-5165-2100"},"institutions":[{"id":"https://openalex.org/I2800664555","display_name":"RISE Research Institutes of Sweden","ror":"https://ror.org/03nnxqz81","country_code":"SE","type":"other","lineage":["https://openalex.org/I2800664555"]}],"countries":["SE"],"is_corresponding":false,"raw_author_name":"Simon Bouget","raw_affiliation_strings":["RISE Cybersecurity Lab RISE Research Institutes of Sweden  Stockholm Sweden","RISE Cybersecurity Lab, RISE Research Institutes of Sweden, Stockholm, Sweden"],"affiliations":[{"raw_affiliation_string":"RISE Cybersecurity Lab RISE Research Institutes of Sweden  Stockholm Sweden","institution_ids":["https://openalex.org/I2800664555"]},{"raw_affiliation_string":"RISE Cybersecurity Lab, RISE Research Institutes of Sweden, Stockholm, Sweden","institution_ids":["https://openalex.org/I2800664555"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5001344842","display_name":"Shahid Raza","orcid":"https://orcid.org/0000-0001-8192-0893"},"institutions":[{"id":"https://openalex.org/I2800664555","display_name":"RISE Research Institutes of Sweden","ror":"https://ror.org/03nnxqz81","country_code":"SE","type":"other","lineage":["https://openalex.org/I2800664555"]}],"countries":["SE"],"is_corresponding":false,"raw_author_name":"Shahid Raza","raw_affiliation_strings":["RISE Cybersecurity Lab RISE Research Institutes of Sweden  Stockholm Sweden","RISE Cybersecurity Lab, RISE Research Institutes of Sweden, Stockholm, Sweden"],"affiliations":[{"raw_affiliation_string":"RISE Cybersecurity Lab RISE Research Institutes of Sweden  Stockholm Sweden","institution_ids":["https://openalex.org/I2800664555"]},{"raw_affiliation_string":"RISE Cybersecurity Lab, RISE Research Institutes of Sweden, Stockholm, Sweden","institution_ids":["https://openalex.org/I2800664555"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5013416173"],"corresponding_institution_ids":["https://openalex.org/I16076960","https://openalex.org/I2800664555","https://openalex.org/I3131573596"],"apc_list":{"value":3140,"currency":"USD","value_usd":3140},"apc_paid":null,"fwci":2.5031,"has_fulltext":false,"cited_by_count":13,"citation_normalized_percentile":{"value":0.91317385,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":"31","issue":"2","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9937999844551086,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.882796049118042},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.872718334197998},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6255531311035156},{"id":"https://openalex.org/keywords/virtual-machine","display_name":"Virtual machine","score":0.5378443598747253},{"id":"https://openalex.org/keywords/trusted-third-party","display_name":"Trusted third party","score":0.53694748878479},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.5265774130821228},{"id":"https://openalex.org/keywords/security-token","display_name":"Security token","score":0.5205753445625305},{"id":"https://openalex.org/keywords/service-provider","display_name":"Service provider","score":0.5031480193138123},{"id":"https://openalex.org/keywords/trusted-computing","display_name":"Trusted Computing","score":0.49802327156066895},{"id":"https://openalex.org/keywords/cloud-computing-security","display_name":"Cloud computing security","score":0.44843876361846924},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.3858685791492462},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.3510779142379761},{"id":"https://openalex.org/keywords/service","display_name":"Service (business)","score":0.3251981735229492},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.18818044662475586}],"concepts":[{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.882796049118042},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.872718334197998},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6255531311035156},{"id":"https://openalex.org/C25344961","wikidata":"https://www.wikidata.org/wiki/Q192726","display_name":"Virtual machine","level":2,"score":0.5378443598747253},{"id":"https://openalex.org/C139089976","wikidata":"https://www.wikidata.org/wiki/Q2142273","display_name":"Trusted third party","level":2,"score":0.53694748878479},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.5265774130821228},{"id":"https://openalex.org/C48145219","wikidata":"https://www.wikidata.org/wiki/Q1335365","display_name":"Security token","level":2,"score":0.5205753445625305},{"id":"https://openalex.org/C116537","wikidata":"https://www.wikidata.org/wiki/Q2169973","display_name":"Service provider","level":3,"score":0.5031480193138123},{"id":"https://openalex.org/C2776831232","wikidata":"https://www.wikidata.org/wiki/Q966812","display_name":"Trusted Computing","level":2,"score":0.49802327156066895},{"id":"https://openalex.org/C184842701","wikidata":"https://www.wikidata.org/wiki/Q370563","display_name":"Cloud computing security","level":3,"score":0.44843876361846924},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.3858685791492462},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3510779142379761},{"id":"https://openalex.org/C2780378061","wikidata":"https://www.wikidata.org/wiki/Q25351891","display_name":"Service (business)","level":2,"score":0.3251981735229492},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.18818044662475586},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.0},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0},{"id":"https://openalex.org/C136264566","wikidata":"https://www.wikidata.org/wiki/Q159810","display_name":"Economy","level":1,"score":0.0},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1002/nem.2103","is_oa":false,"landing_page_url":"https://doi.org/10.1002/nem.2103","pdf_url":null,"source":{"id":"https://openalex.org/S204585504","display_name":"International Journal of Network Management","issn_l":"1055-7148","issn":["1055-7148","1099-1190"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320595","host_organization_name":"Wiley","host_organization_lineage":["https://openalex.org/P4310320595"],"host_organization_lineage_names":["Wiley"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Network Management","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Reduced inequalities","id":"https://metadata.un.org/sdg/10","score":0.75}],"awards":[{"id":"https://openalex.org/G1000860460","display_name":null,"funder_award_id":"783119","funder_id":"https://openalex.org/F4320332999","funder_display_name":"Horizon 2020 Framework Programme"},{"id":"https://openalex.org/G6389815074","display_name":null,"funder_award_id":"833742","funder_id":"https://openalex.org/F4320332999","funder_display_name":"Horizon 2020 Framework Programme"}],"funders":[{"id":"https://openalex.org/F4320332999","display_name":"Horizon 2020 Framework Programme","ror":"https://ror.org/00k4n6c32"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":27,"referenced_works":["https://openalex.org/W146244851","https://openalex.org/W194600023","https://openalex.org/W332418658","https://openalex.org/W1984382557","https://openalex.org/W2029693536","https://openalex.org/W2050529434","https://openalex.org/W2055456945","https://openalex.org/W2072209700","https://openalex.org/W2076802856","https://openalex.org/W2083547349","https://openalex.org/W2107289225","https://openalex.org/W2131646073","https://openalex.org/W2131726714","https://openalex.org/W2139058102","https://openalex.org/W2170149987","https://openalex.org/W2275530856","https://openalex.org/W2561675875","https://openalex.org/W2620716883","https://openalex.org/W2741608233","https://openalex.org/W2763403405","https://openalex.org/W2765700031","https://openalex.org/W2789825598","https://openalex.org/W2801114063","https://openalex.org/W2809727329","https://openalex.org/W2891164157","https://openalex.org/W4213154881","https://openalex.org/W4240148035"],"related_works":["https://openalex.org/W1489203378","https://openalex.org/W2146579022","https://openalex.org/W2376787749","https://openalex.org/W2043622642","https://openalex.org/W2373013104","https://openalex.org/W1513753724","https://openalex.org/W179026563","https://openalex.org/W2153334092","https://openalex.org/W2049353548","https://openalex.org/W1745716700"],"abstract_inverted_index":{"Summary":[0],"This":[1],"paper":[2,62],"focus":[3],"on":[4,79,139],"providing":[5],"a":[6,64,80,174],"secure":[7,48,209],"and":[8,40,51,77,126,157,183,205],"trustworthy":[9,81],"solution":[10,58,104,119,135],"for":[11,47,123,208],"virtual":[12],"machine":[13],"(VM)":[14],"migration":[15,53,57,165,181,211],"within":[16],"an":[17,107,140],"existing":[18,108],"cloud":[19,27,32,84,95,113,213],"provider":[20],"domain,":[21],"and/or":[22,82],"to":[23,38,67,88,172],"the":[24,42,70,91,94,98,148,154,162,169,179,191],"other":[25],"federating":[26],"providers.":[28],"The":[29,55,86],"infrastructure\u2010as\u2010a\u2010service":[30],"(IaaS)":[31],"service":[33],"model":[34],"is":[35,136,158,188],"mainly":[36],"addressed":[37],"extend":[39],"complement":[41],"previous":[43,132],"Trusted":[44],"Computing":[45],"techniques":[46],"VM":[49,52,56,128,164,210],"launch":[50],"case.":[54],"proposed":[59,118,180,200],"in":[60,161,212],"this":[61],"uses":[63],"Trust_Token":[65],"based":[66],"guarantee":[68],"that":[69,146,185],"user":[71],"VMs":[72],"can":[73,120],"only":[74,152],"be":[75,121],"migrated":[76],"hosted":[78],"compliant":[83],"platforms.":[85],"possibility":[87],"also":[89],"check":[90],"compliance":[92],"of":[93,178],"platforms":[96],"with":[97,106],"pre\u2010defined":[99],"baseline":[100],"configurations":[101],"makes":[102],"our":[103,134,186,199],"compatible":[105],"widely":[109],"accepted":[110],"standards\u2010based,":[111],"security\u2010focused":[112],"frameworks":[114],"like":[115],"FedRAMP.":[116],"Our":[117],"used":[122],"both":[124],"inter\u2010":[125],"intra\u2010cloud":[127],"migrations.":[129],"Different":[130],"from":[131],"schemes,":[133],"not":[137,159],"dependent":[138],"active":[141],"(on\u2010line)":[142],"trusted":[143,149],"third":[144,150],"party;":[145],"is,":[147],"party":[151],"performs":[153],"platform":[155],"certification":[156],"involved":[160],"actual":[163],"process.":[166],"We":[167],"use":[168],"Tamarin":[170],"solver":[171],"realize":[173],"formal":[175],"security":[176,204],"analysis":[177],"protocol":[182,187],"show":[184,197],"safe":[189],"under":[190],"Dolev\u2010Yao":[192],"intruder":[193],"model.":[194],"Finally,":[195],"we":[196],"how":[198],"mechanisms":[201],"fulfill":[202],"major":[203],"trust":[206],"requirements":[207],"environments.":[214]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":3},{"year":2023,"cited_by_count":2},{"year":2022,"cited_by_count":3},{"year":2021,"cited_by_count":3},{"year":2020,"cited_by_count":1}],"updated_date":"2026-03-27T14:29:43.386196","created_date":"2025-10-10T00:00:00"}
