{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T01:28:06Z","timestamp":1743125286553,"version":"3.40.3"},"publisher-location":"Cham","reference-count":14,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030242640"},{"type":"electronic","value":"9783030242657"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-24265-7_48","type":"book-chapter","created":{"date-parts":[[2019,7,17]],"date-time":"2019-07-17T23:19:24Z","timestamp":1563405564000},"page":"561-570","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Cloud Management Systems - Load Balancing Algorithms and VDI Implementation Techniques"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4520-1450","authenticated-orcid":false,"given":"Micheal Ernest","family":"Taylor","sequence":"first","affiliation":[]},{"given":"David","family":"Aboagye-Darko","sequence":"additional","affiliation":[]},{"given":"Jian","family":"Shen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,7,11]]},"reference":[{"issue":"5","key":"48_CR1","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1509\/jmkg.72.5.001","volume":"72","author":"E Fang","year":"2008","unstructured":"Fang, E., Palmatier, R.W., Steenkamp, J.: Effect of service transition strategies on firm value. J. Mark. 72(5), 1\u201314 (2008)","journal-title":"J. Mark."},{"issue":"2","key":"48_CR2","first-page":"117","volume":"9","author":"B Iyer","year":"2010","unstructured":"Iyer, B., Henderson, J.C.: Preparing for the future by understanding the seven capabilities cloud computing. MIS Q. 9(2), 117\u2013131 (2010)","journal-title":"MIS Q."},{"issue":"2","key":"48_CR3","first-page":"773","volume":"9","author":"T Kohler","year":"2003","unstructured":"Kohler, T.: Co-creation in virtual worlds: the design of the user experience. MIS Q. 9(2), 773\u2013788 (2003)","journal-title":"MIS Q."},{"issue":"4","key":"48_CR4","doi-asserted-by":"publisher","first-page":"557","DOI":"10.2307\/30036549","volume":"27","author":"K Lyytinen","year":"2003","unstructured":"Lyytinen, K., Rose, G.M.: The disruptive nature of information technology innovations: the case of internet computing in systems development organizations. MIS Q. 27(4), 557\u2013596 (2003)","journal-title":"MIS Q."},{"key":"48_CR5","unstructured":"Nakai, A.M., Madeira, E., Buzato, L.E..: Improving the QOS of web services via client-based load distribution. In: 29th Proceedings of Brazilian Symposium on Computer Networks and Distributed Systems, pp. 617\u2013629. Unicamp (2011)"},{"issue":"1","key":"48_CR6","doi-asserted-by":"publisher","first-page":"179","DOI":"10.1057\/jit.2012.17","volume":"27","author":"W Venters","year":"2012","unstructured":"Venters, W., Whitley, E.A.: A critical review of cloud computing: researching desires and realities. J. Inf. Technol. 27(1), 179\u2013197 (2012)","journal-title":"J. Inf. Technol."},{"key":"48_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"300","DOI":"10.1007\/978-3-319-68505-2_26","volume-title":"Cloud Computing and Security","author":"ME Taylor","year":"2017","unstructured":"Taylor, M.E., Shen, J.: Cloud management systems and virtual desktop infrastructure load balancing algorithms - a survey. In: Sun, X., Chao, H.-C., You, X., Bertino, E. (eds.) ICCCS 2017. LNCS, vol. 10602, pp. 300\u2013309. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-68505-2_26"},{"key":"48_CR8","unstructured":"Liu, J., Lai, W.: Security analysis of VLAN-based virtual desktop infrastructure. In: International Conference on Educational and Network Technology, pp. 301\u2013304 (2010)"},{"issue":"1","key":"48_CR9","first-page":"215","volume":"2","author":"KC Gouda","year":"2013","unstructured":"Gouda, K.C., Radhika, T.V., Akshatha, M.: Priority based resource allocation model for cloud computing. Int. J. Sci., Eng. Technol. Res. 2(1), 215\u2013219 (2013)","journal-title":"Int. J. Sci., Eng. Technol. Res."},{"key":"48_CR10","series-title":"ICCCS 2017, LNCS","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-319-68505-2_26","volume-title":"Cloud Computing and Security","author":"ME Taylor","year":"2017","unstructured":"Taylor, M.E., Shen, J.: Cloud management systems and virtual desktop infrastructure load balancing algorithms - a survey. In: Sun, X., Chao, H.C., You, X., Bertino, E. (eds.) Cloud Computing and Security. ICCCS 2017, LNCS, vol. 10602, pp. 1\u201313. Springer, Cham (2017)"},{"key":"48_CR11","unstructured":"Chronopoulos, A.T.: Game Theory Based Load Balanced Job Allocation. http:\/\/graal.enslyon.fr\/~lmarchal\/aussois\/slides\/chronopoulos.pdf . Accessed 04 Dec 2018"},{"issue":"3","key":"48_CR12","first-page":"339","volume":"20","author":"DL Lunsford","year":"2017","unstructured":"Lunsford, D.L.: Virtualization technologies in information systems education. J. Inf. Syst. Educ. 20(3), 339\u2013348 (2017)","journal-title":"J. Inf. Syst. Educ."},{"issue":"2","key":"48_CR13","first-page":"273","volume":"56","author":"X Xie","year":"2018","unstructured":"Xie, X., Yuan, T., Zhou, X., Cheng, X.: Research on trust model in container-based cloud service. CMC 56(2), 273\u2013283 (2018)","journal-title":"CMC"},{"issue":"2","key":"48_CR14","doi-asserted-by":"crossref","first-page":"297","DOI":"10.32604\/cmc.2018.03808","volume":"57","author":"CF Cheang","year":"2018","unstructured":"Cheang, C.F., Wang, Y., Cai, Z., Xu, G.: Multi-Vms intrusion detection for cloud security using dempster-shafer theory. CMC 57(2), 297\u2013306 (2018)","journal-title":"CMC"}],"container-title":["Lecture Notes in Computer Science","Artificial Intelligence and Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-24265-7_48","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,18]],"date-time":"2023-09-18T10:25:42Z","timestamp":1695032742000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-24265-7_48"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030242640","9783030242657"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-24265-7_48","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"11 July 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICAIS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Artificial Intelligence and Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"New York, NY","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"USA","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26 July 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"28 July 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"incodldos2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.icaisconf.com\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}