{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T19:14:48Z","timestamp":1742930088402,"version":"3.40.3"},"publisher-location":"Cham","reference-count":22,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030977733"},{"type":"electronic","value":"9783030977740"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-030-97774-0_11","type":"book-chapter","created":{"date-parts":[[2022,3,14]],"date-time":"2022-03-14T08:06:40Z","timestamp":1647245200000},"page":"123-132","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Secure Shell Remote Access for Virtualized Computing Environment"],"prefix":"10.1007","author":[{"given":"He","family":"Li","sequence":"first","affiliation":[]},{"given":"Rongqiang","family":"Cao","sequence":"additional","affiliation":[]},{"given":"Hanwen","family":"Xiu","sequence":"additional","affiliation":[]},{"given":"Meng","family":"Wan","sequence":"additional","affiliation":[]},{"given":"Kai","family":"Li","sequence":"additional","affiliation":[]},{"given":"Xiaoguang","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Yangang","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Jue","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,3,15]]},"reference":[{"key":"11_CR1","doi-asserted-by":"crossref","unstructured":"Gao, Y., Iqbal, S., et al.: Performance and power analysis of high-density multi-GPGPU architectures: a preliminary case study. In: IEEE 17th HPCC (2015)","DOI":"10.1109\/HPCC-CSS-ICESS.2015.68"},{"key":"11_CR2","doi-asserted-by":"publisher","first-page":"766","DOI":"10.1016\/j.future.2015.05.005","volume":"56","author":"H Zhao","year":"2016","unstructured":"Zhao, H., Chen, M., et al.: A novel pre-cache schema for high performance Android system. Futur. Gener. Comput. Syst. 56, 766\u2013772 (2016)","journal-title":"Futur. Gener. Comput. Syst."},{"key":"11_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"159","DOI":"10.1007\/978-3-030-05764-0_17","volume-title":"Smart Blockchain. SmartBlock 2018","author":"H Qiu","year":"2018","unstructured":"Qiu, H., Qiu, M., Memmi, G., Ming, Z., Liu, M.: A dynamic scalable blockchain based communication architecture for IoT. In: Qiu, M. (ed.) SmartBlock 2018. LNCS, vol. 11373, pp. 159\u2013166. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-030-05764-0_17"},{"key":"11_CR4","doi-asserted-by":"crossref","unstructured":"Thakur, K., Qiu, M., Gai, K., Ali, M.: An investigation on cyber security threats and security models. In: IEEE CSCloud (2015)","DOI":"10.1109\/CSCloud.2015.71"},{"key":"11_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"236","DOI":"10.1007\/978-3-319-52015-5_24","volume-title":"Smart Computing and Communication. SmartCom 2016","author":"K Gai","year":"2017","unstructured":"Gai, K., Qiu, M., Sun, X., Zhao, H.: Security and privacy issues: a survey on FinTech. In: Qiu, M. (ed.) SmartCom 2016. LNCS, vol. 10135, pp. 236\u2013247. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-52015-5_24"},{"key":"11_CR6","doi-asserted-by":"crossref","unstructured":"Gai, K., Qiu, M., Elnagdy, S.: A novel secure big data cyber incident analytics framework for cloud-based cybersecurity insurance. In: IEEE BigDataSecurity (2016)","DOI":"10.1109\/BigDataSecurity-HPSC-IDS.2016.65"},{"key":"11_CR7","doi-asserted-by":"publisher","unstructured":"Ylonen, T., Lonvick, C. (ed.): The Secure Shell (SSH) authentication protocol. RFC 4252 (2006). https:\/\/doi.org\/10.17487\/RFC4252","DOI":"10.17487\/RFC4252"},{"key":"11_CR8","unstructured":"Wendlandt, D., Andersen, D., Perspectives, A.P.: Improving SSH-style host authentication with multi-path network probing. In: USENIX Annual Technical Conference (2008)"},{"key":"11_CR9","doi-asserted-by":"publisher","unstructured":"Hardt, D.: The OAuth 2.0 authorization framework. RFC 6749 (2012). https:\/\/doi.org\/10.17487\/RFC6749","DOI":"10.17487\/RFC6749"},{"key":"11_CR10","doi-asserted-by":"publisher","unstructured":"Jones, M., Bradley, J., Sakimura, N.: JSON web token (JWT). RFC 7519 (2015). https:\/\/doi.org\/10.17487\/RFC7519","DOI":"10.17487\/RFC7519"},{"key":"11_CR11","doi-asserted-by":"crossref","unstructured":"Proctor, W.C., Storm, P., Hanlon, M.R., Mendoza, N.: Securing HPC: development of a low cost, open source multi-factor authentication infrastructure. In: International Conference for High Performance Computing, Networking, Storage and Analysis, pp. 1\u201311 (2017)","DOI":"10.1145\/3126908.3126957"},{"key":"11_CR12","doi-asserted-by":"crossref","unstructured":"Ylonen, T.: SSH Key management challenges and requirements. In: 10th IFIP International Conference on New Technologies, Mobility and Security (NTMS), pp. 1\u20135 (2019)","DOI":"10.1109\/NTMS.2019.8763773"},{"key":"11_CR13","doi-asserted-by":"crossref","unstructured":"Zhang, Z., Wu, J., et al.: Jamming ACK attack to wireless networks and a mitigation approach. In: IEEE GLOBECOM, pp. 1\u20135 (2008)","DOI":"10.1109\/GLOCOM.2008.ECP.950"},{"key":"11_CR14","doi-asserted-by":"publisher","first-page":"59","DOI":"10.1016\/j.inffus.2019.07.012","volume":"55","author":"H Qiu","year":"2020","unstructured":"Qiu, H., Qiu, M., Lu, Z.: Selective encryption on ECG data in body sensor network based on supervised machine learning. Inf. Fusion 55, 59\u201367 (2020)","journal-title":"Inf. Fusion"},{"key":"11_CR15","doi-asserted-by":"publisher","first-page":"772","DOI":"10.1016\/j.future.2017.08.004","volume":"87","author":"M Qiu","year":"2018","unstructured":"Qiu, M., Gai, K., Xiong, Z.: Privacy-preserving wireless communications using bipartite matching in social big data. Futur. Gener. Comput. Syst. 87, 772\u2013781 (2018)","journal-title":"Futur. Gener. Comput. Syst."},{"key":"11_CR16","doi-asserted-by":"crossref","unstructured":"Andrews, R., Hahn, D.A., Bardas, A.G.: Measuring the prevalence of the password authentication vulnerability in SSH. In: IEEE ICC, pp. 1\u20137 (2020)","DOI":"10.1109\/ICC40277.2020.9148912"},{"key":"11_CR17","doi-asserted-by":"crossref","unstructured":"Gao, Y.A., Basney, J., Withers, A.: SciTokens SSH: token-based authentication for remote login to scientific computing environments. In: Practice and Experience in Advanced Research Computing, pp. 465\u2013468 (2020)","DOI":"10.1145\/3311790.3399613"},{"key":"11_CR18","doi-asserted-by":"crossref","unstructured":"Welch, V., Siebenlist, F., Foster, I., Bresnahan, J., et al.: Security for grid services. In: 12th IEEE International Symposium on High Performance Distributed Computing, pp. 48\u201357 (2003)","DOI":"10.1109\/HPDC.2003.1210015"},{"key":"11_CR19","doi-asserted-by":"crossref","unstructured":"Tuecke, S., Welch, V., Engert, D., Pearlman, L., Thompson, M.: Internet X.509 public key infrastructure (PKI) proxy certificate profile. RFC 3820 (2004)","DOI":"10.17487\/rfc3820"},{"key":"11_CR20","doi-asserted-by":"publisher","unstructured":"Alt, J., Ananthakrishnan, R., Chard, K., et al.: OAuth SSH with globus auth. In: ACM Conference on Practice and Experience in Advanced Research Computing (PEARC 2020), NY, USA, p. 12 (2020). https:\/\/doi.org\/10.1145\/3311790.3396658","DOI":"10.1145\/3311790.3396658"},{"key":"11_CR21","doi-asserted-by":"publisher","unstructured":"Bockelman, B., Weitzel, D.: Scitokens\/scitokens-CPP (Version v0.3.0) (2019). https:\/\/doi.org\/10.5281\/zenodo.265667","DOI":"10.5281\/zenodo.265667"},{"key":"11_CR22","doi-asserted-by":"publisher","unstructured":"Tuecke, S., et al.: Globus auth: a research identity and access management platform. In: 2016 IEEE 12th International Conference on e-Science, pp. 203\u2013212 (2016). https:\/\/doi.org\/10.1109\/eScience.2016.7870901","DOI":"10.1109\/eScience.2016.7870901"}],"container-title":["Lecture Notes in Computer Science","Smart Computing and Communication"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-97774-0_11","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,20]],"date-time":"2024-09-20T06:01:36Z","timestamp":1726812096000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-97774-0_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783030977733","9783030977740"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-97774-0_11","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"15 March 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SmartCom","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Smart Computing and Communication","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"New York, NY","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"USA","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29 December 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"31 December 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"6","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"smartc2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.cloud-conf.net\/smartcom\/2021\/index.html","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"165","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"44","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"27% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"10","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Conference was held online due to the COVID-19 pandemic.","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}