{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,2]],"date-time":"2025-12-02T15:23:03Z","timestamp":1764688983957,"version":"3.40.4"},"publisher-location":"Cham","reference-count":21,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319077727"},{"type":"electronic","value":"9783319077734"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-07773-4_1","type":"book-chapter","created":{"date-parts":[[2014,6,5]],"date-time":"2014-06-05T07:06:56Z","timestamp":1401952016000},"page":"3-13","source":"Crossref","is-referenced-by-count":2,"title":["High Availability and High Scalability to in-Cloud Enterprise Resource Planning System"],"prefix":"10.1007","author":[{"given":"Bao Rong","family":"Chang","sequence":"first","affiliation":[]},{"given":"Hsiu-Fen","family":"Tsai","sequence":"additional","affiliation":[]},{"given":"Ju-Chun","family":"Cheng","sequence":"additional","affiliation":[]},{"given":"Yun-Che","family":"Tsai","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"1_CR1","doi-asserted-by":"crossref","unstructured":"Beloglazov, A., Buyya, R.: Energy Efficient Allocation of Virtual Machines in Cloud Data Centers. In: 10th IEEE\/ACM International Conference on Cluster, Cloud and Grid Computing, pp. 577\u2013578 (2010)","DOI":"10.1109\/CCGRID.2010.45"},{"key":"1_CR2","doi-asserted-by":"crossref","unstructured":"Laurikainen, R., Laitinen, J., Lehtovuori, P., Nurminen, J.K.: Improving the Efficiency of Deploying Virtual Machines in a Cloud Environment. In: 2012 International Conference on Cloud and Service Computing, pp. 232\u2013239 (2012)","DOI":"10.1109\/CSC.2012.43"},{"key":"1_CR3","doi-asserted-by":"crossref","unstructured":"Sotiriadis, S., Bessis, N., Xhafa, F., Antonopoulos, N.: Cloud Virtual Machine Scheduling: Modelling the Cloud Virtual Machine Instantiation. In: 2012 Sixth International Conference on Complex, Intelligent and Software Intensive Systems, pp. 233\u2013240 (2012)","DOI":"10.1109\/CISIS.2012.113"},{"key":"1_CR4","doi-asserted-by":"crossref","unstructured":"Yang, T.-S., Choi, J., Zheng, X., Sun, Y.-H., Ouyang, C.-S., Huang, Y.-X.: Research of Enterprise Resource Planning in a Specific Enterprise. In: 2006 IEEE International Conference on Systems, Man, and Cybernetics, pp. 418\u2013422 (2006)","DOI":"10.1109\/ICSMC.2006.384418"},{"key":"1_CR5","doi-asserted-by":"crossref","unstructured":"de Carvalho, R.A., Monnerat, R.M., Sun, Y.-H., Ouyang, C.-S., Huang, Y.-X.: Development Support Tools for Enterprise Resource Planning. IT Professional Magazine, 39\u201345 (2008)","DOI":"10.1109\/MITP.2008.100"},{"key":"1_CR6","doi-asserted-by":"crossref","unstructured":"Wu, H.-Q., Ding, Y., Winer, C., Yao, L.: Network Security for Virtual Machine in Cloud Computing. In: 2010 5th International Conference on Computer Sciences and Convergence Information Technology, pp. 18\u201321 (2010)","DOI":"10.1109\/ICCIT.2010.5711022"},{"key":"1_CR7","unstructured":"OpenERP, http:\/\/v6.openerp.com\/"},{"key":"1_CR8","doi-asserted-by":"crossref","unstructured":"Zhao, J.-G., Liu, J.-C., Fan, J.-J., Di, J.-X.: The Security Research of Network Access Control System. In: 2010 First ACIS International Symposium on Cryptography and Network Security, Data Mining and Knowledge Discovery. E-Commerce & Its Applications and Embedded Systems, pp. 283\u2013288 (2010)","DOI":"10.1109\/CDEE.2010.62"},{"issue":"6","key":"1_CR9","doi-asserted-by":"publisher","first-page":"75","DOI":"10.1109\/4236.807015","volume":"3","author":"C. Metz","year":"1999","unstructured":"Metz, C.: AAA protocols: Authentication, Authorization, and Accounting for the Internet. IEEE Internet Computing\u00a03(6), 75\u201379 (1999)","journal-title":"IEEE Internet Computing"},{"key":"1_CR10","doi-asserted-by":"crossref","unstructured":"Zhang, L.-F., Persaud, A.G., Johnson, A., Yong, G.: Detection of Stepping Stone Attack Under Delay and Chaff Perturbations. In: 25th Annual International Performance, Computing, and Communications Conference, pp. 256\u2013266 (2006)","DOI":"10.1109\/.2006.1629414"},{"key":"1_CR11","first-page":"317","volume":"4","author":"H.-Y. Yang","year":"2008","unstructured":"Yang, H.-Y., Xie, L.-X., Xie, F.: A New Approach to Network Anomaly Attack Detection. Fuzzy Systems and Knowledge Discovery\u00a04, 317\u2013321 (2008)","journal-title":"Fuzzy Systems and Knowledge Discovery"},{"issue":"3","key":"1_CR12","first-page":"192","volume":"4","author":"B.R. Chang","year":"2013","unstructured":"Chang, B.R., Tsai, H.-F., Chen, C.-M.: Evaluation of Virtual Machine Performance and Virtualized Consolidation Ratio in Cloud Computing System. Journal of Information Hiding and Multimedia Signal Processing\u00a04(3), 192\u2013200 (2013)","journal-title":"Journal of Information Hiding and Multimedia Signal Processing"},{"key":"1_CR13","doi-asserted-by":"crossref","unstructured":"Chang, B.A., Tsai, H.-F., Chen, C.-M.: Empirical Analysis of Server Consolidation and Desktop Virtualization in Cloud Computing. Mathematical Problems in Engineering 2013, Article ID 947234, 11 pages (2013)","DOI":"10.1155\/2013\/947234"},{"issue":"2","key":"1_CR14","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1109\/MSP.2008.28","volume":"6","author":"J.L. Wayman","year":"2008","unstructured":"Wayman, J.L.: Biometrics in Identity Management Systems. IEEE Security & Privacy\u00a06(2), 30\u201337 (2008)","journal-title":"IEEE Security & Privacy"},{"issue":"2","key":"1_CR15","first-page":"176","volume":"3","author":"B.R. Chang","year":"2012","unstructured":"Chang, B.R., Huang, C.-F., Tsai, H.-F., Lin, Z.-Y.: Rapid Access Control on Ubuntu Cloud Computing with Facial Recognition and Fingerprint Identification. Journal of Information Hiding and Multimedia Signal Processing\u00a03(2), 176\u2013190 (2012)","journal-title":"Journal of Information Hiding and Multimedia Signal Processing"},{"key":"1_CR16","doi-asserted-by":"crossref","unstructured":"Hsiao, H.W., Fan, W.C.: Detecting step-stone with Network Traffic Mining Approach. In: The Fourth International Conference on Innovative Computing, Information and Control, pp. 1176\u20131179 (2009)","DOI":"10.1109\/ICICIC.2009.172"},{"key":"1_CR17","doi-asserted-by":"crossref","unstructured":"Hsiao, H.W., Lin, C.S., Chang, S.Y.: Constructing an ARP Attack Detection System with SNMP traffic data mining. In: The 11th International Conference on Electronic Commerce, pp. 341\u2013345 (2009)","DOI":"10.1145\/1593254.1593309"},{"key":"1_CR18","unstructured":"Link Aggregation Control Protocol, http:\/\/www.ieee802.org\/3\/ad\/public\/mar99\/seaman_1_0399.pdf"},{"key":"1_CR19","volume-title":"IBM System Storage SAN Volume Controller (IBM Redbooks)","author":"J. Tate","year":"2006","unstructured":"Tate, J.: IBM System Storage SAN Volume Controller (IBM Redbooks). Vervante, New York (2006)"},{"key":"1_CR20","doi-asserted-by":"crossref","unstructured":"Doedt, M., Steffen, B.: Requirement-Driven Evaluation of Remote ERP-System Solutions: A Service-oriented Perspective. In: 34th IEEE Software Engineering Workshop, pp. 57\u201366 (2011)","DOI":"10.1109\/SEW.2011.14"},{"key":"1_CR21","doi-asserted-by":"crossref","unstructured":"Elragal, A., Kommos, M.E.: In-House versus In-Cloud ERP Systems: A Comparative Study. Journal of Enterprise Resource Planning Studies 2012, Article ID 659957, 13 pages (2012)","DOI":"10.5171\/2012.659957"}],"container-title":["Advances in Intelligent Systems and Computing","Intelligent Data analysis and its Applications, Volume II"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-07773-4_1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,3]],"date-time":"2025-05-03T07:08:26Z","timestamp":1746256106000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-07773-4_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319077727","9783319077734"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-07773-4_1","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2014]]}}}