{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T18:41:35Z","timestamp":1742928095576,"version":"3.40.3"},"publisher-location":"Cham","reference-count":15,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319112268"},{"type":"electronic","value":"9783319112275"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-11227-5_2","type":"book-chapter","created":{"date-parts":[[2014,9,2]],"date-time":"2014-09-02T11:14:01Z","timestamp":1409656441000},"page":"11-19","source":"Crossref","is-referenced-by-count":2,"title":["A Result Verification Scheme for MapReduce Having Untrusted Participants"],"prefix":"10.1007","author":[{"given":"Gaurav","family":"Pareek","sequence":"first","affiliation":[]},{"given":"Chetanya","family":"Goyal","sequence":"additional","affiliation":[]},{"given":"Mukesh","family":"Nayal","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"1","key":"2_CR1","doi-asserted-by":"publisher","first-page":"107","DOI":"10.1145\/1327452.1327492","volume":"51","author":"J. Dean","year":"2008","unstructured":"Dean, J., Ghemawat, S.: MapReduce: simplified data processing on large clusters. Communications of the ACM\u00a051(1), 107\u2013113 (2008)","journal-title":"Communications of the ACM"},{"key":"2_CR2","unstructured":"Zhao, S., Lo, V., Gauthier Dickey, C.G.: Result verification and trust-based scheduling in peer-to-peer grids. In: Fifth IEEE International Conference on, August 31-September 2, pp. 31\u201338 (2005)"},{"key":"2_CR3","doi-asserted-by":"crossref","unstructured":"Sarmenta, L.F.G.: Sabotage-tolerance mechanisms for volunteer computing systems. Future Generation Computer Systems\u00a018(4), 561\u2013572 (2002)","DOI":"10.1016\/S0167-739X(01)00077-2"},{"issue":"7","key":"2_CR4","doi-asserted-by":"publisher","first-page":"904","DOI":"10.1016\/j.future.2006.12.001","volume":"23","author":"P. Domingues","year":"2007","unstructured":"Domingues, P., Sousa, B., Silva, L.M.: Sabotage-tolerance and trust management in desktop grid computing. Future Generation Computer Systems\u00a023(7), 904\u2013912 (2007)","journal-title":"Future Generation Computer Systems"},{"key":"2_CR5","series-title":"Lecture Notes in Computer Science","first-page":"279","volume-title":"Financial Cryptography","author":"P. Golle","year":"2002","unstructured":"Golle, P., Stubblebine, S.G.: Secure distributed computing in a commercial environment. In: Syverson, P.F. (ed.) FC 2001. LNCS, vol.\u00a02339, p. 279. Springer, Heidelberg (2002)"},{"key":"2_CR6","doi-asserted-by":"crossref","unstructured":"Golle, P., Mironov, I.: Uncheatable distributed computations. In: Naccache, D. (ed.) CT-RSA 2001. LNCS, vol.\u00a02020, pp. 425\u2013440. Springer, Heidelberg (2001)","DOI":"10.1007\/3-540-45353-9_31"},{"key":"2_CR7","unstructured":"Indrajit, R., Srinath, T.S., Kilzer, A., Shmatikov, V., Witchel, E.: Airavat: Security and Privacy for MapReduce. In: NSDI, vol.\u00a010, pp. 297\u2013312 (2010)"},{"key":"2_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"44","DOI":"10.1007\/3-540-68671-1_4","volume-title":"Mobile Agents and Security","author":"T. Sander","year":"1998","unstructured":"Sander, T., Tschudin, C.F.: Protecting mobile agents against malicious hosts. In: Vigna, G. (ed.) Mobile Agents and Security. LNCS, vol.\u00a01419, pp. 44\u201360. Springer, Heidelberg (1998)"},{"key":"2_CR9","doi-asserted-by":"crossref","unstructured":"Wei, W., Du, J., Yu, T., Gu, X.: SecureMR: A Service Integrity Assurance Framework for MapReduce. In: Annual Computer Security Applications Conference, ACSAC 2009, December 7-11, pp. 73\u201382 (2009)","DOI":"10.1109\/ACSAC.2009.17"},{"key":"2_CR10","unstructured":"Zhao, S., Lo, V., Gauthier Dickey, C.: Result verification and trust-based scheduling in peer-to-peer grids. In: Fifth IEEE International Conference on Peer-to-Peer Computing, P2P 2005. IEEE (2005)"},{"key":"2_CR11","unstructured":"Szajda, D., Lawson, B., Owen, J.: Hardening functions for large scale distributed computations. In: Proceedings of the 2003 Symposium on Security and Privacy. IEEE (2003)"},{"key":"2_CR12","doi-asserted-by":"crossref","unstructured":"Xiao, Z., Xiao, Y.: Accountable MapReduce in cloud computing. In: SCNC 2011 (2011)","DOI":"10.1109\/INFCOMW.2011.5928788"},{"key":"2_CR13","unstructured":"Hadoop Tutorial, \n                    http:\/\/public.yahoo.com\/gogate\/hadoop-tutorial\/start-tutorial.html"},{"key":"2_CR14","doi-asserted-by":"crossref","unstructured":"Huang, C., Zhu, S., Wu, D.: Towards Trusted Services: Result Verification Schemes for MapReduce. In: 2012 12th IEEE\/ACM International Symposium on Cluster, Cloud and Grid Computing (CCGrid), May 13-16, pp. 41\u201348 (2012)","DOI":"10.1109\/CCGrid.2012.77"},{"key":"2_CR15","doi-asserted-by":"crossref","unstructured":"Kroese, D.P., Taimre, T., Botev, Z.I.: Uniform Random Number Generation. In: Handbook of Monte Carlo Methods, ch.\u00a01, p. 772. John Wiley & Sons, New York (2011)","DOI":"10.1002\/9781118014967"}],"container-title":["Advances in Intelligent Systems and Computing","Intelligent Distributed Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-11227-5_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,20]],"date-time":"2023-02-20T08:23:19Z","timestamp":1676881399000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-11227-5_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319112268","9783319112275"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-11227-5_2","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2015]]}}}