{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,2]],"date-time":"2025-12-02T03:29:05Z","timestamp":1764646145951,"version":"3.40.3"},"publisher-location":"Cham","reference-count":20,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319723945"},{"type":"electronic","value":"9783319723952"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-72395-2_43","type":"book-chapter","created":{"date-parts":[[2017,12,8]],"date-time":"2017-12-08T04:56:41Z","timestamp":1512709001000},"page":"468-478","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Research on Coupling Reliability Problem in Sensor-Cloud System"],"prefix":"10.1007","author":[{"given":"Yuzhu","family":"Liang","sequence":"first","affiliation":[]},{"given":"Tian","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Md Zakirul Alam","family":"Bhuiyan","sequence":"additional","affiliation":[]},{"given":"Anfeng","family":"Liu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,12,9]]},"reference":[{"issue":"2","key":"43_CR1","doi-asserted-by":"crossref","first-page":"243","DOI":"10.1007\/s10796-014-9492-7","volume":"17","author":"S Li","year":"2015","unstructured":"Li, S., Da Xu, L., Zhao, S.: The internet of things: a survey. Inf. Syst. Front. 17(2), 243\u2013259 (2015)","journal-title":"Inf. Syst. Front."},{"issue":"3","key":"43_CR2","doi-asserted-by":"crossref","first-page":"221","DOI":"10.1007\/s12599-015-0383-3","volume":"57","author":"F Wortmann","year":"2015","unstructured":"Wortmann, F., Fl\u00fcchter, K.: Internet of things [J]. Business & Information Systems Engineering 57(3), 221\u2013224 (2015)","journal-title":"Business & Information Systems Engineering"},{"issue":"1","key":"43_CR3","doi-asserted-by":"crossref","first-page":"22","DOI":"10.1109\/JIOT.2014.2306328","volume":"1","author":"A Zanella","year":"2014","unstructured":"Zanella, A., Bui, N., Castellani, A., et al.: Internet of things for smart cities. IEEE Internet Things J. 1(1), 22\u201332 (2014)","journal-title":"IEEE Internet Things J."},{"issue":"1","key":"43_CR4","doi-asserted-by":"crossref","first-page":"525","DOI":"10.1109\/COMST.2014.2363950","volume":"18","author":"I Al-Anbagi","year":"2016","unstructured":"Al-Anbagi, I., Erol-Kantarci, M., Mouftah, H.T.: A survey on cross-layer quality-of-service approaches in WSNs for delay and reliability-aware applications. IEEE Commun. Sur. Tutorials 18(1), 525\u2013552 (2016)","journal-title":"IEEE Commun. Sur. Tutorials"},{"issue":"1","key":"43_CR5","doi-asserted-by":"crossref","first-page":"139","DOI":"10.3390\/s17010139","volume":"17","author":"T Wang","year":"2017","unstructured":"Wang, T., Wu, Q., Wen, S., et al.: Propagation modeling and defending of a mobile sensor worm in wireless sensor and actuator networks. Sensors 17(1), 139 (2017)","journal-title":"Sensors"},{"issue":"99","key":"43_CR6","first-page":"1","volume":"PP","author":"T Wang","year":"2017","unstructured":"Wang, T., Li, Y., Wang, G., et al.: Sustainable and efficient data collection from WSNs to cloud. IEEE Trans. Sustain. Comput. PP(99), 1 (2017)","journal-title":"IEEE Trans. Sustain. Comput."},{"issue":"5","key":"43_CR7","first-page":"925","volume":"54","author":"J Zeng","year":"2017","unstructured":"Zeng, J., Wang, T., Jia, W., et al.: A survey on sensor-cloud. J. Comput. Res. Dev. 54(5), 925\u2013939 (2017)","journal-title":"J. Comput. Res. Dev."},{"key":"43_CR8","doi-asserted-by":"crossref","first-page":"357","DOI":"10.1016\/j.ins.2015.01.025","volume":"305","author":"M Ali","year":"2015","unstructured":"Ali, M., Khan, S.U., Vasilakos, A.V.: Security in cloud computing: opportunities and challenges. Inf. Sci. 305, 357\u2013383 (2015)","journal-title":"Inf. Sci."},{"issue":"C","key":"43_CR9","doi-asserted-by":"crossref","first-page":"684","DOI":"10.1016\/j.future.2015.09.021","volume":"56","author":"A Botta","year":"2016","unstructured":"Botta, A., Donato, W.D., Persico, V., et al.: Integration of cloud computing and internet of things: a survey. Future Gener. Comput. Syst. 56(C), 684\u2013700 (2016)","journal-title":"Future Gener. Comput. Syst."},{"issue":"99","key":"43_CR10","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1109\/ACCESS.2017.2689773","volume":"PP","author":"T Wang","year":"2017","unstructured":"Wang, T., Zeng, J., Bhuiyan, M.Z.A., et al.: Trajectory privacy preservation based on a fog structure in cloud location services. IEEE Access PP(99), 1 (2017)","journal-title":"IEEE Access"},{"key":"43_CR11","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1007\/978-3-319-12718-7_6","volume-title":"Trusted Cloud Computing","author":"M Henze","year":"2014","unstructured":"Henze, M., Hummen, R., Matzutt, R., Wehrle, K.: A trust point-based security architecture for sensor data in the cloud. In: Krcmar, H., Reussner, R., Rumpe, B. (eds.) Trusted Cloud Computing, pp. 77\u2013106. Springer, Cham (2014). https:\/\/doi.org\/10.1007\/978-3-319-12718-7_6"},{"key":"43_CR12","doi-asserted-by":"crossref","first-page":"1375","DOI":"10.1109\/ACCESS.2016.2549047","volume":"4","author":"A Sajid","year":"2016","unstructured":"Sajid, A., Abbas, H., Saleem, K.: Cloud-assisted IoT-based SCADA systems security: a review of the state of the art and future challenges. IEEE Access 4, 1375\u20131384 (2016)","journal-title":"IEEE Access"},{"key":"43_CR13","doi-asserted-by":"crossref","first-page":"701","DOI":"10.1016\/j.future.2015.09.016","volume":"56","author":"M Henze","year":"2016","unstructured":"Henze, M., Hermerschmidt, L., Kerpen, D., et al.: A comprehensive approach to privacy in the cloud-based Internet of things. Future Gener. Comput. Syst. 56, 701\u2013718 (2016)","journal-title":"Future Gener. Comput. Syst."},{"key":"43_CR14","doi-asserted-by":"crossref","first-page":"30","DOI":"10.1016\/j.tcs.2016.01.002","volume":"618","author":"H Zhu","year":"2016","unstructured":"Zhu, H., Liu, D., Zhang, S., et al.: Solving the many to many assignment problem by improving the Kuhn-Munkres algorithm with backtracking. Theor. Comput. Sci. 618, 30\u201341 (2016)","journal-title":"Theor. Comput. Sci."},{"issue":"06","key":"43_CR15","doi-asserted-by":"crossref","first-page":"436","DOI":"10.4236\/ajor.2016.66040","volume":"6","author":"SK Amponsah","year":"2016","unstructured":"Amponsah, S.K., Otoo, D., Salhi, S., et al.: Proposed heuristic method for solving assignment problems. Am. J. Oper. Res. 6(06), 436 (2016)","journal-title":"Am. J. Oper. Res."},{"issue":"4","key":"43_CR16","doi-asserted-by":"crossref","first-page":"611","DOI":"10.1111\/rssc.12093","volume":"64","author":"HW Kuhn","year":"2015","unstructured":"Kuhn, H.W.: Statement for naval research logistics: \u201cthe Hungarian method for the assignment problem\u2019\u2019. J. R. Stat. Soc. 64(4), 611\u2013633 (2015)","journal-title":"J. R. Stat. Soc."},{"issue":"2","key":"43_CR17","doi-asserted-by":"crossref","first-page":"222","DOI":"10.1109\/TCC.2014.2314655","volume":"2","author":"MA Rodriguez","year":"2014","unstructured":"Rodriguez, M.A., Buyya, R.: Deadline based resource provisioning and scheduling algorithm for scientific workflows on clouds. IEEE Trans. Cloud Comput. 2(2), 222\u2013235 (2014)","journal-title":"IEEE Trans. Cloud Comput."},{"issue":"4","key":"43_CR18","first-page":"259","volume":"2","author":"U Bhoi","year":"2013","unstructured":"Bhoi, U., Ramanuj, P.N.: Enhanced max-min task scheduling algorithm in cloud computing. Int. J. Appl. Innov. Eng. Manag. (IJAIEM) 2(4), 259\u2013264 (2013)","journal-title":"Int. J. Appl. Innov. Eng. Manag. (IJAIEM)"},{"issue":"5","key":"43_CR19","doi-asserted-by":"crossref","first-page":"684","DOI":"10.3846\/20294913.2015.1056275","volume":"21","author":"E Vizuete-Luciano","year":"2015","unstructured":"Vizuete-Luciano, E., Merig\u00f3, J.M., Gil-Lafuente, A.M., et al.: Decision making in the assignment process by using the Hungarian algorithm with OWA operators. Technol. Econ. Dev. Econ. 21(5), 684\u2013704 (2015)","journal-title":"Technol. Econ. Dev. Econ."},{"issue":"6","key":"43_CR20","doi-asserted-by":"crossref","first-page":"625","DOI":"10.1109\/LWC.2014.2338318","volume":"3","author":"T Kim","year":"2014","unstructured":"Kim, T., Dong, M.: An iterative Hungarian method to joint relay selection and resource allocation for D2D communications. IEEE Wirel. Commun. Lett. 3(6), 625\u2013628 (2014)","journal-title":"IEEE Wirel. Commun. Lett."}],"container-title":["Lecture Notes in Computer Science","Security, Privacy, and Anonymity in Computation, Communication, and Storage"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-72395-2_43","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,7]],"date-time":"2019-10-07T14:07:30Z","timestamp":1570457250000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-72395-2_43"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319723945","9783319723952"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-72395-2_43","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]}}}