{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,10]],"date-time":"2024-09-10T05:33:54Z","timestamp":1725946434746},"publisher-location":"Cham","reference-count":14,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319737669"},{"type":"electronic","value":"9783319737676"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-73767-6_7","type":"book-chapter","created":{"date-parts":[[2018,1,31]],"date-time":"2018-01-31T10:33:39Z","timestamp":1517394819000},"page":"121-133","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Virtualization Model for Processing of the Sensitive Mobile Data"],"prefix":"10.1007","author":[{"given":"Andrzej","family":"Wilczy\u0144ski","sequence":"first","affiliation":[]},{"given":"Joanna","family":"Ko\u0142odziej","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,2,1]]},"reference":[{"key":"7_CR1","volume-title":"Data Virtualization for Business Intelligence Systems: Revolutionizing Data Integration for Data Warehouses","author":"R Lans van der","year":"2012","unstructured":"van der Lans, R.: Data Virtualization for Business Intelligence Systems: Revolutionizing Data Integration for Data Warehouses. Morgan Kaufmann Publishers Inc., San Francisco (2012)"},{"key":"7_CR2","doi-asserted-by":"crossref","first-page":"84106","DOI":"10.1016\/j.future.2012.05.023","volume":"29","author":"N Fernando","year":"2013","unstructured":"Fernando, N., Loke, S.W., Rahayu, W.: Mobile cloud computing: a survey. Future Gener. Comput. Syst. 29, 84106 (2013)","journal-title":"Future Gener. Comput. Syst."},{"key":"7_CR3","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-44881-7_12","volume-title":"Big Data Security","author":"A Jak\u00f3bik","year":"2016","unstructured":"Jak\u00f3bik, A.: Big Data Security. Springer, Berlin (2016). https:\/\/doi.org\/10.1007\/978-3-319-44881-7_12"},{"key":"7_CR4","unstructured":"Software, R.: Rocket data virtualization. PDF document, http:\/\/www.rocketsoftware.com\/sites\/default\/files\/resource_files\/DS_Data_DVS%20012615.pdf?flag=meta&product=rocket-data-virtualization&family=rocket-data&solution=data-virtualization&resourcetype=datasheet&resourcebn=rocket-data-virtualization&resourcefbn=DS_Data_DVS%20012615.pdf"},{"key":"7_CR5","unstructured":"Redhat: Jboss data virtualization. Electronic document, https:\/\/developers.openshift.com\/jboss-xpaas\/data-virtualization.html"},{"key":"7_CR6","unstructured":"Kidozen: From mdm to mdm. PDF document, http:\/\/www.kidozen.website\/wp-content\/uploads\/2015\/12\/Mobile_Data_Virtualization.pdf"},{"key":"7_CR7","doi-asserted-by":"crossref","first-page":"10991110","DOI":"10.1007\/s10586-015-0468-2","volume":"18","author":"P Pouladzadeh","year":"2015","unstructured":"Pouladzadeh, P., Peddi, S.V.B., Kuhad, P., Yassine, A., Shirmohammadi, S.: A virtualization mechanism for real-time multimedia-assisted mobile food recognition application in cloud computing. Cluster Comput. 18, 10991110 (2015)","journal-title":"Cluster Comput."},{"key":"7_CR8","doi-asserted-by":"crossref","first-page":"3854","DOI":"10.1016\/j.jnca.2017.02.001","volume":"84","author":"M Mollah","year":"2017","unstructured":"Mollah, M., Azad, M.A.K., Vasilakos, A.: Security and privacy challenges in mobile cloud computing: Survey and way ahead. J. Netw. Comput. Appl. 84, 3854 (2017)","journal-title":"J. Netw. Comput. Appl."},{"key":"7_CR9","first-page":"323353","volume":"33","author":"V Ciriani","year":"2007","unstructured":"Ciriani, V., De Capitani, S., di Vimercati, S., Foresti, P.Samarati: k-anonymity. secure data management in decentralized systems. Adv. Inf. Secur. 33, 323353 (2007)","journal-title":"Adv. Inf. Secur."},{"key":"7_CR10","doi-asserted-by":"crossref","unstructured":"A.\u00a0Machanavajjhala J.\u00a0Gehrke, D.Kifer, M. Venkitasubramaniam: l-diversity: Privacy beyond k-anonymity. Proceedings of the 22nd International Conference on Data Engineering, 2006. ICDE \u201906. pp. 24\u201324 (2006)","DOI":"10.1109\/ICDE.2006.1"},{"issue":"3","key":"7_CR11","doi-asserted-by":"publisher","first-page":"203","DOI":"10.1080\/01611194.2011.583711","volume":"35","author":"SM Bellovin","year":"2011","unstructured":"Bellovin, S.M.: Frank miller: Inventor of the one-time pad. Cryptologia 35(3), 203\u2013222 (2011). https:\/\/doi.org\/10.1080\/01611194.2011.583711","journal-title":"Cryptologia"},{"key":"7_CR12","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-17401-8_9","volume-title":"Cryptographic Hash Functions: Theory and Practice","author":"B Preneel","year":"2010","unstructured":"Preneel, B.: Cryptographic Hash Functions: Theory and Practice. Springer, Berlin (2010). https:\/\/doi.org\/10.1007\/978-3-642-17401-8_9"},{"key":"7_CR13","volume-title":"Putting Statistical Disclosure Control Into Practice: The ARX Data Anonymization Tool","author":"F Prasser","year":"2015","unstructured":"Prasser, F., Kohlmayer, F.: Putting Statistical Disclosure Control Into Practice: The ARX Data Anonymization Tool. Springer, Berlin (2015)"},{"key":"7_CR14","first-page":"71","volume":"1","author":"A Jak\u00f3bik","year":"2017","unstructured":"Jak\u00f3bik, A., Wilczynski, A.: Using polymatrix extensive stackelberg games in security aware resource allocation and task scheduling in computational clouds. J. Telecommun. Inf. Technol. 1, 71\u201380 (2017)","journal-title":"J. Telecommun. Inf. Technol."}],"container-title":["Studies in Big Data","Modeling and Simulation in HPC and Cloud Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-73767-6_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,9]],"date-time":"2019-10-09T22:32:05Z","timestamp":1570660325000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-73767-6_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783319737669","9783319737676"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-73767-6_7","relation":{},"ISSN":["2197-6503","2197-6511"],"issn-type":[{"type":"print","value":"2197-6503"},{"type":"electronic","value":"2197-6511"}],"subject":[],"published":{"date-parts":[[2018]]}}}