{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,11]],"date-time":"2025-03-11T18:40:22Z","timestamp":1741718422373,"version":"3.38.0"},"publisher-location":"Berlin, Heidelberg","reference-count":22,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642240812"},{"type":"electronic","value":"9783642240829"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-24082-9_36","type":"book-chapter","created":{"date-parts":[[2011,9,20]],"date-time":"2011-09-20T11:31:55Z","timestamp":1316518315000},"page":"290-297","source":"Crossref","is-referenced-by-count":0,"title":["The Design of Personal Virtualization Rule Based on Context-Awareness in Environment of Cloud Computing"],"prefix":"10.1007","author":[{"given":"Hyogun","family":"Yoon","sequence":"first","affiliation":[]},{"given":"Hanku","family":"Lee","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"36_CR1","doi-asserted-by":"crossref","unstructured":"Goldberg, R.P.: Survey of Virtual Machine Research. IEEE Computer Magazine, 34\u201345 (1974)","DOI":"10.1109\/MC.1974.6323581"},{"issue":"6","key":"36_CR2","doi-asserted-by":"publisher","first-page":"1130","DOI":"10.1007\/s11390-010-9394-1","volume":"25","author":"S.X. Wang","year":"2010","unstructured":"Wang, S.X., Zhang, L., Wang, S., et al.: A cloud-based trust model for evaluating quality of Web services. Journal of Computer Science and Technology\u00a025(6), 1130\u20131142 (2010)","journal-title":"Journal of Computer Science and Technology"},{"key":"36_CR3","doi-asserted-by":"crossref","unstructured":"Tchepnda, C., Riguidel, M.: Distributed Trust Infrastructure and Trust-Security articulation:Application to Heterogeneous networks. In: Advanced Information Networking and Applications (AINA 2006), vol.\u00a02, pp. 33\u201338 (2006)","DOI":"10.1109\/AINA.2006.150"},{"key":"36_CR4","doi-asserted-by":"crossref","unstructured":"Brakensiek, J., Droge, A., Hartig, H., Lackorzynski, A., Botteck, M.: Virtualization as an Enabler for Security in Mobile Devices. In: Proc. of the 1st Workshop on Isolation and Integration in Embedded Systems, pp. 17\u201322 (2008)","DOI":"10.1145\/1435458.1435462"},{"issue":"5","key":"36_CR5","doi-asserted-by":"publisher","first-page":"70","DOI":"10.1038\/scientificamerican1106-70","volume":"295","author":"M. Hypponen","year":"2006","unstructured":"Hypponen, M.: Malware Goes Mobile. Scientific American\u00a0295(5), 70\u201377 (2006)","journal-title":"Scientific American"},{"key":"36_CR6","unstructured":"VirtualLogix VLX for Mobile handsets, http:\/\/www.virtuallogix.com\/products\/vlx-for-mobile-handsets.html"},{"issue":"3","key":"36_CR7","doi-asserted-by":"publisher","first-page":"270","DOI":"10.1007\/s11036-011-0305-7","volume":"16","author":"X. Zhang","year":"2011","unstructured":"Zhang, X., Kunjithapatham, A., Jeong, S., Simon, G.: Towards an Elastic Application Model for Augmenting the Computing Capabilities of Mobile Devices with Cloud Computing. Mobile Networks and Applicatons\u00a016(3), 270\u2013284 (2011)","journal-title":"Mobile Networks and Applicatons"},{"key":"36_CR8","unstructured":"Mui, L.: Computational Models of Trust and Reputation: Agents, Evolutionary Games, and Social Networks. PhD Thesis, Massachusetts Institute of Technology (2002)"},{"issue":"1","key":"36_CR9","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1016\/j.elerap.2008.08.001","volume":"8","author":"K.K. Bharadwaj","year":"2009","unstructured":"Bharadwaj, K.K., Al-Shamri, M.Y.H.: Fuzzy computational models for trust and reputation systems. Electronic Commerce Research and Applications\u00a08(1), 37\u201347 (2009)","journal-title":"Electronic Commerce Research and Applications"},{"issue":"3","key":"36_CR10","doi-asserted-by":"publisher","first-page":"377","DOI":"10.1016\/j.jss.2010.11.925","volume":"84","author":"T. Zhang","year":"2011","unstructured":"Zhang, T., Du, Z., Chen, Y., Ji, X., Wang, X.: Typical Virtual Appliances: An optimized mechanism for virtual appliances provisioning and management. The Journal of Systems and Software\u00a084(3), 377\u2013387 (2011)","journal-title":"The Journal of Systems and Software"},{"key":"36_CR11","doi-asserted-by":"crossref","unstructured":"Hwang, J., Suh, S., Heo, S., Park, C., Ryu, J., Park, S., Kim, C.: Xen on ARM:System Virtualization using Xen Hypervisor for ARM-based Secure Mobile Phones. In: Consumer Communications and Networking Conference 2008 (CCNC 2008), pp. 257\u2013261 (2008)","DOI":"10.1109\/ccnc08.2007.64"},{"key":"36_CR12","unstructured":"Grundig Mobile U900, http:\/\/linuxfordevices.com\/c\/a\/News\/Singlecore-Linux-phone-hitsthe-market , Heiser, G.: Virtualization for Embedded Systems. Open Kernel Labs (2007)"},{"key":"36_CR13","unstructured":"Heiser, G.: The Motorola Evoke QA4-A Case Study in Mobile Virtualization. Open Kernel Labs (2009)"},{"key":"36_CR14","doi-asserted-by":"crossref","unstructured":"Ryu, E., Kim, I., Kim, J., Eom, Y.: MyAV:An All round virtual Machine Monitor for Mobile Environments. In: Proc. of the 8th IEEE International Conference on Industrial Informatics 2010 (INDIN 2010), pp. 657\u2013662 (2010)","DOI":"10.1109\/INDIN.2010.5549664"},{"key":"36_CR15","unstructured":"VMware MVP (Mobile Virtualization Platform), http:\/\/www.vmware.com\/products\/mobile\/"},{"issue":"3","key":"36_CR16","doi-asserted-by":"publisher","first-page":"261","DOI":"10.1007\/s10462-010-9174-x","volume":"34","author":"H. Yoon","year":"2010","unstructured":"Yoon, H., Lee, M., Gatton, T.M.: A multi-agent based user context Bayesian neural network analysis system. Artificial Intelligence Review\u00a034(3), 261\u2013270 (2010)","journal-title":"Artificial Intelligence Review"},{"key":"36_CR17","doi-asserted-by":"crossref","unstructured":"Yoon, H., Kim, E., Lee, M., Lee, J., Gatton, T.M.: A Model of Sharing Based Multi-Agent to Support Adaptive Service in Ubiquitous Environment. In: Proceedings of the 2008 International Conference on Information Security and Assurance (ISA 2008), pp. 332\u2013337 (2008)","DOI":"10.1109\/ISA.2008.64"},{"key":"36_CR18","unstructured":"Dey, A.K., Abowd, G.D.: Towards a Better Understanding of Context and Context-Awareness. In: Proceedings of the CHI 2000 Workshop on The What, Who, Where, When and How of Context-Awareness (2000)"},{"key":"36_CR19","doi-asserted-by":"crossref","unstructured":"Schilit, B.N., Adams, N.I., Want, R.: Context-Aware Computing Applications. In: IEEE Workshop on Mobile Computing Systems and Applications, pp. 85\u201390 (1994)","DOI":"10.1109\/WMCSA.1994.16"},{"key":"36_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"117","DOI":"10.1007\/3-540-45809-3_9","volume-title":"UbiComp 2002: Ubiquitous Computing","author":"J.L. Crowley","year":"2002","unstructured":"Crowley, J.L., Coutaz, J., Rey, G., Reignier, P.: Perceptual Components for Context Aware Computing. In: Borriello, G., Holmquist, L.E. (eds.) UbiComp 2002. LNCS, vol.\u00a02498, pp. 117\u2013134. Springer, Heidelberg (2002)"},{"key":"36_CR21","doi-asserted-by":"crossref","unstructured":"Pascoe, J.: Adding generic contextual capabilities to wearable computers. In: Proceedings of 2nd International Symposium on Wearable Computers, pp. 92\u201399 (1998)","DOI":"10.1109\/ISWC.1998.729534"},{"key":"36_CR22","doi-asserted-by":"crossref","unstructured":"Moran, T.P., Dourish, P.: Introduction to This Special Issue on Comtext-Aware Computing. Human-Computer Ineraction (HCI)\u00a016 (2001)","DOI":"10.1207\/S15327051HCI16234_01"}],"container-title":["Lecture Notes in Computer Science","Convergence and Hybrid Information Technology"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-24082-9_36","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,11]],"date-time":"2025-03-11T18:22:34Z","timestamp":1741717354000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-24082-9_36"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642240812","9783642240829"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-24082-9_36","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2011]]}}}