{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T13:01:03Z","timestamp":1725541263527},"publisher-location":"Berlin, Heidelberg","reference-count":8,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642334771"},{"type":"electronic","value":"9783642334788"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-33478-8_16","type":"book-chapter","created":{"date-parts":[[2012,9,28]],"date-time":"2012-09-28T01:27:16Z","timestamp":1348795636000},"page":"120-125","source":"Crossref","is-referenced-by-count":0,"title":["Study of a Fuzzy Comprehensive Evaluation Problem in Cloud Computing"],"prefix":"10.1007","author":[{"given":"Wenchuan","family":"Yang","sequence":"first","affiliation":[]},{"given":"Bei","family":"Jia","sequence":"additional","affiliation":[]},{"given":"Bowei","family":"Cao","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"16_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1007\/3-540-44598-6_3","volume-title":"Advances in Cryptology - CRYPTO 2000","author":"Y. Lindell","year":"2000","unstructured":"Lindell, Y., Pinkas, B.: Privacy Preserving Data Mining. In: Bellare, M. (ed.) CRYPTO 2000. LNCS, vol.\u00a01880, pp. 36\u201354. Springer, Heidelberg (2000)"},{"issue":"5","key":"16_CR2","first-page":"900","volume":"33","author":"Y.L. Luo","year":"2005","unstructured":"Luo, Y.L., Huang, L.S., et al.: An algorithm for privacy-preserving boolean association rule mining. Acta Electronica Sinica\u00a033(5), 900\u2013903 (2005) (in Chinese with English abstract)","journal-title":"Acta Electronica Sinica"},{"key":"16_CR3","unstructured":"Huang, Y.Q., Lu, Z.D., Hu, H.P.: A method of security improvement for privacy preserving association rule mining over vertically partitioned data. In: Proceedings of the 9th International Database Engineering & Application Symposium, Washington, pp. 339\u2013343 (2005)"},{"issue":"4","key":"16_CR4","first-page":"709","volume":"36","author":"Q. Xiao","year":"2008","unstructured":"Xiao, Q., Luo, S.S., Chen, P., et al.: Research on the problem of secure multi-party ranking under semi-honest model. Acta Electronica Sinica\u00a036(4), 709\u2013714 (2008) (in Chinese with English abstract)","journal-title":"Acta Electronica Sinica"},{"issue":"4","key":"16_CR5","first-page":"25","volume":"21","author":"J. Chen","year":"2005","unstructured":"Chen, J., Liao, J.X., Chen, J.L.: A novel replacement algorithm based on multi-layer fuzzy decision policy with multi-factor. Journal on Communications\u00a021(4), 25\u201329 (2005) (in Chinese with English abstract)","journal-title":"Journal on Communications"},{"issue":"10","key":"16_CR6","doi-asserted-by":"publisher","first-page":"679","DOI":"10.1360\/crad20051006","volume":"42","author":"C.P. Mu","year":"2005","unstructured":"Mu, C.P., Huang, H.K., Tian, S.F., et al.: Intrusion-detection alerts processing based on fuzzy comprehensive evaluation. Journal of Computer Research and Development\u00a042(10), 679\u20131685 (2005) (in Chinese with English abstract)","journal-title":"Journal of Computer Research and Development"},{"key":"16_CR7","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9780511546891","volume-title":"Foundations of Cryptography: Basic Applications","author":"O. Goldreich","year":"2001","unstructured":"Goldreich, O.: Foundations of Cryptography: Basic Applications. Cambridge University Press, Cambridge (2001)"},{"key":"16_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"165","DOI":"10.1007\/3-540-44634-6_16","volume-title":"Algorithms and Data Structures","author":"M.J. Atallah","year":"2001","unstructured":"Atallah, M.J., Du, W.: Secure Multi-party Computational Geometry. In: Dehne, F., Sack, J.-R., Tamassia, R. (eds.) WADS 2001. LNCS, vol.\u00a02125, pp. 165\u2013179. Springer, Heidelberg (2001)"}],"container-title":["Lecture Notes in Computer Science","Artificial Intelligence and Computational Intelligence"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-33478-8_16.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,4]],"date-time":"2021-05-04T12:11:15Z","timestamp":1620130275000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-33478-8_16"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642334771","9783642334788"],"references-count":8,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-33478-8_16","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2012]]}}}