{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T05:02:30Z","timestamp":1742965350082,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":10,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783662474006"},{"type":"electronic","value":"9783662474013"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-662-47401-3_27","type":"book-chapter","created":{"date-parts":[[2015,6,19]],"date-time":"2015-06-19T08:27:04Z","timestamp":1434702424000},"page":"206-212","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Construction of Software and Hardware Resource Pool in Data Center Using Virtualization"],"prefix":"10.1007","author":[{"given":"Na","family":"Ye","sequence":"first","affiliation":[]},{"given":"Lili","family":"Dong","sequence":"additional","affiliation":[]},{"given":"Genqing","family":"Bian","sequence":"additional","affiliation":[]},{"given":"Jian","family":"Li","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,6,20]]},"reference":[{"issue":"9","key":"27_CR1","first-page":"776","volume":"15","author":"Q Han","year":"2014","unstructured":"Han, Q., Muhammad, S., Jieyao, L., Abdulla, G., Zulkanain, A.R., Torki, A.A.: Data center network architecture in cloud computing: review, taxonomy, and open research issues. J. Zhejiang Univ. Sci. C Comput. Electron. 15(9), 776\u2013793 (2014)","journal-title":"J. Zhejiang Univ. Sci. C Comput. Electron."},{"key":"27_CR2","unstructured":"Chao-Tung, Y., Wen-Chung, S., Chih-Lin, H., Fuu-Cheng, J., William, C.-C.C.: On construction of a distributed data storage system in cloud. Computing, .1\u201326 (2014)"},{"issue":"4","key":"27_CR3","first-page":"351","volume":"4","author":"F Wei","year":"2012","unstructured":"Wei, F., Xuezhi, W., Wubin, P., Shengjun, X.: Cloud computing: conceptions, key technologies and application. J. Nanjing Univ. Inf. Sci. Technol.: Nat. Sci. Ed. 4(4), 351\u2013361 (2012)","journal-title":"J. Nanjing Univ. Inf. Sci. Technol.: Nat. Sci. Ed."},{"issue":"7","key":"27_CR4","first-page":"2411","volume":"29","author":"Q Qiongfen","year":"2012","unstructured":"Qiongfen, Q., Chunlin, L., Xiaoqing, Z., Layuan, L.: Survey of virtual resource management in cloud data center. Appl. Res. Comput. 29(7), 2411\u20132415 (2012)","journal-title":"Appl. Res. Comput."},{"issue":"12","key":"27_CR5","first-page":"87","volume":"22","author":"L Sai","year":"2012","unstructured":"Sai, L., Xurong, L., Linrui, W.: Computing clouds resources pool model research based on queue theory. Comput. Technol. Dev. 22(12), 87\u201389 (2012)","journal-title":"Comput. Technol. Dev."},{"key":"27_CR6","doi-asserted-by":"crossref","unstructured":"Maricela-Georgiana, A.: Advantages and challenges of adopting cloud computing from an enterprise perspective. In: Proceedings of the 7th International Conference Interdisciplinary in Engineering (INTER-ENG 2013), pp.529\u2013534 (2014)","DOI":"10.1016\/j.protcy.2013.12.525"},{"key":"27_CR7","unstructured":"Brendan, J., Rolf, S.: Resource management in clouds: survey and research challenges. J. Netw. Syst. Manage, 1\u201353 (2014)"},{"key":"27_CR8","unstructured":"Information security technology-Baseline for classified protection of information system. http:\/\/www.cspec.gov.cn\/web\/Upload\/2011-04\/file\/zhengcefagui\/201104140231219218854.pdf"},{"key":"27_CR9","unstructured":"Backup Methods. http:\/\/baike.baidu.com\/view\/6432240.htm?fr=aladdin"},{"key":"27_CR10","unstructured":"LAN Free and Server Free backup methods analysis. http:\/\/www.360doc.com\/content\/11\/0309\/10\/5420793_99461431.shtml"}],"container-title":["Communications in Computer and Information Science","Trustworthy Computing and Services"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-662-47401-3_27","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,21]],"date-time":"2023-02-21T03:50:55Z","timestamp":1676951455000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-662-47401-3_27"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783662474006","9783662474013"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/978-3-662-47401-3_27","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2015]]},"assertion":[{"value":"20 June 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}