{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T14:17:57Z","timestamp":1742912277658,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":9,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811003554"},{"type":"electronic","value":"9789811003561"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-981-10-0356-1_19","type":"book-chapter","created":{"date-parts":[[2016,1,18]],"date-time":"2016-01-18T09:24:58Z","timestamp":1453109098000},"page":"192-201","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["The Improved Evaluation of Virtual Resources\u2019 Performance Algorithm Based on Computer Clusters"],"prefix":"10.1007","author":[{"given":"Suping","family":"Liu","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,1,19]]},"reference":[{"doi-asserted-by":"crossref","unstructured":"Foster, I., Zhao, Y., Raicu, I., Lu, S.: Cloud computing and grid computing 360-degree compared. In: Proceedings of IEEE Grid Computing Environments Workshop, pp. 1\u201310 (2008)","key":"19_CR1","DOI":"10.1109\/GCE.2008.4738445"},{"unstructured":"Peng, W.: The key technology of cloud computing and application examples, pp. 13\u201314. Posts and Telecom Press, Beijing (2010)","key":"19_CR2"},{"key":"19_CR3","first-page":"39","volume":"5","author":"SC Zhu","year":"2013","unstructured":"Zhu, S.C., Xu, Y., Jin, M.Y., Sheng, L.: Cloud computing security risk assessment based on level protection strategy. Comput. Secur. 5, 39\u201342 (2013)","journal-title":"Comput. Secur."},{"unstructured":"Yuan, H.C., Jia, W.G., Hu, J.F.: The research work of information security risk assessment in military colleges and universities network. In: Network security technology and Application. pp. 59\u201360, May 2009","key":"19_CR4"},{"unstructured":"Jian-xun, Z., Zhi-min, G., Chao, Z.: The reviewer of cloud computing research and development. Comput. Appl. 27(2), 429\u2013432 (2010)","key":"19_CR5"},{"unstructured":"Yu-jie, M., Jian, C., Shen-sheng, Z.: The research of extended WebService service quality model. Comput. Sci. 33(1), 4\u20139 (2006)","key":"19_CR6"},{"key":"19_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"271","DOI":"10.1007\/978-3-642-16515-3_34","volume-title":"Web Information Systems and Mining","author":"Y Fang","year":"2010","unstructured":"Fang, Y., Wang, F., Ge, J.: A task scheduling algorithm based on load balancing in cloud computing. In: Wang, F.L., Gong, Z., Luo, X., Lei, J. (eds.) Web Information Systems and Mining. LNCS, vol. 6318, pp. 271\u2013277. Springer, Heidelberg (2010)"},{"unstructured":"Ting-bin, C.,Yan-xia, L., Guo-jun, S.: The application of the fuzzy assessment method based on webservices. J. DaLian Jiaotong Univ. 30(1), 49\u201352 (2009)","key":"19_CR8"},{"unstructured":"Shi-bin, Z., Da-ke, H.: The research of establishment strategies on fuzzy independent trust. J. Electron. Inf. 28(8), 1493\u20131497 (2006)","key":"19_CR9"}],"container-title":["Communications in Computer and Information Science","Computational Intelligence and Intelligent Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-10-0356-1_19","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T06:43:33Z","timestamp":1559371413000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-981-10-0356-1_19"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9789811003554","9789811003561"],"references-count":9,"URL":"https:\/\/doi.org\/10.1007\/978-981-10-0356-1_19","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2016]]},"assertion":[{"value":"19 January 2016","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}