{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T20:18:37Z","timestamp":1725913117655},"publisher-location":"Singapore","reference-count":20,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811064418"},{"type":"electronic","value":"9789811064425"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-981-10-6442-5_6","type":"book-chapter","created":{"date-parts":[[2017,10,5]],"date-time":"2017-10-05T01:54:47Z","timestamp":1507168487000},"page":"59-69","source":"Crossref","is-referenced-by-count":2,"title":["User Behaviour Authentication Model Based on Stochastic Petri Net in Cloud Environment"],"prefix":"10.1007","author":[{"given":"Peng","family":"Li","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Cheng","family":"Yang","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"He","family":"Xu","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Ting Fung","family":"LAU","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Ruchuan","family":"Wang","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2017,10,6]]},"reference":[{"issue":"3","key":"6_CR1","doi-asserted-by":"crossref","first-page":"119","DOI":"10.5626\/JCSE.2015.9.3.119","volume":"9","author":"Y Liu","year":"2015","unstructured":"Liu, Y., (Lindsay) Sun, Y., et al.: A survey of security and privacy challenges in cloud computing: solutions and future directions. J. Comput. Sci. Eng. 9(3), 119\u2013133 (2015)","journal-title":"J. Comput. Sci. Eng."},{"key":"6_CR2","doi-asserted-by":"crossref","unstructured":"Nanda, M., Tyagi, A., et al.: Hindrances in the security of cloud computing. In: International Conference of Cloud System and Big Data Engineering, pp. 193\u2013198 (2016)","DOI":"10.1109\/CONFLUENCE.2016.7508112"},{"key":"6_CR3","unstructured":"Chen, C., et al.: Cloud Computing Security Architecture. Science Press, Beijing (2014). (in Chinese)"},{"key":"6_CR4","unstructured":"Hu, T., Feng, M., Tang, H.: Security Technology and Application in Cloud Computing. Publishing House of Electronics Industry, Beijing (2012). (in Chinese)"},{"issue":"12","key":"6_CR5","doi-asserted-by":"crossref","first-page":"37","DOI":"10.14257\/ijmue.2014.9.12.04","volume":"9","author":"D Wei","year":"2014","unstructured":"Wei, D., Zilong, J.: A study on analysis engine for large-scale user behavior based on cloud computing. Int. J. Multimed. Ubiquitous Eng. 9(12), 37\u201348 (2014)","journal-title":"Int. J. Multimed. Ubiquitous Eng."},{"issue":"6","key":"6_CR6","first-page":"29","volume":"10","author":"H Tang","year":"2016","unstructured":"Tang, H., Mantao, W.: User identity authentication based on the combination of mouse and keyboard behavior. Int. J. Secur. Appl. 10(6), 29\u201336 (2016)","journal-title":"Int. J. Secur. Appl."},{"key":"6_CR7","doi-asserted-by":"crossref","unstructured":"Senthil Kumar, T., Suresh, A., Karumathil, A.: Improvised classification model for cloud based authentication using keystroke dynamics. In: Frontier and Innovation in Future Computing and Communications (2014)","DOI":"10.1007\/978-94-017-8798-7_97"},{"key":"6_CR8","doi-asserted-by":"crossref","unstructured":"Zhao, C., Tu, S., Chen, H., et al.: Efficient association rule mining algorithm based on user behavior for cloud security auditing. In: IEEE International Conference of Online Analysis and Computing Science, pp. 145\u2013149. IEEE (2016)","DOI":"10.1109\/ICOACS.2016.7563067"},{"key":"6_CR9","doi-asserted-by":"crossref","unstructured":"Chiu, C.Y., Yeh, C.T., Lee, Y.J.: Frequent pattern based user behavior anomaly detection for cloud system. In: Technologies and Applications of Artificial Intelligence, pp. 61\u201366. IEEE (2013)","DOI":"10.1109\/TAAI.2013.25"},{"key":"6_CR10","doi-asserted-by":"crossref","unstructured":"Ahmed-Nacer, A., Ahmed-Nacer, M.: Strong authentication for mobile cloud computing. In: 13th International Conference on New Technologies for Distributed Systems. IEEE (2016)","DOI":"10.1109\/NOTERE.2016.7745824"},{"key":"6_CR11","doi-asserted-by":"crossref","unstructured":"Bakar, K.A.A., Haron, G.R.: Adaptive authentication based on analysis of user behavior. In: Science and Information Conference, London (2014)","DOI":"10.1109\/SAI.2014.6918248"},{"key":"6_CR12","doi-asserted-by":"crossref","unstructured":"Brosso, I., La Neve, A., et al.: A continuous authentication system based on user behavior analysis. In: 2010 International Conference on Availability, Reliability and Security. IEEE (2010)","DOI":"10.1109\/ARES.2010.63"},{"key":"6_CR13","unstructured":"Junfeng, T., Xun, C.: A cloud user behavior authentication model based on multi-partite graphs. J. Comput. Res. Develop., 51(10), 2308\u20132317 (2014). (in Chinese)"},{"key":"6_CR14","unstructured":"Chen, Y., Tian, L., Yang, Y.: Modeling and analysis of dynamic user behavior authentication scheme in cloud computing. J. Syst. Simul., 23(11): 2302\u20132307 (2011). (in Chinese)"},{"key":"6_CR15","doi-asserted-by":"crossref","unstructured":"Yarui, C., Liqin, T.: Modelling and performance analysis of user behavior authentication using stochastic Petri Nets. In: 2012 International Conference on Industrial Control and Electronics Engineering, pp. 1421\u20131425. IEEE (2012)","DOI":"10.1109\/ICICEE.2012.375"},{"key":"6_CR16","doi-asserted-by":"crossref","unstructured":"Lu, X., Xu, Y.: An user behavior credibility authentication model in cloud computing environment. In: 2nd International Conference on Information Technology and Electronic Commerce, pp. 271\u2013275. IEEE (2014)","DOI":"10.1109\/ICITEC.2014.7105617"},{"key":"6_CR17","doi-asserted-by":"crossref","unstructured":"Jun-Jian, L., Li-Qin, T.: User\u2019s behavior trust evaluate algorithm based on cloud model. In: 2015 Fifth International Conference on Instrumentation and Measurement, Computer, Communication and Control, pp. 556\u2013561. IEEE (2015)","DOI":"10.1109\/IMCCC.2015.123"},{"key":"6_CR18","doi-asserted-by":"crossref","unstructured":"Hosseini, S.B., Shojaee, A., Agheli, N.: A new method for evaluating cloud computing user behavior trust. In: 2015 7th International Conference on Information and Knowledge Technology, pp. 1\u20136. IEEE (2015)","DOI":"10.1109\/IKT.2015.7288735"},{"key":"6_CR19","doi-asserted-by":"crossref","unstructured":"Fan, L.J., Wang, Y.Z., et al.: Privacy Petri Net and privacy leak software. J. Comput. Sci. Technol., 30(6): 1318\u20131343 (2015). (in Chinese)","DOI":"10.1007\/s11390-015-1601-7"},{"issue":"3","key":"6_CR20","doi-asserted-by":"crossref","first-page":"81","DOI":"10.14257\/ijdta.2016.9.3.09","volume":"9","author":"F Jie","year":"2016","unstructured":"Jie, F.: Mining analysis on user search behavior based on hadoop. Int. J. Database Theory Appl. 9(3), 81\u201386 (2016)","journal-title":"Int. J. Database Theory Appl."}],"container-title":["Communications in Computer and Information Science","Parallel Architecture, Algorithm and Programming"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-10-6442-5_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,4]],"date-time":"2019-10-04T04:08:50Z","timestamp":1570162130000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-981-10-6442-5_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9789811064418","9789811064425"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-981-10-6442-5_6","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2017]]}}}