{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T07:00:27Z","timestamp":1742972427889,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":20,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811908514"},{"type":"electronic","value":"9789811908521"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-981-19-0852-1_21","type":"book-chapter","created":{"date-parts":[[2022,3,9]],"date-time":"2022-03-09T09:02:53Z","timestamp":1646816573000},"page":"269-283","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Research on Cloud Computing Security Technology of Power System"],"prefix":"10.1007","author":[{"given":"Hongzhang","family":"Xiong","sequence":"first","affiliation":[]},{"given":"Jie","family":"Cheng","sequence":"additional","affiliation":[]},{"given":"YanJin","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Xiaokun","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Kuo","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,3,10]]},"reference":[{"issue":"7","key":"21_CR1","doi-asserted-by":"publisher","first-page":"81","DOI":"10.14445\/22312803\/IJCTT-V9P163","volume":"9","author":"A Agarwal","year":"2014","unstructured":"Agarwal, A., Jain, S.: Efficient optimal algorithm of task scheduling in cloud computing environment. Int. J. Comput. Trends Tech 9(7), 81\u201383 (2014)","journal-title":"Int. J. Comput. Trends Tech"},{"key":"21_CR2","unstructured":"Fu, T.: Discussion on resource pool construction of power grid enterprise information system on account of cloud computing. Electron. World 24, 7 (2014)"},{"issue":"33","key":"21_CR3","first-page":"27","volume":"17","author":"C Huang","year":"2015","unstructured":"Huang, C.: Discussion on data security technology of power information system on account of cloud computing. Sci. Technol. Innov. 17(33), 27\u201328 (2015)","journal-title":"Sci. Technol. Innov."},{"issue":"11","key":"21_CR4","first-page":"99","volume":"41","author":"L Fei","year":"2017","unstructured":"Fei, L., Qi, H., Yuan, J., et al.: Realization of graphic browsing service for GIS platform of power transmission and distribution. Power Syst. Autom. 41(11), 99\u2013105 (2017)","journal-title":"Power Syst. Autom."},{"key":"21_CR5","first-page":"23","volume":"12","author":"X Liu","year":"2016","unstructured":"Liu, X., Ma, L., Yu, H.: Research on data security technology of power information system in cloud computing environment. Info Comput. Theor. Ed. 12, 23\u201324 (2016)","journal-title":"Info Comput. Theor. Ed."},{"issue":"6","key":"21_CR6","first-page":"16","volume":"22","author":"X Luo","year":"2012","unstructured":"Luo, X., Duan, X.: Research on multi graph display and hierarchical management in power system software. Power Autom. Equipment 22(6), 16\u201319 (2012)","journal-title":"Power Autom. Equipment"},{"key":"21_CR7","unstructured":"Maguluri, S.T.: Optimal resource allocation algorithms for cloud computing Dissertations Theses-Gradworks, (5), pp. 634\u2013645 (2015)"},{"key":"21_CR8","first-page":"74","volume":"12","author":"J Ni","year":"2016","unstructured":"Ni, J., Han, Q.: Design of data recovery system for power information system on account of Oracle database. Electr. Utilizations 12, 74\u201376 (2016)","journal-title":"Electr. Utilizations"},{"issue":"15","key":"21_CR9","first-page":"88","volume":"24","author":"L Qiao","year":"2016","unstructured":"Qiao, L., Hu, N., Tong, D., et al.: Design of power grid integrated information system on account of GIS technology. Electron. Des. Eng. 24(15), 88\u201392 (2016)","journal-title":"Electron. Des. Eng."},{"issue":"6","key":"21_CR10","first-page":"70","volume":"51","author":"C Qu","year":"2014","unstructured":"Qu, C., Diao, Y., Bo, X., et al.: Database caching model of power information system on account of multi prediction tree combination algorithm. Electr. Measure. Instrum. 51(6), 70\u201375 (2014)","journal-title":"Electr. Measure. Instrum."},{"key":"21_CR11","first-page":"187","volume":"7","author":"Z Su","year":"2014","unstructured":"Su, Z.: Infrastructure and key technologies of power data center on account of cloud computing. East China Sci. Technol. Acad. Ed. 7, 187 (2014)","journal-title":"East China Sci. Technol. Acad. Ed."},{"key":"21_CR12","first-page":"10","volume":"4","author":"B Wang","year":"2015","unstructured":"Wang, B., Liu, Z.: Remote file synchronization optimization model on account of Rsync. Comput. Modernization 4, 10\u201313 (2015)","journal-title":"Comput. Modernization"},{"issue":"5","key":"21_CR13","first-page":"1008","volume":"24","author":"X Wang","year":"2017","unstructured":"Wang, X., Yan, J., Zeng, Q.: Intelligent task scheduling algorithm for multi-level optimization in cloud computing. Control. Eng. 24(5), 1008\u20131012 (2017)","journal-title":"Control. Eng."},{"key":"21_CR14","first-page":"101","volume":"7","author":"Y Wang","year":"2015","unstructured":"Wang, Y., Chang, F.: Utilization and analysis of cloud computing technology in power system. Comput. Knowl. Technol. 7, 101\u2013122 (2015)","journal-title":"Comput. Knowl. Technol."},{"issue":"2","key":"21_CR15","first-page":"111","volume":"48","author":"K Wu","year":"2015","unstructured":"Wu, K., Liu, W., Li, Y., et al.: Power big data analysis technology and utilization on account of cloud computing. China Electr. Power 48(2), 111\u2013116 (2015)","journal-title":"China Electr. Power"},{"key":"21_CR16","first-page":"65","volume":"8","author":"F Xie","year":"2015","unstructured":"Xie, F., Ding, Y.: Data security protection technology in the process of information system management and control. Netw. Secur. Technol. Utilization 8, 65 (2015)","journal-title":"Netw. Secur. Technol. Utilization"},{"key":"21_CR17","first-page":"189","volume":"22","author":"Y Jie","year":"2014","unstructured":"Jie, Y., Tian, N., Yi, Y.: Utilization effect of smart grid information platform on account of cloud computing. Electron. Technol. Softw. Eng. 22, 189\u2013190 (2014)","journal-title":"Electron. Technol. Softw. Eng."},{"key":"21_CR18","unstructured":"Yang, Y., Jiang, X., Wu, S.: Exploring the security problems and Countermeasures of power information system. Info Commun. 190(10), 284\u2013285 (2018)"},{"issue":"3","key":"21_CR19","first-page":"84","volume":"36","author":"Z Chun","year":"2015","unstructured":"Chun, Z., Jing, C.: Cloud environment service classification algorithm on account of data mining technology. Laser J. 36(3), 84\u201387 (2015)","journal-title":"Laser J."},{"key":"21_CR20","first-page":"233","volume":"14","author":"H Zhou","year":"2018","unstructured":"Zhou, H.: Research on information security of power system. China Hi Tech Zone 14, 233 (2018)","journal-title":"China Hi Tech Zone"}],"container-title":["Communications in Computer and Information Science","Big Data and Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-19-0852-1_21","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,3,9]],"date-time":"2022-03-09T09:07:10Z","timestamp":1646816830000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-19-0852-1_21"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9789811908514","9789811908521"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-981-19-0852-1_21","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"10 March 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICBDS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Big Data and Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Shenzhen","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26 November 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"28 November 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"3","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"icbds2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.icbds.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"CMT","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"221","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"46","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"13","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"21% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}