{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T13:46:41Z","timestamp":1762004801075},"reference-count":17,"publisher":"Springer Science and Business Media LLC","issue":"2-3","license":[{"start":{"date-parts":[[2016,4,22]],"date-time":"2016-04-22T00:00:00Z","timestamp":1461283200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"name":"Special Program on Independent Innovation and Achievements Transformation of Shandong Province, China","award":["2014ZZCX03301"],"award-info":[{"award-number":["2014ZZCX03301"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Sign Process Syst"],"published-print":{"date-parts":[[2017,3]]},"DOI":"10.1007\/s11265-016-1130-9","type":"journal-article","created":{"date-parts":[[2016,4,22]],"date-time":"2016-04-22T03:33:45Z","timestamp":1461296025000},"page":"327-336","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":11,"title":["A Trusted Architecture for Virtual Machines on Cloud Servers with Trusted Platform Module and Certificate Authority"],"prefix":"10.1007","volume":"86","author":[{"given":"Zhilou","family":"Yu","sequence":"first","affiliation":[]},{"given":"Weipin","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Hongjun","family":"Dai","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,4,22]]},"reference":[{"issue":"13","key":"1130_CR1","doi-asserted-by":"crossref","first-page":"1893","DOI":"10.1002\/cpe.1614","volume":"22","author":"G Cheng","year":"2010","unstructured":"Cheng, G., Jin, H., Zou, D., & Zhang, X. (2010). Building dynamic and transparent integrity measurement and protection for virtualized platform in cloud computing. Concurrency and Computation: Practice and Experience, 22(13), 1893\u20131910.","journal-title":"Concurrency and Computation: Practice and Experience"},{"key":"1130_CR2","doi-asserted-by":"crossref","unstructured":"Danev, B., Masti, R.J., Karame, G.O., & Capkun, S. (2011). Enabling secure vm-vtpm migration in private clouds. In Proceedings of the 27th Annual Computer Security Applications Conference ACM (pp. 187\u2013196).","DOI":"10.1145\/2076732.2076759"},{"key":"1130_CR3","doi-asserted-by":"crossref","unstructured":"Dolan-Gavitt, B., Leek, T., Zhivich, M., Giffin, J., & Lee, W. (2011). Virtuoso: Narrowing the semantic gap in virtual machine introspection. In Security and privacy (SP) 2011 IEEE Symposium on IEEE (pp. 297\u2013312).","DOI":"10.1109\/SP.2011.11"},{"key":"1130_CR4","doi-asserted-by":"crossref","unstructured":"Haoyang, S., Dan, W., & Yifang, Z. (2012). A trust measurement model based on api calls. In Computer science & service system (CSSS) 2012 International Conference on IEEE (pp. 455\u2013458).","DOI":"10.1109\/CSSS.2012.120"},{"key":"1130_CR5","doi-asserted-by":"crossref","unstructured":"Jaeger, T., Sailer, R., & Shankar, U. (2006). Prima: Policy-reduced integrity measurement architecture. In Proceedings of the Eleventh ACM Symposium on Access Control Models and Technologies, ACM, New York, NY, USA, SACMAT \u201906, pp 19\u201328.","DOI":"10.1145\/1133058.1133063"},{"key":"1130_CR6","doi-asserted-by":"crossref","unstructured":"Krautheim, F.J., Phatak, D.S., & Sherman, A.T. (2010). Introducing the trusted virtual environment module: a new mechanism for rooting trust in cloud computing. In Trust and Trustworthy Computing (pp. 211\u2013227): Springer.","DOI":"10.1007\/978-3-642-13869-0_14"},{"key":"1130_CR7","doi-asserted-by":"crossref","unstructured":"Lewko, A., & Waters, B. (2011). Decentralizing attribute-based encryption. In Advances in Cryptology\u2013EUROCRYPT 2011 (pp. 568\u2013588): Springer.","DOI":"10.1007\/978-3-642-20465-4_31"},{"issue":"2","key":"1130_CR8","doi-asserted-by":"crossref","first-page":"379","DOI":"10.1016\/j.future.2011.04.012","volume":"28","author":"J Li","year":"2012","unstructured":"Li, J., Li, B., Wo, T., Hu, C., Huai, J., Liu, L., & Lam, K. (2012). Cyberguarder: a virtualization security assurance architecture for green cloud computing. Future Generation Computer Systems, 28(2), 379\u2013390.","journal-title":"Future Generation Computer Systems"},{"key":"1130_CR9","doi-asserted-by":"crossref","unstructured":"Li, M., Yu, S., Cao, N., & Lou, W. (2011). Authorized private keyword search over encrypted data in cloud computing. In Distributed Computing Systems (ICDCS), 2011 31st International Conference on, IEEE (pp. 383\u2013392).","DOI":"10.1109\/ICDCS.2011.55"},{"issue":"5","key":"1130_CR10","doi-asserted-by":"crossref","first-page":"518","DOI":"10.1016\/j.jcss.2012.11.002","volume":"79","author":"M Qiu","year":"2013","unstructured":"Qiu, M., Zhang, L., Ming, Z., Chen, Z., Qin, X., & Yang, L.T. (2013). Security-aware optimization for ubiquitous computing systems with seat graph approach. Journal of Computer and System Sciences, 79(5), 518\u2013529.","journal-title":"Journal of Computer and System Sciences"},{"key":"1130_CR11","first-page":"1","volume":"99","author":"M Qiu","year":"2014","unstructured":"Qiu, M., Chen, Z., Ming, Z., Qin, X., & Niu, J. (2014). Energy-aware data allocation with hybrid memory for mobile cloud systems. Systems Journal IEEE, 99, 1\u201310. doi: 10.1109\/JSYST.2014.2345733 .","journal-title":"Systems Journal IEEE"},{"issue":"9","key":"1130_CR12","doi-asserted-by":"crossref","first-page":"2263","DOI":"10.1016\/j.jss.2012.12.025","volume":"86","author":"MD Ryan","year":"2013","unstructured":"Ryan, M.D. (2013). Cloud computing security: The scientific challenge, and a survey of solutions. Journal of Systems and Software, 86(9), 2263\u20132268.","journal-title":"Journal of Systems and Software"},{"key":"1130_CR13","unstructured":"Sailer, R., Zhang, X., Jaeger, T., & Van Doorn, L. (2004). Design and implementation of a tcg-based integrity measurement architecture. In USENIX Security symposium, (Vol. 13 pp. 223\u2013238)."},{"key":"1130_CR14","unstructured":"Santos, N., Gummadi, K.P., & Rodrigues R. (2009). Towards trusted cloud computing. In Proceedings of the 2009 conference on hot topics in cloud computing, San Diego,California (pp. 3\u201313)."},{"key":"1130_CR15","doi-asserted-by":"crossref","unstructured":"Sidorov, V., & Ng, W.K. (2014). Model of an encrypted cloud relational database supporting complex predicates in where clause. In Cloud Computing (CLOUD), 2014 IEEE 7th International Conference on, IEEE (pp. 667\u2013672).","DOI":"10.1109\/CLOUD.2014.94"},{"key":"1130_CR16","doi-asserted-by":"crossref","unstructured":"Tseng, F.K., Chen, R.J., & Lin, B.S. (2013). ipeks: Fast and secure cloud data retrieval from the public-key encryption with keyword search. In Trust, Security and Privacy in Computing and Communications (TrustCom), 2013 12th IEEE International Conference on, IEEE (pp. 452\u2013458).","DOI":"10.1109\/TrustCom.2013.57"},{"key":"1130_CR17","doi-asserted-by":"crossref","unstructured":"Wen, Y., Lee, J., Liu, Z., Zheng, Q., Shi, W., Xu, S., & Suh, T. (2013). Multi-processor architectural support for protecting virtual machine privacy in untrusted cloud environment. In Proceedings of the ACM International Conference on Computing Frontiers, ACM (p. 25).","DOI":"10.1145\/2482767.2482799"}],"container-title":["Journal of Signal Processing Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11265-016-1130-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11265-016-1130-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11265-016-1130-9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11265-016-1130-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T12:22:31Z","timestamp":1559391751000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11265-016-1130-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,4,22]]},"references-count":17,"journal-issue":{"issue":"2-3","published-print":{"date-parts":[[2017,3]]}},"alternative-id":["1130"],"URL":"https:\/\/doi.org\/10.1007\/s11265-016-1130-9","relation":{},"ISSN":["1939-8018","1939-8115"],"issn-type":[{"value":"1939-8018","type":"print"},{"value":"1939-8115","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,4,22]]}}}