{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,8,22]],"date-time":"2023-08-22T02:14:46Z","timestamp":1692670486810},"reference-count":55,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2017,2,3]],"date-time":"2017-02-03T00:00:00Z","timestamp":1486080000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Pers Commun"],"published-print":{"date-parts":[[2017,8]]},"DOI":"10.1007\/s11277-017-4026-5","type":"journal-article","created":{"date-parts":[[2017,2,3]],"date-time":"2017-02-03T06:27:48Z","timestamp":1486103268000},"page":"3785-3812","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["P-Accountability: A Quantitative Study of Accountability in Networked Systems"],"prefix":"10.1007","volume":"95","author":[{"given":"Zhifeng","family":"Xiao","sequence":"first","affiliation":[]},{"given":"Yang","family":"Xiao","sequence":"additional","affiliation":[]},{"given":"Jie","family":"Wu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,2,3]]},"reference":[{"key":"4026_CR1","unstructured":"Department of Defense. (1985). Trusted computer system evaluation criteria. Technical Report 5200.28-STD, Department of Defense."},{"key":"4026_CR2","unstructured":"Yumerefendi, A. R., & Chase, J. S. (2005) The role of accountability in dependable distributed systems. In Proceedings of HotDep"},{"key":"4026_CR3","doi-asserted-by":"crossref","unstructured":"Yumerefendi, A. R., & Chase, J. S. (2004) Trust but verify: accountability for network services. In Proceedings of the 11th workshop on ACM SIGOPS European workshop (p. 37). Leuven: ACM.","DOI":"10.1145\/1133572.1133585"},{"issue":"5","key":"4026_CR4","doi-asserted-by":"crossref","first-page":"30","DOI":"10.1109\/MNET.2009.5274919","volume":"23","author":"Y Xiao","year":"2009","unstructured":"Xiao, Y. (2009). Flow-net methodology for accountability in wireless networks. IEEE Network, 23(5), 30\u201337.","journal-title":"IEEE Network"},{"issue":"1","key":"4026_CR5","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1002\/sec.348","volume":"5","author":"Y Xiao","year":"2012","unstructured":"Xiao, Y., Meng, K., & Takahashi, D. (2012). Accountability using flow-net: Design, implementation, and performance evaluation. Security and Communication Networks, 5(1), 29\u201349. doi: 10.1002\/sec.348 .","journal-title":"Security and Communication Networks"},{"issue":"12","key":"4026_CR6","doi-asserted-by":"crossref","first-page":"2509","DOI":"10.1002\/sec.407","volume":"7","author":"D Takahashi","year":"2014","unstructured":"Takahashi, D., Xiao, Y., & Meng, K. (2014). Virtual flow-net for accountability and forensics of computer and network systems. Security and Communication Networks, 7(12), 2509\u20132526.","journal-title":"Security and Communication Networks"},{"key":"4026_CR7","doi-asserted-by":"crossref","unstructured":"Fu, B., & Xiao, Y. (2014). A multi-resolution flow-net methodology for accountable logging and its application in TCP\/IP networks. In Proceedings of the IEEE international conference on communications 2014 (IEEE ICC 2014).","DOI":"10.1109\/ICC.2014.6883398"},{"issue":"4","key":"4026_CR8","doi-asserted-by":"crossref","first-page":"44","DOI":"10.1016\/j.comnet.2015.06.011","volume":"89","author":"B Fu","year":"2015","unstructured":"Fu, B., & Xiao, Y. (2015). A multi-resolution accountable logging and its applications. Computer Networks, 89(4), 44\u201358.","journal-title":"Computer Networks"},{"key":"4026_CR9","unstructured":"Fu, B., & Xiao, Y. (2012). Q-Accountable: A overhead-based quantifiable accountability in wireless networks. In Proceedings of IEEE consumer communications and networking conference (IEEE CCNC 2012) (pp. 138\u2013142)."},{"issue":"3","key":"4026_CR10","doi-asserted-by":"crossref","first-page":"1715","DOI":"10.1007\/s11277-014-1604-7","volume":"75","author":"B Fu","year":"2014","unstructured":"Fu, B., & Xiao, Y. (2014). Accountability and Q-Accountable logging in wireless networks. Wireless Personal Communications, 75(3), 1715\u20131746.","journal-title":"Wireless Personal Communications"},{"key":"4026_CR11","doi-asserted-by":"crossref","unstructured":"Haeberlen, A., Kouznetsov, P., & Druschel, P. (2007). PeerReview: Practical accountability for distributed systems. In Proceedings of twenty-first ACM SIGOPS symposium on operating systems principles (pp. 175\u2013188). New York, NY: ACM.","DOI":"10.1145\/1294261.1294279"},{"key":"4026_CR12","unstructured":"Andersen, D., Balakrishnan, H., Feamster, N., Koponen, T., Moon, D., & Shenker, S. (2007). Holding the internet accountable. ACM HotNets-VI."},{"key":"4026_CR13","doi-asserted-by":"crossref","unstructured":"Andersen, D., Feamster, N., Koponen, T., Moon, D., & Shenker, S. (2008). Accountable internet protocol (AIP). In Proceedings of the ACM SIGCOMM 2008 conference on data communication (pp. 339\u2013350). New York, NY: ACM.","DOI":"10.1145\/1402958.1402997"},{"key":"4026_CR14","doi-asserted-by":"crossref","unstructured":"Mirkovic, J., & Reiher, P. (2008). Building accountability into the future internet. In 4th workshop on secure network protocols, 2008 (pp. 45\u201351). NPSec 2008.","DOI":"10.1109\/NPSEC.2008.4664880"},{"key":"4026_CR15","unstructured":"Backes, M., Druschel, P., Haeberlen, A., & Unruh, D. (2009). CSAR: A practical and provable technique to make randomized systems accountable. In Proceedings of the 16th annual network and distributed system security symposium (NDSS\u201909), San Diego, CA."},{"key":"4026_CR16","doi-asserted-by":"crossref","unstructured":"Keller, E., Lee, R., & Rexford, J. (2009). Accountability in hosted virtual networks. In Proceedings of the ACM SIGCOMM workshop on virtualized infrastructure systems and architectures (VISA).","DOI":"10.1145\/1592648.1592654"},{"key":"4026_CR17","doi-asserted-by":"crossref","unstructured":"Liu, W., Aggarwal, S., & Duan, Z. (2009). Incorporating accountability into internet email. In Proceedings of the 2009 ACM symposium on applied computing (pp. 875\u2013882).","DOI":"10.1145\/1529282.1529470"},{"key":"4026_CR18","doi-asserted-by":"crossref","unstructured":"Argyraki, K., Maniatis, P., Irzak, O., Ashish, S., Shenker, S., & Epfl, L. (2007). Loss and delay accountability for the internet. In IEEE international conference on network protocols, 2007 (pp. 194\u2013205). ICNP 2007.","DOI":"10.1109\/ICNP.2007.4375850"},{"issue":"3","key":"4026_CR19","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1145\/1288783.1288786","volume":"3","author":"AR Yumerefendi","year":"2007","unstructured":"Yumerefendi, A. R., & Chase J. S. (2007). Strong accountability for network storage. ACM Transactions on Storage, 3(3), 33. doi: 10.1145\/1288783.1288786 .","journal-title":"ACM Transactions on Storage"},{"key":"4026_CR20","unstructured":"Briscoe, B., Jacquet, A., Moncaster, T., & Smith, A. (2009). Re-ECN: Adding accountability for causing congestion to TCP\/IP. In IETF internet-draft."},{"key":"4026_CR21","unstructured":"Briscoe, B., Jacquet, A., Moncaster, T., & Smith, A. (2009). Re-ECN: The motivation for adding accountability for causing congestion to TCP\/IP. In IETF internet-draft."},{"key":"4026_CR22","unstructured":"Zeng, L., Chen, H., & Xiao, Y. (2011). Accountable administration and implementation in operating systems. In Proceedings of the IEEE GLOBECOM 2011."},{"key":"4026_CR23","unstructured":"Zeng, L., Chen, H., & Xiao, Y. (in press). Accountable administration in operating systems. International Journal of Information and Computer Security. http:\/\/www.inderscience.com\/info\/ingeneral\/forthcoming.php?jcode=ijics ."},{"issue":"4","key":"4026_CR24","doi-asserted-by":"crossref","first-page":"116","DOI":"10.1109\/MCOM.2008.4481350","volume":"46","author":"Y Xiao","year":"2008","unstructured":"Xiao, Y. (2008). Accountability for wireless LANs, ad hoc networks, and wireless mesh networks. IEEE Communication Magazine, 46(4), 116\u2013126.","journal-title":"IEEE Communication Magazine"},{"issue":"6","key":"4026_CR25","doi-asserted-by":"crossref","first-page":"695","DOI":"10.1007\/s11036-010-0254-6","volume":"16","author":"J Liu","year":"2011","unstructured":"Liu, J., & Xiao, Y. (2011). Temporal accountability and anonymity in medical sensor networks. Mobile Networks and Applications, 16(6), 695\u2013712.","journal-title":"Mobile Networks and Applications"},{"key":"4026_CR26","doi-asserted-by":"crossref","unstructured":"Liu, J., & Xiao, Y. (2012). An accountable neighborhood area network in smart grids. In Proceedings of 7th FTRA international conference on embedded and multimedia computing (EMC 2012), lecture notes in electrical engineering (Vol. 181, pp. 171\u2013178). Springer.","DOI":"10.1007\/978-94-007-5076-0_20"},{"issue":"2","key":"4026_CR27","doi-asserted-by":"crossref","first-page":"493","DOI":"10.1109\/JSYST.2013.2260697","volume":"8","author":"J Liu","year":"2014","unstructured":"Liu, J., Xiao, Y., & Gao, J. (2014). Achieving accountability in smart grids. IEEE Systems Journal, 8(2), 493\u2013508.","journal-title":"IEEE Systems Journal"},{"issue":"5","key":"4026_CR28","doi-asserted-by":"publisher","first-page":"813","DOI":"10.6138\/JIT.2014.15.5.11","volume":"15","author":"Z Xiao","year":"2014","unstructured":"Xiao, Z., Xiao, Y., & Chen, H. (2014). An accountable framework for sensing-oriented mobile cloud computing. Journal of Internet Technology, 15(5), 813\u2013822. doi: 10.6138\/JIT.2014.15.5.11 .","journal-title":"Journal of Internet Technology"},{"issue":"2","key":"4026_CR29","first-page":"317","volume":"16","author":"Y Ren","year":"2015","unstructured":"Ren, Y., Shen, J., Wang, J., Han, J., & Lee, S. (2015). Mutual verifiable provable data auditing in public cloud storage. Journal of Internet Technology, 16(2), 317\u2013323.","journal-title":"Journal of Internet Technology"},{"issue":"3","key":"4026_CR30","doi-asserted-by":"crossref","first-page":"507","DOI":"10.1109\/TIFS.2014.2381872","volume":"10","author":"J Li","year":"2015","unstructured":"Li, J., Li, X., Yang, B., & Sun, X. (2015). Segmentation-based Image copy-move forgery detection scheme. IEEE Transactions on Information Forensics and Security, 10(3), 507\u2013518.","journal-title":"IEEE Transactions on Information Forensics and Security"},{"issue":"1","key":"4026_CR31","doi-asserted-by":"crossref","first-page":"40","DOI":"10.1504\/IJSN.2012.048494","volume":"7","author":"Z Xiao","year":"2012","unstructured":"Xiao, Z., & Xiao, Y. (2012). PeerReview re-evaluation for accountability in distributed systems or networks. International Journal of Security and Networks, 7(1), 40\u201358.","journal-title":"International Journal of Security and Networks"},{"key":"4026_CR32","doi-asserted-by":"crossref","unstructured":"Xiao, Z., Xiao, Y., & Wu, J. (2010). A quantitative study of accountability in wireless multi-hop networks. In 2010 39th international conference on parallel processing (ICPP) (pp. 198\u2013207).","DOI":"10.1109\/ICPP.2010.29"},{"key":"4026_CR33","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2016.2601065","author":"Z Zhou","year":"2016","unstructured":"Zhou, Z., Wang, Y., Wu, Q. M. J., Yang, C., & Sun, X. (2016). Effective and efficient global context verification for image copy detection. IEEE Transactions on Information Forensics and Security. doi: 10.1109\/TIFS.2016.2601065 .","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"4026_CR34","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2016.2590944","author":"Z Xia","year":"2016","unstructured":"Xia, Z., Wang, X., Zhang, L., Qin, Z., Sun, X., & Ren, K. (2016). A privacy-preserving and copy-deterrence content-based image retrieval scheme in cloud computing. IEEE Transactions on Information Forensics and Security. doi: 10.1109\/TIFS.2016.2590944 .","journal-title":"IEEE Transactions on Information Forensics and Security"},{"issue":"12","key":"4026_CR35","doi-asserted-by":"crossref","first-page":"2706","DOI":"10.1109\/TIFS.2016.2596138","volume":"11","author":"Z Fu","year":"2016","unstructured":"Fu, Z., Wu, X., Guan, C., Sun, X., & Ren, K. (2016). Toward efficient multi-keyword fuzzy search over encrypted outsourced data with accuracy improvement. IEEE Transactions on Information Forensics and Security, 11(12), 2706\u20132716.","journal-title":"EEE Transactions on Information Forensics and Security"},{"issue":"4","key":"4026_CR36","doi-asserted-by":"crossref","first-page":"234","DOI":"10.1504\/IJSN.2009.028670","volume":"4","author":"S Rekhis","year":"2009","unstructured":"Rekhis, S., & Boudriga, N. A. (2009). Visibility: A novel concept for characterising provable network digital evidences. International Journal of Security and Networks, 4(4), 234\u2013245.","journal-title":"International Journal of Security and Networks"},{"issue":"2","key":"4026_CR37","doi-asserted-by":"crossref","first-page":"80","DOI":"10.1504\/IJSN.2008.017221","volume":"3","author":"I Ray","year":"2008","unstructured":"Ray, I., & Poolsappasit, N. (2008). Using mobile ad hoc networks to acquire digital evidence from remote autonomous agents. International Journal of Security and Networks, 3(2), 80\u201394.","journal-title":"International Journal of Security and Networks"},{"key":"4026_CR38","doi-asserted-by":"crossref","first-page":"167","DOI":"10.1016\/j.peva.2003.07.008","volume":"56","author":"BB Madan","year":"2004","unstructured":"Madan, B. B., Goeva-Popstojanova, K., Vaidyanathan, K., & Trivedi, K. S. (2004). A method for modeling and quantifying the security attributes of intrusion tolerant systems. Performance Evaluation, 56, 167\u2013186.","journal-title":"Performance Evaluation"},{"key":"4026_CR39","doi-asserted-by":"crossref","unstructured":"Breu, R., Innerhofer-Oberperfler, F., Yautsiukhin, A. (2008). Quantitative assessment of enterprise security system. In Third international conference on availability, reliability and security (ARES 08) (pp. 921\u2013928).","DOI":"10.1109\/ARES.2008.164"},{"key":"4026_CR40","doi-asserted-by":"crossref","unstructured":"Sallhammar, K., Helvik, B., & Knapskog, S. (2006). A game-theoretic approach to stochastic security and dependability evaluation. In 2nd IEEE international symposium on dependable, autonomic and secure computing (pp. 61\u201368).","DOI":"10.1109\/DASC.2006.7"},{"issue":"2","key":"4026_CR41","doi-asserted-by":"crossref","first-page":"138","DOI":"10.1145\/1151414.1151416","volume":"9","author":"G Bella","year":"2006","unstructured":"Bella, G., & Paulson, L. C. (2006). Accountability protocols: Formalized and verified. ACM Transactions on Information and System Security, 9(2), 138\u2013161.","journal-title":"ACM Transactions on Information and System Security"},{"key":"4026_CR42","unstructured":"Bella, G. Inductive verification of cryptographic protocols. Ph.D. thesis, Research Report 493, Computer Laboratory, University of Cambridge."},{"key":"4026_CR43","doi-asserted-by":"crossref","unstructured":"Jagadeesan, R., Jeffrey, A., Pitcher, C., & Riely, J. (2009). Towards a theory of accountability and audit. In ESORICS\u201909, volume 5789 of LNCS (pp. 152\u2013167). Springer.","DOI":"10.1007\/978-3-642-04444-1_10"},{"key":"4026_CR44","doi-asserted-by":"crossref","unstructured":"K\u00fcsters, R., Truderung, T., Vogt, A. (2010). Accountability: Definition and relationship to verifiability. In Proceedings of the 17th ACM conference on computer and communications security, New York, NY, USA (pp. 526\u2013535).","DOI":"10.1145\/1866307.1866366"},{"key":"4026_CR45","volume-title":"Communicating and mobile systems: the pi calculus","author":"R Milner","year":"1999","unstructured":"Milner, R. (1999). Communicating and mobile systems: the pi calculus. Cambridge: Cambridge University Press."},{"key":"4026_CR46","doi-asserted-by":"crossref","unstructured":"Feigenbaum, J., Jaggard, A. D., & Wright, R. N. (2011). Towards a formal model of accountability. In Proceedings of the 2011 workshop on new security paradigms workshop, New York, NY, USA (pp. 45\u201356).","DOI":"10.1145\/2073276.2073282"},{"issue":"1","key":"4026_CR47","first-page":"40","volume":"21","author":"S Ramazani","year":"2016","unstructured":"Ramazani, S., Kanno, J., Selmic, R. R., & Brust, M. R. (2016). Topological and combinatorial coverage hole detection in coordinate-free wireless sensor networks. International Journal of Sensor Networks, 21(1), 40\u201352.","journal-title":"International Journal of Sensor Networks"},{"issue":"2","key":"4026_CR48","doi-asserted-by":"crossref","first-page":"130","DOI":"10.1504\/IJSNET.2015.067863","volume":"17","author":"J Mu","year":"2015","unstructured":"Mu, J., Song, W., Wang, W., & Zhang, B. (2015). Self-healing hierarchical architecture for ZigBee network in smart grid application. International Journal of Sensor Networks, 17(2), 130\u2013137.","journal-title":"International Journal of Sensor Networks"},{"issue":"4","key":"4026_CR49","doi-asserted-by":"crossref","first-page":"836","DOI":"10.1109\/JSAC.2005.863862","volume":"24","author":"Y Xiao","year":"2006","unstructured":"Xiao, Y., Shen, X., & Jiang, H. (2006). Optimal ACK mechanisms of the IEEE 802.15.3 MAC for ultra-wideband systems. IEEE Journal on Selected Areas in Communications, 24(4), 836\u2013842.","journal-title":"IEEE Journal on Selected Areas in Communications"},{"issue":"1\/2","key":"4026_CR50","doi-asserted-by":"crossref","first-page":"128","DOI":"10.1504\/IJSNET.2007.012991","volume":"2","author":"R Fantacci","year":"2006","unstructured":"Fantacci, R., & Tarch, D. (2006). Efficient scheduling techniques for high data-rate wireless personal area networks. International Journal of Sensor Networks, 2(1\/2), 128\u2013134.","journal-title":"International Journal of Sensor Networks"},{"key":"4026_CR51","doi-asserted-by":"crossref","first-page":"139","DOI":"10.1145\/263109.263155","volume":"27","author":"V Paxson","year":"1997","unstructured":"Paxson, V. (1997). End-to-end Internet packet dynamics. SIGCOMM Computer Communication Review, 27, 139\u2013152.","journal-title":"SIGCOMM Computer Communication Review"},{"issue":"1","key":"4026_CR52","doi-asserted-by":"crossref","first-page":"16","DOI":"10.1504\/IJSNET.2014.065781","volume":"16","author":"X Liu","year":"2014","unstructured":"Liu, X., Liu, X., Li, Z., & Wang, B. (2014). The portable distributed fusion algorithm between loss and lossless systems. International Journal of Sensor Networks, 16(1), 16\u201322.","journal-title":"International Journal of Sensor Networks"},{"issue":"8","key":"4026_CR53","doi-asserted-by":"crossref","first-page":"355","DOI":"10.1109\/LCOMM.2002.802035","volume":"6","author":"Y Xiao","year":"2002","unstructured":"Xiao, Y., & Rosdahl, J. (2002). Throughput and delay limits of IEEE 802.11. IEEE Communications Letters, 6(8), 355\u2013357.","journal-title":"IEEE Communications Letters"},{"issue":"2","key":"4026_CR54","doi-asserted-by":"crossref","first-page":"6","DOI":"10.1145\/950391.950396","volume":"7","author":"Y Xiao","year":"2003","unstructured":"Xiao, Y., & Rosdahl, J. (2003). Performance analysis and enhancement for the current and future IEEE 802.11 MAC protocols. ACM SIGMOBILE Mobile Computing and Communications Review, 7(2), 6\u201319.","journal-title":"ACM SIGMOBILE Mobile Computing and Communications Review"},{"key":"4026_CR55","unstructured":"PeerReview Software. http:\/\/peerreview.mpi-sws.org\/ ."}],"container-title":["Wireless Personal Communications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11277-017-4026-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-017-4026-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-017-4026-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,8,22]],"date-time":"2023-08-22T01:59:24Z","timestamp":1692669564000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11277-017-4026-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,2,3]]},"references-count":55,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2017,8]]}},"alternative-id":["4026"],"URL":"https:\/\/doi.org\/10.1007\/s11277-017-4026-5","relation":{},"ISSN":["0929-6212","1572-834X"],"issn-type":[{"value":"0929-6212","type":"print"},{"value":"1572-834X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,2,3]]}}}