{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,28]],"date-time":"2025-09-28T20:37:11Z","timestamp":1759091831346},"reference-count":8,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2016,4,8]],"date-time":"2016-04-08T00:00:00Z","timestamp":1460073600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Sci. China Inf. Sci."],"published-print":{"date-parts":[[2016,5]]},"DOI":"10.1007\/s11432-016-5549-1","type":"journal-article","created":{"date-parts":[[2016,4,14]],"date-time":"2016-04-14T08:27:42Z","timestamp":1460622462000},"update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":8,"title":["Theory and methodology of research on cloud security"],"prefix":"10.1007","volume":"59","author":[{"given":"Hai","family":"Jin","sequence":"first","affiliation":[]},{"given":"Weiqi","family":"Dai","sequence":"additional","affiliation":[]},{"given":"Deqing","family":"Zou","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,4,8]]},"reference":[{"key":"5549_CR1","first-page":"051101","volume":"57","author":"W T Tsai","year":"2014","unstructured":"Tsai W T, Bai X Y, Huang Y. Software-as-a-service (SaaS): perspectives and challenges. Sci China Inf Sci, 2014, 57: 051101","journal-title":"Sci China Inf Sci"},{"key":"5549_CR2","doi-asserted-by":"crossref","first-page":"47","DOI":"10.1016\/j.future.2014.08.005","volume":"49","author":"W Q Dai","year":"2015","unstructured":"Dai W Q, Jin H, Zou D Q, et al. TEE: a virtual DRTM based execution environment for secure cloudend computing. Future Gener Comput Syst, 2015; 49: 47\u201357","journal-title":"Future Gener Comput Syst"},{"key":"5549_CR3","doi-asserted-by":"crossref","first-page":"838","DOI":"10.1109\/TDSC.2012.71","volume":"9","author":"WQ Dai","year":"2012","unstructured":"Dai WQ, Paul P T, Jin H, et al. Enhancing data trustworthiness via assured digital signing. IEEE Trans Depend Secure Comput (TDSC), 2012; 9: 838\u2013851","journal-title":"IEEE Trans Depend Secure Comput (TDSC)"},{"key":"5549_CR4","volume-title":"Xen Virtualization Technology","author":"L Shi","year":"2009","unstructured":"Shi L, Zou D Q, Jin H. Xen Virtualization Technology (in Chinese). Wuhan: Huazhong University of Science and Technology Press, 2009"},{"key":"5549_CR5","volume-title":"The Virtualization of Computing System Principles and Applications","author":"H Jin","year":"2008","unstructured":"Jin H. The Virtualization of Computing System Principles and Applications (in Chinese). Beijing: Tsinghua University Press, 2008"},{"key":"5549_CR6","volume-title":"The Principles and Application of Trusted Computing Technology","author":"D Q Zou","year":"2011","unstructured":"Zou D Q, Qiang WZ, Jin H. The Principles and Application of Trusted Computing Technology (in Chinese). Beijing: Science Press, 2011"},{"key":"5549_CR7","doi-asserted-by":"crossref","first-page":"941","DOI":"10.1109\/TPDS.2015.2430854","volume":"27","author":"G Chen","year":"2016","unstructured":"Chen G, Jin H, Zou D Q, et al. A framework for practical dynamic software updating. IEEE Trans Parallel Distrib Syst, 2016; 27: 941\u2013950","journal-title":"IEEE Trans Parallel Distrib Syst"},{"key":"5549_CR8","first-page":"483","volume-title":"In: Proceedings of IEEE International Conference on Services Computing, Chicago","author":"K Liu","year":"2015","unstructured":"Liu K, Zou D Q, Jin H. UaaS: software update as a service for the IaaS cloud. In: Proceedings of IEEE International Conference on Services Computing, Chicago, 2015. 483\u2013490"}],"container-title":["Science China Information Sciences"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11432-016-5549-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11432-016-5549-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11432-016-5549-1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T15:41:08Z","timestamp":1559403668000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11432-016-5549-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,4,8]]},"references-count":8,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2016,5]]}},"alternative-id":["5549"],"URL":"https:\/\/doi.org\/10.1007\/s11432-016-5549-1","relation":{},"ISSN":["1674-733X","1869-1919"],"issn-type":[{"value":"1674-733X","type":"print"},{"value":"1869-1919","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,4,8]]},"article-number":"050105"}}