{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,6]],"date-time":"2025-12-06T16:46:40Z","timestamp":1765039600952,"version":"3.37.3"},"reference-count":50,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2021,7,29]],"date-time":"2021-07-29T00:00:00Z","timestamp":1627516800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,7,29]],"date-time":"2021-07-29T00:00:00Z","timestamp":1627516800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Peer-to-Peer Netw. Appl."],"published-print":{"date-parts":[[2021,11]]},"DOI":"10.1007\/s12083-021-01222-2","type":"journal-article","created":{"date-parts":[[2021,7,29]],"date-time":"2021-07-29T09:02:44Z","timestamp":1627549364000},"page":"3865-3890","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":21,"title":["Privacy-preserving for the internet of things in multi-objective task scheduling in cloud-fog computing using goal programming approach"],"prefix":"10.1007","volume":"14","author":[{"given":"Abbas","family":"Najafizadeh","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9741-2447","authenticated-orcid":false,"given":"Afshin","family":"Salajegheh","sequence":"additional","affiliation":[]},{"given":"Amir Masoud","family":"Rahmani","sequence":"additional","affiliation":[]},{"given":"Amir","family":"Sahafi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,7,29]]},"reference":[{"key":"1222_CR1","doi-asserted-by":"publisher","first-page":"416","DOI":"10.1109\/COMST.2017.2771153","volume":"20","author":"C Mouradian","year":"2018","unstructured":"Mouradian C, Naboulsi D, Yangui S et al (2018) A Comprehensive Survey on Fog Computing: State-of-the-Art and Research Challenges. IEEE Commun Surv Tutorials 20:416\u2013464. https:\/\/doi.org\/10.1109\/COMST.2017.2771153","journal-title":"IEEE Commun Surv Tutorials"},{"key":"1222_CR2","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3057266","volume":"50","author":"C Perera","year":"2017","unstructured":"Perera C, Qin Y, Estrella JC et al (2017) Fog Computing for Sustainable Smart Cities: A Survey. ACM Comput Surv 50:1\u201343. https:\/\/doi.org\/10.1145\/3057266","journal-title":"ACM Comput Surv"},{"key":"1222_CR3","unstructured":"Songhorabadi M, Rahimi M, Farid AMM, Kashani MH (2020) Fog Computing Approaches in Smart Cities: A State-of-the-Art Review. arXiv preprint\u00a0arXiv:2011.14732"},{"key":"1222_CR4","unstructured":"Kashani MH, Ahmadzadeh A, Mahdipour E (2020) Load balancing mechanisms in fog computing: A systematic review. arXiv Prepr. arXiv2011.14706"},{"key":"1222_CR5","doi-asserted-by":"crossref","unstructured":"Dastjerdi AV, Gupta H, Calheiros RN et al (2016) Fog Computing: principles, architectures, and applications. In: Internet of Things. Elsevier, pp 61\u201375","DOI":"10.1016\/B978-0-12-805395-9.00004-6"},{"key":"1222_CR6","doi-asserted-by":"publisher","first-page":"1730","DOI":"10.3390\/app9091730","volume":"9","author":"BM Nguyen","year":"2019","unstructured":"Nguyen BM, Thi Thanh Binh H, The Anh T, Bao Son D (2019) Evolutionary Algorithms to Optimize Task Scheduling Problem for the IoT Based Bag-of-Tasks Application in Cloud-Fog Computing Environment. Appl Sci 9:1730. https:\/\/doi.org\/10.3390\/app9091730","journal-title":"Appl Sci"},{"key":"1222_CR7","doi-asserted-by":"publisher","first-page":"47980","DOI":"10.1109\/ACCESS.2018.2866491","volume":"6","author":"RK Naha","year":"2018","unstructured":"Naha RK, Garg S, Georgakopoulos D et al (2018) Fog computing: Survey of trends, architectures, requirements, and research directions. IEEE Access 6:47980\u201348009. https:\/\/doi.org\/10.1109\/ACCESS.2018.2866491","journal-title":"IEEE Access"},{"key":"1222_CR8","first-page":"1","volume":"11","author":"A Najafizadeh","year":"2020","unstructured":"Najafizadeh A, Salajegheh A, Rahmani AM, Sahafi A (2020) Task Scheduling in Fog Computing: A Survey. J Adv Comput Res 11:1\u201310","journal-title":"J Adv Comput Res"},{"key":"1222_CR9","first-page":"185","volume-title":"Lecture Notes of the Institute for Computer Sciences","author":"AA Abi Sen","year":"2018","unstructured":"Abi Sen AA, Eassa FA, Jambi K (2018) Preserving Privacy of Smart Cities Based on the Fog Computing. Lecture Notes of the Institute for Computer Sciences. LNICST. Springer Verlag, Social-Informatics and Telecommunications Engineering, pp 185\u2013191"},{"key":"1222_CR10","doi-asserted-by":"publisher","unstructured":"Khalid T, Abbasi MAK, Zuraiz M et al (2019) A survey on privacy and access control schemes in fog computing. Int J Commun Syst e4181.\u00a0https:\/\/doi.org\/10.1002\/dac.4181","DOI":"10.1002\/dac.4181"},{"key":"1222_CR11","doi-asserted-by":"publisher","first-page":"B152","DOI":"10.1364\/jocn.10.00b152","volume":"10","author":"Z Liu","year":"2018","unstructured":"Liu Z, Zhang J, Li Y et al (2018) Joint Jobs Scheduling and Lightpath Provisioning in Fog Computing Micro Datacenter Networks. J Opt Commun Netw 10:B152. https:\/\/doi.org\/10.1364\/jocn.10.00b152","journal-title":"J Opt Commun Netw"},{"key":"1222_CR12","doi-asserted-by":"publisher","first-page":"1023","DOI":"10.3390\/s19051023","volume":"19","author":"J Wang","year":"2019","unstructured":"Wang J, Li D (2019) Task Scheduling Based on a Hybrid Heuristic Algorithm for Smart Production Line with Fog Computing. Sensors 19:1023. https:\/\/doi.org\/10.3390\/s19051023","journal-title":"Sensors"},{"key":"1222_CR13","doi-asserted-by":"publisher","first-page":"4548","DOI":"10.1109\/TII.2018.2818932","volume":"14","author":"J Wan","year":"2018","unstructured":"Wan J, Chen B, Wang S et al (2018) Fog Computing for Energy-Aware Load Balancing and Scheduling in Smart Factory. IEEE Trans Ind Informatics 14:4548\u20134556. https:\/\/doi.org\/10.1109\/TII.2018.2818932","journal-title":"IEEE Trans Ind Informatics"},{"key":"1222_CR14","doi-asserted-by":"crossref","unstructured":"Xu R, Wang Y, Cheng Y et al (2019) Improved Particle Swarm Optimization Based Workflow Scheduling in Cloud-Fog Environment. In: Lecture Notes in Business Information Processing. pp 337\u2013347","DOI":"10.1007\/978-3-030-11641-5_27"},{"key":"1222_CR15","doi-asserted-by":"publisher","first-page":"1216","DOI":"10.1109\/JIOT.2017.2709814","volume":"4","author":"L Ni","year":"2017","unstructured":"Ni L, Zhang J, Jiang C et al (2017) Resource Allocation Strategy in Fog Computing Based on Priced Timed Petri Nets. IEEE Internet Things J 4:1216\u20131228. https:\/\/doi.org\/10.1109\/JIOT.2017.2709814","journal-title":"IEEE Internet Things J"},{"key":"1222_CR16","doi-asserted-by":"publisher","first-page":"155014771774207","DOI":"10.1177\/1550147717742073","volume":"13","author":"X-Q Pham","year":"2017","unstructured":"Pham X-Q, Man ND, Tri NDT et al (2017) A cost- and performance-effective approach for task scheduling based on collaboration between cloud and fog computing. Int J Distrib Sens Networks 13:155014771774207. https:\/\/doi.org\/10.1177\/1550147717742073","journal-title":"Int J Distrib Sens Networks"},{"key":"1222_CR17","doi-asserted-by":"publisher","first-page":"4568","DOI":"10.1109\/TII.2018.2816590","volume":"14","author":"X Wang","year":"2018","unstructured":"Wang X, Ning Z, Wang L (2018) Offloading in Internet of Vehicles: A Fog-Enabled Real-Time Traffic Management System. IEEE Trans Ind Informatics 14:4568\u20134578. https:\/\/doi.org\/10.1109\/TII.2018.2816590","journal-title":"IEEE Trans Ind Informatics"},{"key":"1222_CR18","doi-asserted-by":"publisher","first-page":"1171","DOI":"10.1109\/JIOT.2016.2565516","volume":"3","author":"R Deng","year":"2016","unstructured":"Deng R, Lu R, Lai C et al (2016) Optimal Workload Allocation in Fog-Cloud Computing Toward Balanced Delay and Power Consumption. IEEE Internet Things J 3:1171\u20131181. https:\/\/doi.org\/10.1109\/JIOT.2016.2565516","journal-title":"IEEE Internet Things J"},{"key":"1222_CR19","doi-asserted-by":"publisher","first-page":"4712","DOI":"10.1109\/TII.2018.2851241","volume":"14","author":"L Yin","year":"2018","unstructured":"Yin L, Luo J, Luo H (2018) Tasks Scheduling and Resource Allocation in Fog Computing Based on Containers for Smart Manufacturing. IEEE Trans Ind Informatics 14:4712\u20134721. https:\/\/doi.org\/10.1109\/TII.2018.2851241","journal-title":"IEEE Trans Ind Informatics"},{"key":"1222_CR20","doi-asserted-by":"publisher","first-page":"3702","DOI":"10.1109\/TC.2016.2536019","volume":"65","author":"D Zeng","year":"2016","unstructured":"Zeng D, Gu L, Guo S et al (2016) Joint Optimization of Task Scheduling and Image Placement in Fog Computing Supported Software-Defined Embedded System. IEEE Trans Comput 65:3702\u20133712. https:\/\/doi.org\/10.1109\/TC.2016.2536019","journal-title":"IEEE Trans Comput"},{"key":"1222_CR21","doi-asserted-by":"crossref","unstructured":"Abubaker N, Dervishi L, Ayday E (2017) Privacy-preserving fog computing paradigm. In: 2017 IEEE Conference on Communications and Network Security (CNS). IEEE, pp 502\u2013509","DOI":"10.1109\/CNS.2017.8228709"},{"key":"1222_CR22","doi-asserted-by":"publisher","first-page":"50384","DOI":"10.1109\/ACCESS.2018.2868920","volume":"6","author":"L Zhang","year":"2018","unstructured":"Zhang L, Li J (2018) Enabling Robust and Privacy-Preserving Resource Allocation in Fog Computing. IEEE Access 6:50384\u201350393. https:\/\/doi.org\/10.1109\/ACCESS.2018.2868920","journal-title":"IEEE Access"},{"key":"1222_CR23","doi-asserted-by":"crossref","unstructured":"Fizza K, Auluck N, Rana O, Bittencourt L (2018) PASHE: Privacy Aware Scheduling in a Heterogeneous Fog Environment. In: Proceedings - 2018 IEEE 6th International Conference on Future Internet of Things and Cloud, FiCloud 2018. IEEE, pp 333\u2013340","DOI":"10.1109\/FiCloud.2018.00055"},{"key":"1222_CR24","unstructured":"Tim Mather, Subra Kumaraswamy SL (2009) Cloud Security and Privacy An Enterprise Prespective on Risks and Compliance. O\u2019Reilly"},{"key":"1222_CR25","unstructured":"Costante E (2015) Privacy throughout the Data Cycle. PhD thesis, Eindhoven University of Technology"},{"key":"1222_CR26","doi-asserted-by":"crossref","unstructured":"Costante E, Paci F, Zannone N (2015) Privacy-aware web service composition and ranking. In: Standards and Standardization: Concepts, Methodologies, Tools, and Applications. IEEE, pp 1653\u20131675","DOI":"10.4018\/978-1-4666-8111-8.ch076"},{"key":"1222_CR27","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-02113-9","volume-title":"Privacy-Enhancing Fog Computing and Its Applications","author":"X Lin","year":"2018","unstructured":"Lin X, Ni J, Shen X (2018) Privacy-Enhancing Fog Computing and Its Applications. Springer International Publishing, Cham"},{"key":"1222_CR28","doi-asserted-by":"publisher","first-page":"1910","DOI":"10.1016\/j.jss.2011.04.027","volume":"84","author":"I Bilogrevic","year":"2011","unstructured":"Bilogrevic I, Jadliwala M, Kumar P et al (2011) Meetings through the cloud: Privacy-preserving scheduling on mobile devices. J Syst Softw 84:1910\u20131927. https:\/\/doi.org\/10.1016\/j.jss.2011.04.027","journal-title":"J Syst Softw"},{"key":"1222_CR29","doi-asserted-by":"publisher","first-page":"2460","DOI":"10.1109\/TSG.2017.2703400","volume":"8","author":"E Liu","year":"2017","unstructured":"Liu E, Cheng P (2017) Achieving Privacy Protection Using Distributed Load Scheduling: A Randomized Approach. IEEE Trans Smart Grid 8:2460\u20132473. https:\/\/doi.org\/10.1109\/TSG.2017.2703400","journal-title":"IEEE Trans Smart Grid"},{"key":"1222_CR30","doi-asserted-by":"publisher","first-page":"1084","DOI":"10.1016\/j.future.2018.03.028","volume":"108","author":"Y Wen","year":"2020","unstructured":"Wen Y, Liu J, Dou W et al (2020) Scheduling workflows with privacy protection constraints for big data applications on cloud. Futur Gener Comput Syst 108:1084\u20131091. https:\/\/doi.org\/10.1016\/j.future.2018.03.028","journal-title":"Futur Gener Comput Syst"},{"key":"1222_CR31","doi-asserted-by":"publisher","first-page":"138","DOI":"10.1287\/mnsc.1.2.138","volume":"1","author":"A Charnes","year":"1955","unstructured":"Charnes A, Cooper WW, Ferguson RO (1955) Optimal Estimation of Executive Compensation by Linear Programming. Manage Sci 1:138\u2013151. https:\/\/doi.org\/10.1287\/mnsc.1.2.138","journal-title":"Manage Sci"},{"key":"1222_CR32","doi-asserted-by":"publisher","unstructured":"Wu HQ, Wang L, Xue G (2019) Privacy-aware Task Allocation and Data Aggregation in Fog-assisted Spatial Crowdsourcing IEEE Trans Netw Sci Eng 1\u20131.\u00a0https:\/\/doi.org\/10.1109\/TNSE.2019.2892583","DOI":"10.1109\/TNSE.2019.2892583"},{"key":"1222_CR33","doi-asserted-by":"publisher","DOI":"10.1007\/s12652-020-01723-7","author":"P Asghari","year":"2020","unstructured":"Asghari P, Rahmani AM, Javadi HHS (2020) Privacy-aware cloud service composition based on QoS optimization in Internet of Things. J Ambient Intell Humaniz Comput. https:\/\/doi.org\/10.1007\/s12652-020-01723-7","journal-title":"J Ambient Intell Humaniz Comput"},{"key":"1222_CR34","doi-asserted-by":"publisher","first-page":"22313","DOI":"10.1109\/ACCESS.2017.2757844","volume":"5","author":"HA Al Hamid","year":"2017","unstructured":"Al Hamid HA, Rahman SMM, Hossain MS et al (2017) A Security Model for Preserving the Privacy of Medical Big Data in a Healthcare Cloud Using a Fog Computing Facility With Pairing-Based Cryptography. IEEE Access 5:22313\u201322328. https:\/\/doi.org\/10.1109\/ACCESS.2017.2757844","journal-title":"IEEE Access"},{"key":"1222_CR35","doi-asserted-by":"publisher","first-page":"3302","DOI":"10.1109\/ACCESS.2017.2677520","volume":"5","author":"R Lu","year":"2017","unstructured":"Lu R, Heung K, Lashkari AH, Ghorbani AA (2017) A Lightweight Privacy-Preserving Data Aggregation Scheme for Fog Computing-Enhanced IoT. IEEE Access 5:3302\u20133312. https:\/\/doi.org\/10.1109\/ACCESS.2017.2677520","journal-title":"IEEE Access"},{"key":"1222_CR36","doi-asserted-by":"publisher","first-page":"3733","DOI":"10.1109\/TII.2018.2803782","volume":"14","author":"L Lyu","year":"2018","unstructured":"Lyu L, Nandakumar K, Rubinstein B et al (2018) PPFA: Privacy Preserving Fog-Enabled Aggregation in Smart Grid. IEEE Trans Ind Informatics 14:3733\u20133744. https:\/\/doi.org\/10.1109\/TII.2018.2803782","journal-title":"IEEE Trans Ind Informatics"},{"key":"1222_CR37","doi-asserted-by":"publisher","first-page":"145","DOI":"10.1109\/TSUSC.2017.2715038","volume":"4","author":"M Du","year":"2019","unstructured":"Du M, Wang K, Liu X et al (2019) A Differential Privacy-Based Query Model for Sustainable Fog Data Centers. IEEE Trans Sustain Comput 4:145\u2013155. https:\/\/doi.org\/10.1109\/TSUSC.2017.2715038","journal-title":"IEEE Trans Sustain Comput"},{"key":"1222_CR38","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1109\/TETCI.2017.2764109","volume":"2","author":"T Wang","year":"2018","unstructured":"Wang T, Zhou J, Chen X et al (2018) A Three-Layer Privacy Preserving Cloud Storage Scheme Based on Computational Intelligence in Fog Computing. IEEE Trans Emerg Top Comput Intell 2:3\u201312. https:\/\/doi.org\/10.1109\/TETCI.2017.2764109","journal-title":"IEEE Trans Emerg Top Comput Intell"},{"key":"1222_CR39","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2020.102531","volume":"153","author":"M Rahimi","year":"2020","unstructured":"Rahimi M, Songhorabadi M, Kashani MH (2020) Fog-based smart homes: A systematic review. J Netw Comput Appl 153:102531. https:\/\/doi.org\/10.1016\/j.jnca.2020.102531","journal-title":"J Netw Comput Appl"},{"key":"1222_CR40","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1016\/j.jnca.2017.09.002","volume":"98","author":"P Hu","year":"2017","unstructured":"Hu P, Dhelim S, Ning H, Qiu T (2017) Survey on fog computing: architecture, key technologies, applications and open issues. J Netw Comput Appl 98:27\u201342. https:\/\/doi.org\/10.1016\/j.jnca.2017.09.002","journal-title":"J Netw Comput Appl"},{"key":"1222_CR41","doi-asserted-by":"publisher","DOI":"10.1002\/dac.4340","volume":"33","author":"M Haghi Kashani","year":"2020","unstructured":"Haghi Kashani M, Rahmani AM, Jafari Navimipour N (2020) Quality of service-aware approaches in fog computing. Int J Commun Syst 33:e4340. https:\/\/doi.org\/10.1002\/dac.4340","journal-title":"Int J Commun Syst"},{"key":"1222_CR42","doi-asserted-by":"publisher","first-page":"34","DOI":"10.1109\/MIC.2017.37","volume":"21","author":"A Alrawais","year":"2017","unstructured":"Alrawais A, Alhothaily A, Hu C, Cheng X (2017) Fog Computing for the Internet of Things: Security and Privacy Issues. IEEE Internet Comput 21:34\u201342. https:\/\/doi.org\/10.1109\/MIC.2017.37","journal-title":"IEEE Internet Comput"},{"key":"1222_CR43","doi-asserted-by":"publisher","first-page":"492","DOI":"10.1080\/17517575.2017.1308559","volume":"12","author":"Z Zhang","year":"2018","unstructured":"Zhang Z, Wang X, Uden L et al (2018) e -DMDAV: A new privacy preserving algorithm for wearable enterprise information systems. Enterp Inf Syst 12:492\u2013504. https:\/\/doi.org\/10.1080\/17517575.2017.1308559","journal-title":"Enterp Inf Syst"},{"key":"1222_CR44","doi-asserted-by":"publisher","DOI":"10.1126\/science.220.4598.671","author":"S Kirkpatrick","year":"1983","unstructured":"Kirkpatrick S, Gelatt CD, Vecchi MP (1983) Optimization by simulated annealing. Manage Sci. https:\/\/doi.org\/10.1126\/science.220.4598.671","journal-title":"Manage Sci"},{"key":"1222_CR45","doi-asserted-by":"publisher","first-page":"256","DOI":"10.1109\/TEVC.2004.826067","volume":"8","author":"CA Coello Coello","year":"2004","unstructured":"Coello Coello CA, Pulido GT, Lechuga MS (2004) Handling multiple objectives with particle swarm optimization. IEEE Trans Evol Comput 8:256\u2013279","journal-title":"IEEE Trans Evol Comput"},{"key":"1222_CR46","unstructured":"Corne D, Jerram N, Knowles J et al (2001) PESA-II: Region-based Selection in Evolutionary Multiobjective Optimization. Proc Genet Evol Comput Conf 283\u2013290"},{"key":"1222_CR47","doi-asserted-by":"publisher","unstructured":"Coello Coello CA, Lechuga MS (2002) MOPSO: A proposal for multiple objective particle swarm optimization. Proc 2002 Congr Evol Comput CEC\u00a02:1051\u20131056.https:\/\/doi.org\/10.1109\/CEC.2002.1004388","DOI":"10.1109\/CEC.2002.1004388"},{"key":"1222_CR48","unstructured":"T\u00e9llez N, Jimeno M, Salazar A, Nino-Ruiz ED (2018) A Tabu search method for load balancing in fog computing. Int J Artif Intell 16:"},{"key":"1222_CR49","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1002\/ett.3770","volume":"31","author":"M Ghobaei-Arani","year":"2020","unstructured":"Ghobaei-Arani M, Souri A, Safara F, Norouzi M (2020) An efficient task scheduling approach using moth-flame optimization algorithm for cyber-physical system applications in fog computing. Trans Emerg Telecommun Technol 31:1\u201317. https:\/\/doi.org\/10.1002\/ett.3770","journal-title":"Trans Emerg Telecommun Technol"},{"key":"1222_CR50","doi-asserted-by":"publisher","first-page":"1369","DOI":"10.1007\/s11277-017-5200-5","volume":"102","author":"Y Sun","year":"2018","unstructured":"Sun Y, Lin F, Xu H (2018) Multi-objective Optimization of Resource Scheduling in Fog Computing Using an Improved NSGA-II. Wirel Pers Commun 102:1369\u20131385. https:\/\/doi.org\/10.1007\/s11277-017-5200-5","journal-title":"Wirel Pers Commun"}],"container-title":["Peer-to-Peer Networking and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-021-01222-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12083-021-01222-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-021-01222-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,10,23]],"date-time":"2021-10-23T07:14:29Z","timestamp":1634973269000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12083-021-01222-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,7,29]]},"references-count":50,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2021,11]]}},"alternative-id":["1222"],"URL":"https:\/\/doi.org\/10.1007\/s12083-021-01222-2","relation":{},"ISSN":["1936-6442","1936-6450"],"issn-type":[{"type":"print","value":"1936-6442"},{"type":"electronic","value":"1936-6450"}],"subject":[],"published":{"date-parts":[[2021,7,29]]},"assertion":[{"value":"16 December 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"8 July 2021","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"29 July 2021","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}