{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,16]],"date-time":"2024-09-16T21:03:21Z","timestamp":1726520601438},"reference-count":0,"publisher":"Institution of Engineering and Technology","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1049\/cp.2015.0854","type":"proceedings-article","created":{"date-parts":[[2016,3,22]],"date-time":"2016-03-22T15:58:48Z","timestamp":1458662328000},"page":"5 .-5 .","source":"Crossref","is-referenced-by-count":0,"title":["Cloud computing risk assessment method based on game theory"],"prefix":"10.1049","author":[{"family":"Yuxia Sun","sequence":"first","affiliation":[]},{"family":"Wu Chaoxia","sequence":"additional","affiliation":[]},{"family":"Zhi Li","sequence":"additional","affiliation":[]}],"member":"265","event":{"name":"Third International Conference on Cyberspace Technology (CCT 2015)","location":"Beijing, China"},"container-title":["Third International Conference on Cyberspace Technology (CCT 2015)"],"original-title":[],"deposited":{"date-parts":[[2019,4,5]],"date-time":"2019-04-05T01:38:11Z","timestamp":1554428291000},"score":1,"resource":{"primary":{"URL":"https:\/\/digital-library.theiet.org\/content\/conferences\/10.1049\/cp.2015.0854"},"secondary":[{"URL":"http:\/\/ieeexplore.ieee.org\/lpdocs\/epic03\/wrapper.htm?arnumber=7446946","label":"Xplore"}]},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"references-count":0,"URL":"https:\/\/doi.org\/10.1049\/cp.2015.0854","relation":{},"subject":[],"published":{"date-parts":[[2015]]}}}