{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,28]],"date-time":"2025-09-28T15:26:26Z","timestamp":1759073186173,"version":"3.37.3"},"reference-count":25,"publisher":"Oxford University Press (OUP)","issue":"9","license":[{"start":{"date-parts":[[2017,12,4]],"date-time":"2017-12-04T00:00:00Z","timestamp":1512345600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/academic.oup.com\/journals\/pages\/open_access\/funder_policies\/chorus\/standard_publication_model"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61572066"],"award-info":[{"award-number":["61572066"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,9,1]]},"DOI":"10.1093\/comjnl\/bxx116","type":"journal-article","created":{"date-parts":[[2017,11,24]],"date-time":"2017-11-24T07:09:04Z","timestamp":1511507344000},"page":"1296-1305","source":"Crossref","is-referenced-by-count":7,"title":["Survivability Modeling and Analysis of Cloud Service in Distributed Data Centers"],"prefix":"10.1093","volume":"61","author":[{"given":"Zhi","family":"Chen","sequence":"first","affiliation":[{"name":"Beijing Key Laboratory of Security and Privacy in Intelligent Transportation, School of Computer and Information Technology, Beijing Jiaotong University, Beijing, China"}]},{"given":"Xiaolin","family":"Chang","sequence":"additional","affiliation":[{"name":"Beijing Key Laboratory of Security and Privacy in Intelligent Transportation, School of Computer and Information Technology, Beijing Jiaotong University, Beijing, China"}]},{"given":"Zhen","family":"Han","sequence":"additional","affiliation":[{"name":"Beijing Key Laboratory of Security and Privacy in Intelligent Transportation, School of Computer and Information Technology, Beijing Jiaotong University, Beijing, China"}]},{"given":"Lin","family":"Li","sequence":"additional","affiliation":[{"name":"Beijing Key Laboratory of Security and Privacy in Intelligent Transportation, School of Computer and Information Technology, Beijing Jiaotong University, Beijing, China"}]}],"member":"286","published-online":{"date-parts":[[2017,12,4]]},"reference":[{"key":"key\n\t\t\t\t20180827114417_bxx116C1","first-page":"72","article-title":"Virtual system environments. Systems and virtualization management","volume":"18","author":"Vall\u00e9e","year":"2008","journal-title":"Stand. New Technol"},{"year":"2008","author":"Grottke","key":"key\n\t\t\t\t20180827114417_bxx116C2"},{"year":"1995","author":"Huang","key":"key\n\t\t\t\t20180827114417_bxx116C3"},{"year":"2005","author":"Clark","key":"key\n\t\t\t\t20180827114417_bxx116C4"},{"key":"key\n\t\t\t\t20180827114417_bxx116C5","first-page":"1","volume-title":"Advances in Computers","author":"Trivedi","year":"2012"},{"year":"2017","author":"Amazon Web Services, I","key":"key\n\t\t\t\t20180827114417_bxx116C6"},{"year":"1997","author":"Ellison","key":"key\n\t\t\t\t20180827114417_bxx116C7"},{"issue":"4","key":"key\n\t\t\t\t20180827114417_bxx116C8","doi-asserted-by":"crossref","first-page":"451","DOI":"10.1007\/s11235-015-9988-6","article-title":"Quantification of system survivability","volume":"60","author":"Trivedi","year":"2015","journal-title":"Telecommun. Syst."},{"year":"2016","author":"Changa","key":"key\n\t\t\t\t20180827114417_bxx116C9"},{"key":"key\n\t\t\t\t20180827114417_bxx116C10","doi-asserted-by":"crossref","DOI":"10.1002\/0471791571","volume-title":"Queueing Networks and Markov Chains: Modeling and Performance Evaluation with Computer Science Applications","author":"Bolch","year":"2006"},{"key":"key\n\t\t\t\t20180827114417_bxx116C11","doi-asserted-by":"crossref","first-page":"27","DOI":"10.1016\/j.future.2015.08.017","article-title":"Availability modeling and analysis of a data center for disaster tolerance","volume":"56","author":"Nguyen","year":"2016","journal-title":"Future Gener. Comput. Syst."},{"issue":"8","key":"key\n\t\t\t\t20180827114417_bxx116C12","doi-asserted-by":"crossref","first-page":"1215","DOI":"10.1016\/j.comnet.2009.02.014","article-title":"Network survivability modeling","volume":"53","author":"Heegaard","year":"2009","journal-title":"Comput. Netw."},{"year":"2004","author":"Liu","key":"key\n\t\t\t\t20180827114417_bxx116C13"},{"issue":"2","key":"key\n\t\t\t\t20180827114417_bxx116C14","doi-asserted-by":"crossref","first-page":"781","DOI":"10.1016\/j.jnca.2012.12.006","article-title":"Quantitative survivability evaluation of three virtual machine-based server architectures","volume":"36","author":"Yang","year":"2013","journal-title":"J. Netw. Comput. Appl."},{"issue":"12","key":"key\n\t\t\t\t20180827114417_bxx116C15","doi-asserted-by":"crossref","first-page":"2082","DOI":"10.1587\/transinf.2015PAP0007","article-title":"Survivability analysis of VM-based intrusion tolerant systems","volume":"98","author":"Zheng","year":"2015","journal-title":"IEICE Trans. Inf. Syst."},{"year":"2014","author":"Silvaa","key":"key\n\t\t\t\t20180827114417_bxx116C16"},{"year":"2015","author":"Jacques-Silva","key":"key\n\t\t\t\t20180827114417_bxx116C17"},{"author":"Ivanchenko","key":"key\n\t\t\t\t20180827114417_bxx116C18"},{"year":"2016","author":"SILVA","key":"key\n\t\t\t\t20180827114417_bxx116C19"},{"issue":"1","key":"key\n\t\t\t\t20180827114417_bxx116C20","doi-asserted-by":"crossref","first-page":"57","DOI":"10.1109\/TCC.2014.2310737","article-title":"Scalable analytics for IaaS cloud availability","volume":"2","author":"Ghosh","year":"2014","journal-title":"IEEE Trans. Cloud Comput."},{"year":"2010","author":"Ghosh","key":"key\n\t\t\t\t20180827114417_bxx116C21"},{"key":"key\n\t\t\t\t20180827114417_bxx116C22","doi-asserted-by":"crossref","first-page":"151","DOI":"10.1016\/j.simpat.2014.04.003","article-title":"Sensitivity analysis of a hierarchical model of mobile cloud computing","volume":"50","author":"Matos","year":"2015","journal-title":"Simul. Model Pract. Theory"},{"year":"2013","author":"Xu","key":"key\n\t\t\t\t20180827114417_bxx116C23"},{"year":"2014","author":"Lenk","key":"key\n\t\t\t\t20180827114417_bxx116C24"},{"year":"2001","author":"Technical Report 68","key":"key\n\t\t\t\t20180827114417_bxx116C25"}],"container-title":["The Computer Journal"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/academic.oup.com\/comjnl\/article-pdf\/61\/9\/1296\/25570001\/bxx116.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,6]],"date-time":"2019-10-06T15:20:06Z","timestamp":1570375206000},"score":1,"resource":{"primary":{"URL":"https:\/\/academic.oup.com\/comjnl\/article\/61\/9\/1296\/4683984"}},"subtitle":[],"editor":[{"given":"Iain","family":"Stewart","sequence":"additional","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2017,12,4]]},"references-count":25,"journal-issue":{"issue":"9","published-online":{"date-parts":[[2017,12,4]]},"published-print":{"date-parts":[[2018,9,1]]}},"URL":"https:\/\/doi.org\/10.1093\/comjnl\/bxx116","relation":{},"ISSN":["0010-4620","1460-2067"],"issn-type":[{"type":"print","value":"0010-4620"},{"type":"electronic","value":"1460-2067"}],"subject":[],"published-other":{"date-parts":[[2018,9]]},"published":{"date-parts":[[2017,12,4]]}}}