{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T21:19:06Z","timestamp":1729631946452,"version":"3.28.0"},"reference-count":15,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,12]]},"DOI":"10.1109\/glocom.2014.7417459","type":"proceedings-article","created":{"date-parts":[[2016,3,28]],"date-time":"2016-03-28T19:11:24Z","timestamp":1459192284000},"page":"1-6","source":"Crossref","is-referenced-by-count":2,"title":["An Identity-Based Security Scheme for a Big Data Driven Cloud Computing Framework in Smart Grid"],"prefix":"10.1109","author":[{"given":"Feng","family":"Ye","sequence":"first","affiliation":[]},{"given":"Yi","family":"Qian","sequence":"additional","affiliation":[]},{"given":"Rose Qingyang","family":"Hu","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/MCSE.2013.39"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ISGT-Asia.2014.6873776"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/UPEC.2013.6714855"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1137\/S0097539701398521"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-003-0052-4"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/11599548_27"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2012.010912.00035"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2012.53"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/11426639_7"},{"key":"ref5","first-page":"1","article-title":"A secure cloud computing based framework for big data information management of smart grid","author":"baek","year":"2014","journal-title":"IEEE Transactions on Cloud Computing"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1002\/sec.1217"},{"key":"ref7","first-page":"102","article-title":"The exact security of an identity based signature and its applications","volume":"2004","author":"libert","year":"2004","journal-title":"IACR Cryptology ePrint Archive"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2014.2344659"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2014.7036881"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2012.021312.00034"}],"event":{"name":"GLOBECOM 2015 - 2015 IEEE Global Communications Conference","start":{"date-parts":[[2015,12,6]]},"location":"San Diego, CA, USA","end":{"date-parts":[[2015,12,10]]}},"container-title":["2015 IEEE Global Communications Conference (GLOBECOM)"],"original-title":[],"deposited":{"date-parts":[[2020,10,14]],"date-time":"2020-10-14T15:40:52Z","timestamp":1602690052000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/7417459"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,12]]},"references-count":15,"URL":"https:\/\/doi.org\/10.1109\/glocom.2014.7417459","relation":{},"subject":[],"published":{"date-parts":[[2014,12]]}}}