{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T19:10:31Z","timestamp":1725563431918},"reference-count":17,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,2]]},"DOI":"10.1109\/iccnc.2015.7069318","type":"proceedings-article","created":{"date-parts":[[2015,6,2]],"date-time":"2015-06-02T09:40:57Z","timestamp":1433238057000},"page":"72-76","source":"Crossref","is-referenced-by-count":1,"title":["A practical approach to the attestation of computational integrity in hybrid cloud"],"prefix":"10.1109","author":[{"given":"Andrew","family":"Pawloski","sequence":"first","affiliation":[]},{"given":"Longfei","family":"Wu","sequence":"additional","affiliation":[]},{"given":"Xiaojiang","family":"Du","sequence":"additional","affiliation":[]},{"given":"Lijun","family":"Qian","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"17","doi-asserted-by":"publisher","DOI":"10.1109\/CLOUD.2011.33"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/ACSAC.2009.17"},{"key":"16","first-page":"8","article-title":"The hybrex model for confidentiality and privacy in cloud computing","author":"ko","year":"2011","journal-title":"Proceedings of the 3rd USENIX Conference on Hot Topics in Cloud Computing Ser HotCloud'11"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2013.6567072"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.4108\/icst.collaboratecom.2011.247089"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/IWQOS.2011.5931339"},{"key":"12","doi-asserted-by":"crossref","first-page":"293","DOI":"10.1145\/1755688.1755724","article-title":"Runtest: Assuring integrity of dataflow processing in cloud computing infrastructures","author":"du","year":"2010","journal-title":"Proceedings of the 5th ACM Symposium on Information Computer and Communications Security Ser ASIACCS '10"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/SCC.2009.84"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/CLOUD.2009.60"},{"key":"1","first-page":"29","article-title":"Improving mapreduce performance in heterogeneous environments","author":"zaharia","year":"2008","journal-title":"Proceedings of the 8th USENIX Conference on Operating Systems Design and Implementation Ser OSDI'08"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1145\/1721654.1721672"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046767"},{"key":"6","first-page":"483","article-title":"Improved delegation of computation using fully homomorphic encryption","author":"chung","year":"2010","journal-title":"Proceedings of the 30th Annual Conference on Advances in Cryptology Ser CRYPTO'10"},{"key":"5","doi-asserted-by":"crossref","DOI":"10.1007\/s13174-010-0007-6","article-title":"Cloud computing:state-of-the-art and research challenges","author":"zhang","year":"2010","journal-title":"Journal of Internet Services and Applications"},{"key":"4","article-title":"The nist definition of cloud computing","author":"mell","year":"2011","journal-title":"Information Technology Laboratory (National Institute of Standards and Technology)"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1145\/1879141.1879143"},{"journal-title":"Practical Byzantine Fault Tolerance","year":"2001","author":"castro","key":"8"}],"event":{"name":"2015 International Conference on Computing, Networking and Communications (ICNC)","start":{"date-parts":[[2015,2,16]]},"location":"Garden Grove, CA, USA","end":{"date-parts":[[2015,2,19]]}},"container-title":["2015 International Conference on Computing, Networking and Communications (ICNC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7057023\/7069279\/07069318.pdf?arnumber=7069318","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,23]],"date-time":"2017-06-23T08:48:30Z","timestamp":1498207710000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7069318\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,2]]},"references-count":17,"URL":"https:\/\/doi.org\/10.1109\/iccnc.2015.7069318","relation":{},"subject":[],"published":{"date-parts":[[2015,2]]}}}