{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,22]],"date-time":"2026-03-22T05:43:52Z","timestamp":1774158232057,"version":"3.50.1"},"reference-count":43,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"2","license":[{"start":{"date-parts":[[2019,3,1]],"date-time":"2019-03-01T00:00:00Z","timestamp":1551398400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2019,3,1]],"date-time":"2019-03-01T00:00:00Z","timestamp":1551398400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,3,1]],"date-time":"2019-03-01T00:00:00Z","timestamp":1551398400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61170042"],"award-info":[{"award-number":["61170042"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Jiangsu Province development and reform commission","award":["2013-883"],"award-info":[{"award-number":["2013-883"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Dependable and Secure Comput."],"published-print":{"date-parts":[[2019,3,1]]},"DOI":"10.1109\/tdsc.2017.2690293","type":"journal-article","created":{"date-parts":[[2017,3,31]],"date-time":"2017-03-31T18:44:00Z","timestamp":1490985840000},"page":"301-312","source":"Crossref","is-referenced-by-count":14,"title":["Optimal Spot-Checking for Collusion Tolerance in Computer Grids"],"prefix":"10.1109","volume":"16","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-2107-8291","authenticated-orcid":false,"given":"Gregory","family":"Levitin","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1606-1644","authenticated-orcid":false,"given":"Liudong","family":"Xing","sequence":"additional","affiliation":[]},{"given":"Yuanshun","family":"Dai","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-78448-9_31"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2011.09.015"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1007\/s10723-009-9125-4"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1587\/transinf.E93.D.3164"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/UKSim.2013.34"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2014.2316816"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.2197\/ipsjjip.19.39"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/CCGRID.2010.97"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2011.25"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/IPDPS.2008.4536444"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/IPDPS.2008.4536244"},{"key":"ref40","author":"estache","year":"2011","journal-title":"Emerging Issues in Competition Collusion and Regulation of Network Industries"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2006.12.001"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2009.05.025"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/LADC.2009.16"},{"key":"ref14","first-page":"31","article-title":"Result verification and trust-based scheduling in peer-to-peer grids","author":"zhao","year":"0","journal-title":"Proc 5th IEEE Int Conf Peer-to-Peer Comput"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-739X(01)00077-2"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/IPDPS.2011.351"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1137\/S0040585X97975940"},{"key":"ref18","first-page":"385","article-title":"Reputation-based majority voting for malicious grid resources tolerance","volume":"11","author":"bendahmane","year":"2010","journal-title":"Scalable Computing Practice and Experience (SCPE)"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/j.jpdc.2011.06.004"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/SPW.2014.19"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.parco.2005.03.019"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2013.6831171"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/S1570-7946(08)80108-3"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1002\/spe.432"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1155\/2016\/5185170"},{"key":"ref5","article-title":"Grid computing for Monte Carlo based intensive calculations in financial derivative pricing applications","author":"dung doan","year":"2010"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2007.1018"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TR.2007.903214"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2008.17"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2014.2369049"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2014.2320741"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/s10723-009-9124-5"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/ICEBE.2009.36"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2007.1094"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1002\/sec.1057"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2011.66"},{"key":"ref41","author":"chakrabarti","year":"2007","journal-title":"Grid Computing Security"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/IPDPS.2010.5470422"},{"key":"ref26","author":"press","year":"1992","journal-title":"Numerical Recipes in C"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0116520"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/CCGRID.2009.12"}],"container-title":["IEEE Transactions on Dependable and Secure Computing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8858\/8666010\/07891057.pdf?arnumber=7891057","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,13]],"date-time":"2022-07-13T20:53:03Z","timestamp":1657745583000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/7891057\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,3,1]]},"references-count":43,"journal-issue":{"issue":"2"},"URL":"https:\/\/doi.org\/10.1109\/tdsc.2017.2690293","relation":{},"ISSN":["1545-5971","1941-0018","2160-9209"],"issn-type":[{"value":"1545-5971","type":"print"},{"value":"1941-0018","type":"electronic"},{"value":"2160-9209","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,3,1]]}}}