{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,5]],"date-time":"2025-10-05T19:48:38Z","timestamp":1759693718466,"version":"3.37.3"},"reference-count":36,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"11","license":[{"start":{"date-parts":[[2014,11,1]],"date-time":"2014-11-01T00:00:00Z","timestamp":1414800000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CNS-1262277"],"award-info":[{"award-number":["CNS-1262277"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Research Grants Council of Hong Kong","award":["ECS 9041983"],"award-info":[{"award-number":["ECS 9041983"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans.Inform.Forensic Secur."],"published-print":{"date-parts":[[2014,11]]},"DOI":"10.1109\/tifs.2014.2352457","type":"journal-article","created":{"date-parts":[[2014,8,27]],"date-time":"2014-08-27T14:36:15Z","timestamp":1409150175000},"page":"1790-1803","source":"Crossref","is-referenced-by-count":15,"title":["Proof-Carrying Cloud Computation: The Case of Convex Optimization"],"prefix":"10.1109","volume":"9","author":[{"given":"Zhen","family":"Xu","sequence":"first","affiliation":[]},{"given":"Cong","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Kui","family":"Ren","sequence":"additional","affiliation":[]},{"given":"Lingyu","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Bingsheng","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"The AES Crypt File Encryption Software","year":"2013","key":"ref33"},{"journal-title":"Introduction to Algorithms","year":"2008","author":"cormen","key":"ref32"},{"article-title":"Remote denial of service attacks and countermeasures","year":"2001","author":"karig","key":"ref31"},{"journal-title":"Network and Internetwork Security Principles and Practice","year":"1995","author":"stallings","key":"ref30"},{"key":"ref36","first-page":"48","article-title":"Securely outsourcing linear algebra computations","author":"atallah","year":"2010","journal-title":"Proc ASIACCS"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.2003.1199338"},{"journal-title":"The MOSEK Optimization Software","year":"2010","key":"ref34"},{"key":"ref10","first-page":"52","article-title":"An efficient protocol for secure two-party computation in the presence of malicious adversaries","author":"lindell","year":"2007","journal-title":"Proc EUROCRYPT"},{"article-title":"Algorithms for abstracting and solving imperfect information games","year":"2009","author":"gilpin","key":"ref11"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2011.41"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2011.5935305"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2014.6848155"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2014.28"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/2647868.2654941"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/PST.2008.12"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-73655-6_1"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511804441"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1007\/s10107-011-0499-2"},{"journal-title":"Gartner Says Worldwide Software As A Service Revenue Is Forecast to Grow 21 Percent in 2011","year":"2011","author":"mccall","key":"ref4"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1007\/BF02592948"},{"journal-title":"Security Guidance for Critical Areas of Focus in Cloud Computing","year":"2009","key":"ref3"},{"key":"ref6","first-page":"425","article-title":"Uncheatable distributed computations","author":"golle","year":"2001","journal-title":"Proc CT-RSA"},{"key":"ref29","doi-asserted-by":"crossref","DOI":"10.1007\/b106962","author":"kizza","year":"2005","journal-title":"Computer Network Security"},{"journal-title":"Building Customer Trust in Cloud Computing with Transparent Security","year":"2009","key":"ref5"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2004.1281562"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/2535523"},{"journal-title":"The NIST Definition of Cloud Computing","year":"2011","author":"mell","key":"ref2"},{"key":"ref9","first-page":"335","article-title":"Round-optimal secure two-party computation","author":"katz","year":"2004","journal-title":"Proc Crypto"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2013.6566845"},{"key":"ref20","doi-asserted-by":"crossref","DOI":"10.1007\/978-0-387-74503-9","author":"luenberger","year":"2008","journal-title":"Linear and Nonlinear Programming"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2003.822581"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1137\/1013001"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1287\/mnsc.18.9.567"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1137\/S1052623495288350"},{"key":"ref26","first-page":"413","article-title":"Advances in convex optimization: Conic programming","author":"nemirovski","year":"2006","journal-title":"Proc Int Congr Math"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1137\/0114105"}],"container-title":["IEEE Transactions on Information Forensics and Security"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10206\/6912034\/06884828.pdf?arnumber=6884828","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,12]],"date-time":"2022-01-12T11:52:28Z","timestamp":1641988348000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/6884828\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,11]]},"references-count":36,"journal-issue":{"issue":"11"},"URL":"https:\/\/doi.org\/10.1109\/tifs.2014.2352457","relation":{},"ISSN":["1556-6013","1556-6021"],"issn-type":[{"type":"print","value":"1556-6013"},{"type":"electronic","value":"1556-6021"}],"subject":[],"published":{"date-parts":[[2014,11]]}}}