{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,8,6]],"date-time":"2024-08-06T11:17:20Z","timestamp":1722943040748},"reference-count":50,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Serv. Comput."],"published-print":{"date-parts":[[2017]]},"DOI":"10.1109\/tsc.2017.2771469","type":"journal-article","created":{"date-parts":[[2017,11,8]],"date-time":"2017-11-08T19:12:45Z","timestamp":1510168365000},"page":"1-1","source":"Crossref","is-referenced-by-count":3,"title":["Service Integrity Assurance for Distributed Computation Outsourcing"],"prefix":"10.1109","author":[{"given":"Alireza","family":"Toroghi Haghighat","sequence":"first","affiliation":[]},{"given":"Mehdi","family":"Shajari","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1007\/s10462-015-9439-5"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.3286"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/356770.356773"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.14257\/ijgdc.2014.7.6.05"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/SC.2008.5213939"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/TBDATA.2016.2599928"},{"key":"ref37","first-page":"186","article-title":"Two can keep a secret: A distributed architecture for secure database services","author":"aggarwal","year":"2005","journal-title":"Proc 2nd Biennial Conf Innovative Data Syst Res"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1145\/342009.335438"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2006.889687"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1145\/1102120.1102157"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/CCGrid.2012.77"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/CCIS.2012.6664404"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/BigData.2015.7363785"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2008.12"},{"key":"ref1","article-title":"Volunteer computing","author":"sarmenta","year":"2001"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2013.47"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-46088-8_23"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.23"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.2003.1199338"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45353-9_31"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/CLOUD.2011.33"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/IPDPS.2011.351"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/IPDPS.2011.345"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2004.1281562"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/s10723-009-9124-5"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-47804-3_8"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ACSAC.2009.17"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2013.07.001"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/1327452.1327492"},{"key":"ref15","article-title":"Analysis of Bitcoin pooled mining reward systems","author":"rosenfeld","year":"2011","journal-title":"arXiv preprint arXiv 1112 4980"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.13"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-14623-7_25"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-13869-0_30"},{"key":"ref19","article-title":"Making argument systems for outsourced computation practical (sometimes)","author":"setty","year":"2012","journal-title":"Proc Symp Netw Distrib Syst Security"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/581571.581573"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/1655008.1655020"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1140\/epjds\/s13688-014-0013-1"},{"key":"ref5","year":"2017"},{"key":"ref8","doi-asserted-by":"crossref","first-page":"31","DOI":"10.1109\/P2P.2005.32","article-title":"Result verification and trust-based scheduling in peer-to-peer grids","author":"zhao","year":"2005","journal-title":"Proc 5th IEEE Int Conf Peer-to-Peer Comput"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/1924421.1924441"},{"key":"ref49","year":"2017"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/s10723-009-9125-4"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1002\/spe.995"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1002\/9781118348239"},{"key":"ref48","year":"2016"},{"key":"ref47","article-title":"Self-service, prorated supercomputing fun!","author":"gottfrid","year":"2016"},{"key":"ref42","first-page":"3","article-title":"Formal ontology and information systems","author":"guarino","year":"1998","journal-title":"In Proc Formal Ontology in Info Sys"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/ICTAI.2015.157"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2012.04.030"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.3115\/981732.981751"}],"container-title":["IEEE Transactions on Services Computing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/4629386\/4629387\/08101003.pdf?arnumber=8101003","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,4,27]],"date-time":"2022-04-27T17:12:12Z","timestamp":1651079532000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/8101003\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"references-count":50,"URL":"https:\/\/doi.org\/10.1109\/tsc.2017.2771469","relation":{},"ISSN":["1939-1374"],"issn-type":[{"value":"1939-1374","type":"print"}],"subject":[],"published":{"date-parts":[[2017]]}}}