{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:17:12Z","timestamp":1750220232956,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":20,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,6,23]],"date-time":"2022-06-23T00:00:00Z","timestamp":1655942400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Jinan Fourteen Five major scientific research project, the project title is Jinan smart city rail cloud security brain major engineering project"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,6,23]]},"DOI":"10.1145\/3546000.3546015","type":"proceedings-article","created":{"date-parts":[[2022,8,19]],"date-time":"2022-08-19T16:08:37Z","timestamp":1660925317000},"page":"99-105","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":5,"title":["Secure Mechanism of Intelligent Urban Railway Cloud Platform Based on Zero-trust Security Architecture"],"prefix":"10.1145","author":[{"given":"Ye","family":"Qlu","sequence":"first","affiliation":[{"name":"Information Technology, Jinan Rail Transit Group Co. LTD., China"}]}],"member":"320","published-online":{"date-parts":[[2022,8,19]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Effects of urban rail transit expansions: Evidence from sixteen cities","author":"Baum-Snow N","year":"1970","unstructured":"Baum-Snow N , Kahn M E , Voith R. Effects of urban rail transit expansions: Evidence from sixteen cities , 1970 -2000 [with comment][J]. Brookings-Wharton papers on urban affairs, 2005: 147-206. Baum-Snow N, Kahn M E, Voith R. Effects of urban rail transit expansions: Evidence from sixteen cities, 1970-2000 [with comment][J]. Brookings-Wharton papers on urban affairs, 2005: 147-206."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1016\/S1361-3723(20)30097-X"},{"volume-title":"IEEE International Conference on Advances in Electrical Engineering and Computer Applications (AEECA). IEEE","author":"Tu H.","key":"e_1_3_2_1_3_1","unstructured":"Tu H. Research on the Application of Cloud Computing Technology in Urban Rail Transit[C]\/\/202 0 IEEE International Conference on Advances in Electrical Engineering and Computer Applications (AEECA). IEEE , 2020: 828-831. Tu H. Research on the Application of Cloud Computing Technology in Urban Rail Transit[C]\/\/2020 IEEE International Conference on Advances in Electrical Engineering and Computer Applications (AEECA). IEEE, 2020: 828-831."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1016\/S1353-4858(21)00063-5"},{"key":"e_1_3_2_1_5_1","first-page":"210","volume-title":"November, 2017. doi: 10","author":"Mahendra Bhatu Gawali K","unstructured":"Mahendra Bhatu Gawali and Subhash K . Shinde, \"Standard Deviation Based Modified Cuckoo Optimization Algorithm for Task Scheduling to Efficient Resource Allocation in Cloud Computing,\" Vol. 8, No. 4, pp. 210-218 , November, 2017. doi: 10 .12720\/jait.8.4. 210 - 218 10.12720\/jait.8.4.210-218 Mahendra Bhatu Gawali and Subhash K. Shinde, \"Standard Deviation Based Modified Cuckoo Optimization Algorithm for Task Scheduling to Efficient Resource Allocation in Cloud Computing,\" Vol. 8, No. 4, pp. 210-218, November, 2017. doi: 10.12720\/jait.8.4.210-218"},{"key":"e_1_3_2_1_6_1","first-page":"302","volume-title":"November, 2016. doi: 10","author":"Suryakanthi Tangirala","unstructured":"Suryakanthi Tangirala , \"Efficient Big Data Analytics and Management through the Usage of Cloud Architecture,\" Vol. 7, No. 4, pp. 302-307 , November, 2016. doi: 10 .12720\/jait.7.4. 302 - 307 10.12720\/jait.7.4.302-307 Suryakanthi Tangirala, \"Efficient Big Data Analytics and Management through the Usage of Cloud Architecture,\" Vol. 7, No. 4, pp. 302-307, November, 2016. doi: 10.12720\/jait.7.4.302-307"},{"key":"e_1_3_2_1_7_1","unstructured":"Kindervag John. \"Build security into your network's dna: The zero trust network architecture.\" Forrester Research Inc (2010):  1-26.  Kindervag John. \"Build security into your network's dna: The zero trust network architecture.\" Forrester Research Inc (2010): 1-26."},{"key":"e_1_3_2_1_8_1","first-page":"207","volume":"800","author":"Stafford V A","year":"2020","unstructured":"Stafford V A . Zero -trust architecture[J] . NIST Special Publication , 2020 , 800 : 207 . Stafford V A. Zero-trust architecture[J]. NIST Special Publication, 2020, 800: 207.","journal-title":"NIST Special Publication"},{"key":"e_1_3_2_1_9_1","volume-title":"Emerging Z T P A. The Zero-trust eXtended (ZTX) ecosystem[J]","author":"Cunningham C","year":"2018","unstructured":"Cunningham C , Emerging Z T P A. The Zero-trust eXtended (ZTX) ecosystem[J] . Forrester , Cambridge, MA , 2018 . Cunningham C, Emerging Z T P A. The Zero-trust eXtended (ZTX) ecosystem[J]. Forrester, Cambridge, MA, 2018."},{"key":"e_1_3_2_1_10_1","volume-title":"Design and Implementation of a Consensus Algorithm to build Zero-trust Model[C]\/\/2020 IEEE 17th India Council International Conference (INDICON)","author":"Patil A P","year":"2020","unstructured":"Patil A P , Karkal G , Wadhwa J , Design and Implementation of a Consensus Algorithm to build Zero-trust Model[C]\/\/2020 IEEE 17th India Council International Conference (INDICON) . IEEE , 2020 : 1-5. Patil A P, Karkal G, Wadhwa J, Design and Implementation of a Consensus Algorithm to build Zero-trust Model[C]\/\/2020 IEEE 17th India Council International Conference (INDICON). IEEE, 2020: 1-5."},{"key":"e_1_3_2_1_11_1","first-page":"1","article-title":"The zero trust supply chain: Managing supply chain risk in the absence of trust","author":"Collier A.","year":"2021","unstructured":"Collier , Zachary A. , and Joseph Sarkis . \" The zero trust supply chain: Managing supply chain risk in the absence of trust .\" International Journal of Production Research ( 2021 ): 1 - 16 . Collier, Zachary A., and Joseph Sarkis. \"The zero trust supply chain: Managing supply chain risk in the absence of trust.\" International Journal of Production Research (2021): 1-16.","journal-title":"International Journal of Production Research ("},{"key":"e_1_3_2_1_12_1","volume-title":"Establishing a zero trust strategy in cloud computing environment[C]\/\/2020 International Conference on Computer Communication and Informatics (ICCCI)","author":"Mehraj S","year":"2020","unstructured":"Mehraj S , Banday M T . Establishing a zero trust strategy in cloud computing environment[C]\/\/2020 International Conference on Computer Communication and Informatics (ICCCI) . IEEE , 2020 : 1-6. Mehraj S, Banday M T. Establishing a zero trust strategy in cloud computing environment[C]\/\/2020 International Conference on Computer Communication and Informatics (ICCCI). IEEE, 2020: 1-6."},{"key":"e_1_3_2_1_13_1","volume-title":"IEEE","author":"DeCusatis","year":"2016","unstructured":"DeCusatis , Casimer, \" Implementing zero trust cloud networks with transport access control and first packet authentication.\" 2016 IEEE International Conference on Smart Cloud (SmartCloud) . IEEE , 2016 . DeCusatis, Casimer, \"Implementing zero trust cloud networks with transport access control and first packet authentication.\" 2016 IEEE International Conference on Smart Cloud (SmartCloud). IEEE, 2016."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.12720\/jait.12.2.93-106"},{"volume-title":"IEEE 14th International Conference on Cloud Computing (CLOUD). IEEE","author":"Rodigari S","key":"e_1_3_2_1_15_1","unstructured":"Rodigari S , O'Shea D , McCarthy P , Performance Analysis of Zero-Trust multi-cloud[C]\/\/2021 IEEE 14th International Conference on Cloud Computing (CLOUD). IEEE , 2021: 730-732. Rodigari S, O'Shea D, McCarthy P, Performance Analysis of Zero-Trust multi-cloud[C]\/\/2021 IEEE 14th International Conference on Cloud Computing (CLOUD). IEEE, 2021: 730-732."},{"issue":"06","key":"e_1_3_2_1_16_1","first-page":"1290","article-title":"Data Center Security Protection under Zero-Trust Security Model[J]","volume":"50","author":"Xue Z","year":"2017","unstructured":"Xue Z , Xiang M . Data Center Security Protection under Zero-Trust Security Model[J] . Communications Technology , 2017 , 50 ( 06 ): 1290 - 1294 . Xue Z, Xiang M. Data Center Security Protection under Zero-Trust Security Model[J]. Communications Technology, 2017, 50(06): 1290-1294.","journal-title":"Communications Technology"},{"key":"e_1_3_2_1_17_1","first-page":"14","article-title":"How zero-trust network security can enable recovery from cyberattacks[J]","volume":"6","author":"Beck E J","year":"2014","unstructured":"Beck E J . How zero-trust network security can enable recovery from cyberattacks[J] . ISACA Journal , 2014 , 6 : 14 - 18 . Beck E J. How zero-trust network security can enable recovery from cyberattacks[J]. ISACA Journal, 2014, 6: 14-18.","journal-title":"ISACA Journal"},{"issue":"2","key":"e_1_3_2_1_18_1","first-page":"139","article-title":"Reinforcement Learning Based Offloading Framework for Computation Service in the Edge Cloud and Core Cloud","volume":"13","author":"Nasif Muslim","year":"2022","unstructured":"Nasif Muslim , Salekul Islam, and Jean-Charles Gr\u00e9goire , \" Reinforcement Learning Based Offloading Framework for Computation Service in the Edge Cloud and Core Cloud ,\" Journal of Advances in Information Technology , Vol. 13 , No. 2 , pp. 139 - 146 , April 2022 Nasif Muslim, Salekul Islam, and Jean-Charles Gr\u00e9goire, \"Reinforcement Learning Based Offloading Framework for Computation Service in the Edge Cloud and Core Cloud,\" Journal of Advances in Information Technology, Vol. 13, No. 2, pp. 139-146, April 2022","journal-title":"Journal of Advances in Information Technology"},{"key":"e_1_3_2_1_19_1","volume-title":"Multi-agent actor-critic for mixed cooperative-competitive environments[J]. Advances in neural information processing systems","author":"Lowe R","year":"2017","unstructured":"Lowe R , Wu Y I , Tamar A , Multi-agent actor-critic for mixed cooperative-competitive environments[J]. Advances in neural information processing systems , 2017 , 30. Lowe R, Wu Y I, Tamar A, Multi-agent actor-critic for mixed cooperative-competitive environments[J]. Advances in neural information processing systems, 2017, 30."},{"key":"e_1_3_2_1_20_1","volume-title":"Multi-Agent Games[J]. arXiv preprint arXiv:2103.01955","author":"Yu C","year":"2021","unstructured":"Yu C , Velu A , Vinitsky E , The Surprising Effectiveness of PPO in Cooperative , Multi-Agent Games[J]. arXiv preprint arXiv:2103.01955 , 2021 . Yu C, Velu A, Vinitsky E, The Surprising Effectiveness of PPO in Cooperative, Multi-Agent Games[J]. arXiv preprint arXiv:2103.01955, 2021."}],"event":{"name":"HP3C'22: 2022 6th International Conference on High Performance Compilation, Computing and Communications","acronym":"HP3C'22","location":"Jilin China"},"container-title":["Proceedings of the 6th International Conference on High Performance Compilation, Computing and Communications"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3546000.3546015","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3546000.3546015","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T19:30:18Z","timestamp":1750188618000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3546000.3546015"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,6,23]]},"references-count":20,"alternative-id":["10.1145\/3546000.3546015","10.1145\/3546000"],"URL":"https:\/\/doi.org\/10.1145\/3546000.3546015","relation":{},"subject":[],"published":{"date-parts":[[2022,6,23]]},"assertion":[{"value":"2022-08-19","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}