{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,21]],"date-time":"2026-04-21T22:40:25Z","timestamp":1776811225416,"version":"3.51.2"},"reference-count":30,"publisher":"European Society of Computational Methods in Sciences and Engineering","issue":"4","license":[{"start":{"date-parts":[[2025,2,20]],"date-time":"2025-02-20T00:00:00Z","timestamp":1740009600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/journals.sagepub.com\/page\/policies\/text-and-data-mining-license"}],"content-domain":{"domain":["journals.sagepub.com"],"crossmark-restriction":true},"short-container-title":["Journal of Computational Methods in Sciences and Engineering"],"published-print":{"date-parts":[[2025,7]]},"abstract":"<jats:p>This article analyzes the characteristics of security redundancy structure and cloud computing in the dynamic management system of business management teaching resources. Taking the ZC system as an example, based on the integration of blockchain decentralization technology, the overall scheme of a cluster-based ZC service system based on cloud computing is proposed. Develop and design custom consensus algorithms and smart contracts that align with the foundational principles of decentralized blockchain technology. By implementing a reputation-based evaluation system for nodes within the network, the influence of malicious nodes on the consensus procedure can be effectively mitigated. This paper investigates the potential risk of single-point failures in the security redundancy architecture of the dynamic management system for business administration teaching resources, particularly within the ZC subsystem, which is critical to ensuring system integrity. Create a blockchain-based program and propose a deployment method for a minimal system using containerization, while also introducing an attack tree analysis consensus algorithm to address potential information security risks. Assess the impact of factors such as block size and the number of nodes in the cluster on the throughput, consensus latency, and cycle stability of the consensus algorithm, providing a comprehensive evaluation of system performance. The proposed ZC cluster in this study complies with the SIL4 security standard, offering superior reliability compared to traditional ZC systems in terms of security and fault tolerance. Regarding system availability, the PoTH consensus algorithm, as proposed, exhibits an average delay of 4.33\u00a0ms with a standard deviation of 0.173\u00a0ms across multiple trials. The algorithm\u2019s cycle stability ensures smooth operation of up to 40 trains while remaining within the maximum delay threshold of 100\u00a0ms.<\/jats:p>","DOI":"10.1177\/14727978251318994","type":"journal-article","created":{"date-parts":[[2025,2,20]],"date-time":"2025-02-20T08:52:11Z","timestamp":1740041531000},"page":"3411-3424","update-policy":"https:\/\/doi.org\/10.1177\/sage-journals-update-policy","source":"Crossref","is-referenced-by-count":1,"title":["Innovation of dynamic management model for teaching resources of business administration in cloud computing environment"],"prefix":"10.66113","volume":"25","author":[{"given":"Wenle","family":"Li","sequence":"first","affiliation":[{"name":"Henan Polytechnic, Zhengzhou, China"}]},{"given":"Wenjun","family":"Li","sequence":"additional","affiliation":[{"name":"Kyungil University, Gyeongsan, Korea"}]}],"member":"55691","published-online":{"date-parts":[[2025,2,20]]},"reference":[{"key":"e_1_3_2_2_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2021.11.019"},{"key":"e_1_3_2_3_2","doi-asserted-by":"publisher","DOI":"10.1177\/15910199211009111"},{"key":"e_1_3_2_4_2","doi-asserted-by":"publisher","DOI":"10.3390\/app112311296"},{"key":"e_1_3_2_5_2","doi-asserted-by":"publisher","DOI":"10.3390\/w13233330"},{"key":"e_1_3_2_6_2","doi-asserted-by":"publisher","DOI":"10.3390\/rs13224704"},{"key":"e_1_3_2_7_2","doi-asserted-by":"publisher","DOI":"10.3390\/app112210996"},{"key":"e_1_3_2_8_2","doi-asserted-by":"publisher","DOI":"10.3390\/app112210981"},{"key":"e_1_3_2_9_2","first-page":"1","article-title":"Cloud platform incorporating dynamic modularity for improved service to subscribers","volume":"14","author":"Periola AA","year":"2021","unstructured":"Periola AA, Ajisafe VA, Oyediran MO. Cloud platform incorporating dynamic modularity for improved service to subscribers. J Ambient Intell Hum Comput 2021; 14: 1\u201317.","journal-title":"J Ambient Intell Hum Comput"},{"key":"e_1_3_2_10_2","doi-asserted-by":"publisher","DOI":"10.3390\/electronics10222825"},{"key":"e_1_3_2_11_2","first-page":"1","article-title":"An edge computing oriented unified cryptographic key management service for financial context","volume":"30","author":"Chen J","year":"2021","unstructured":"Chen J, Guo L, Shi Y, et al. An edge computing oriented unified cryptographic key management service for financial context. Wirel Netw 2021; 30: 1\u201314.","journal-title":"Wirel Netw"},{"key":"e_1_3_2_12_2","doi-asserted-by":"publisher","DOI":"10.3390\/healthcare9111551"},{"key":"e_1_3_2_13_2","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3095236"},{"key":"e_1_3_2_14_2","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.3039324"},{"key":"e_1_3_2_15_2","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.3046441"},{"key":"e_1_3_2_16_2","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3074823"},{"key":"e_1_3_2_17_2","doi-asserted-by":"publisher","DOI":"10.3390\/app112210610"},{"key":"e_1_3_2_18_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2024.107628"},{"key":"e_1_3_2_19_2","doi-asserted-by":"publisher","DOI":"10.3390\/electronics10212719"},{"key":"e_1_3_2_20_2","doi-asserted-by":"publisher","DOI":"10.3390\/electronics10212702"},{"key":"e_1_3_2_21_2","doi-asserted-by":"publisher","DOI":"10.3390\/s21217308"},{"key":"e_1_3_2_22_2","doi-asserted-by":"publisher","DOI":"10.3390\/electronics10212685"},{"key":"e_1_3_2_23_2","first-page":"1","article-title":"Identifying cloud computing risks based on firm\u2019s ambidexterity performance using fuzzy VIKOR technique","volume":"23","author":"Taghavifard MT","year":"2021","unstructured":"Taghavifard MT, Majidian S. Identifying cloud computing risks based on firm\u2019s ambidexterity performance using fuzzy VIKOR technique. Global J Flex Syst Manag 2021; 23: 1\u201321.","journal-title":"Global J Flex Syst Manag"},{"key":"e_1_3_2_24_2","doi-asserted-by":"publisher","DOI":"10.1080\/17538947.2021.1970262"},{"key":"e_1_3_2_25_2","doi-asserted-by":"publisher","DOI":"10.3390\/su132112112"},{"key":"e_1_3_2_26_2","first-page":"1","article-title":"A survey on internet of energy security: related fields, challenges, threats and emerging technologies","volume":"25","author":"Mogadem MM","year":"2021","unstructured":"Mogadem MM, Li Y, Meheretie DL. A survey on internet of energy security: related fields, challenges, threats and emerging technologies. Clust Comput 2021; 25: 1\u201337.","journal-title":"Clust Comput"},{"key":"e_1_3_2_27_2","doi-asserted-by":"publisher","DOI":"10.3390\/app112110249"},{"key":"e_1_3_2_28_2","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2021.3076537"},{"key":"e_1_3_2_29_2","doi-asserted-by":"publisher","DOI":"10.3390\/electronics10212673"},{"key":"e_1_3_2_30_2","doi-asserted-by":"publisher","DOI":"10.3390\/s21217238"},{"key":"e_1_3_2_31_2","doi-asserted-by":"publisher","DOI":"10.3390\/rs13214378"}],"container-title":["Journal of Computational Methods in Sciences and Engineering"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.1177\/14727978251318994","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/full-xml\/10.1177\/14727978251318994","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.1177\/14727978251318994","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,21]],"date-time":"2026-04-21T22:05:50Z","timestamp":1776809150000},"score":1,"resource":{"primary":{"URL":"https:\/\/journals.sagepub.com\/doi\/10.1177\/14727978251318994"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,2,20]]},"references-count":30,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2025,7]]}},"alternative-id":["10.1177\/14727978251318994"],"URL":"https:\/\/doi.org\/10.1177\/14727978251318994","relation":{},"ISSN":["1472-7978","1875-8983"],"issn-type":[{"value":"1472-7978","type":"print"},{"value":"1875-8983","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,2,20]]}}}