{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,16]],"date-time":"2026-04-16T00:52:33Z","timestamp":1776300753893,"version":"3.50.1"},"reference-count":43,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2024,11,8]],"date-time":"2024-11-08T00:00:00Z","timestamp":1731024000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"},{"start":{"date-parts":[[2024,11,8]],"date-time":"2024-11-08T00:00:00Z","timestamp":1731024000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"crossref","award":["62162039"],"award-info":[{"award-number":["62162039"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"crossref","award":["61762060"],"award-info":[{"award-number":["61762060"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"crossref","award":["62462044"],"award-info":[{"award-number":["62462044"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"crossref","award":["62162039"],"award-info":[{"award-number":["62162039"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"name":"Foundation for the Key Research and Development Program of Gansu Province, China","award":["23YFGA0060"],"award-info":[{"award-number":["23YFGA0060"]}]},{"name":"Foundation for the Key Research and Development Program of Gansu Province, China","award":["23YFGA0060"],"award-info":[{"award-number":["23YFGA0060"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Cloud Comp"],"DOI":"10.1186\/s13677-024-00715-8","type":"journal-article","created":{"date-parts":[[2024,11,8]],"date-time":"2024-11-08T13:34:55Z","timestamp":1731072895000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Privacy-enhanced distributed revocable identity management scheme based self-sovereign identity"],"prefix":"10.1186","volume":"13","author":[{"given":"Junli","family":"Fang","sequence":"first","affiliation":[]},{"given":"Tao","family":"Feng","sequence":"additional","affiliation":[]},{"given":"Xian","family":"Guo","sequence":"additional","affiliation":[]},{"given":"Xusheng","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,11,8]]},"reference":[{"key":"715_CR1","first-page":"1173","volume-title":"Self-Sovereign Identity: Use-cases, Technologies, and Challenges for Industrial IoT. 24th IEEE International Conference on Emerging Technologies and Factory Automation (ETFA)","author":"PC Bartolomeu","year":"2019","unstructured":"Bartolomeu PC, Vieira E, Hosseini SM, Ferreira J, Ieee (2019) Self-Sovereign Identity: Use-cases, Technologies, and Challenges for Industrial IoT. 24th IEEE International Conference on Emerging Technologies and Factory Automation (ETFA). IEEE, Zaragoza, SPAIN, pp 1173\u201380"},{"key":"715_CR2","doi-asserted-by":"publisher","unstructured":"Gl\u00f6ckler J, Sedlmeir J, Frank M, Fridgen G. A Systematic Review of Identity and Access Management Requirements in Enterprises and Potential Contributions of Self-Sovereign Identity. Bus Inf Syst Eng. 2023:20. https:\/\/doi.org\/10.1007\/s12599-023-00830-x.","DOI":"10.1007\/s12599-023-00830-x"},{"key":"715_CR3","doi-asserted-by":"publisher","first-page":"113436","DOI":"10.1109\/access.2022.3216643","volume":"10","author":"MR Ahmed","year":"2022","unstructured":"Ahmed MR, Islam A, Shatabda S, Islam S (2022) Blockchain-Based Identity Management System and Self-Sovereign Identity Ecosystem: A Comprehensive Survey. IEEE Access 10:113436\u2013113481. https:\/\/doi.org\/10.1109\/access.2022.3216643.","journal-title":"IEEE Access"},{"key":"715_CR4","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1016\/j.jnca.2020.102731","volume":"166","author":"Y Liu","year":"2020","unstructured":"Liu Y, He DB, Obaidat MS, Kumar N, Khan MK, Choo KKR (2020) Blockchain-based identity management systems: A review. J Netw Comput Appl 166:11. https:\/\/doi.org\/10.1016\/j.jnca.2020.102731.","journal-title":"J Netw Comput Appl"},{"key":"715_CR5","doi-asserted-by":"publisher","first-page":"26","DOI":"10.1155\/2021\/8873429","volume":"2021","author":"R Soltani","year":"2021","unstructured":"Soltani R, Nguyen UT, An AJ (2021) A Survey of Self-Sovereign Identity Ecosystem. Secur Commun Netw 2021:26. https:\/\/doi.org\/10.1155\/2021\/8873429.","journal-title":"Secur Commun Netw"},{"key":"715_CR6","doi-asserted-by":"publisher","first-page":"20","DOI":"10.1016\/j.jisa.2023.103678","volume":"80","author":"A Diro","year":"2024","unstructured":"Diro A, Zhou L, Saini A, Kaisar S, Hiep PC (2024) Leveraging zero knowledge proofs for blockchain-based identity sharing: A survey of advancements, challenges and opportunities. J Inf Secur Appl 80:20. https:\/\/doi.org\/10.1016\/j.jisa.2023.103678.","journal-title":"J Inf Secur Appl"},{"key":"715_CR7","doi-asserted-by":"publisher","unstructured":"Fedrecheski G, Rabaey JM, Costa LCP, Ccori PCC, Pereira WT, Zuffo MK. Self-Sovereign Identity for IoT environments: A Perspective. 4th IEEE Global Internet of Things Summit (GIoTS). Dublin: IEEE, New York; 2020. p. 1-6. https:\/\/doi.org\/10.1109\/GIOTS49054.2020.9119664.","DOI":"10.1109\/GIOTS49054.2020.9119664"},{"key":"715_CR8","doi-asserted-by":"crossref","unstructured":"Bai Y, Lei H, Li S, Gao H, Li J, Li L. Decentralized and Self-Sovereign Identity in the Era of Blockchain: A Survey. 2022 IEEE International Conference on Blockchain (Blockchain). EsPoo: IEEE, New York; 2022. p. 500\u20137.","DOI":"10.1109\/Blockchain55522.2022.00077"},{"key":"715_CR9","doi-asserted-by":"publisher","first-page":"61660","DOI":"10.1109\/access.2023.3279492","volume":"11","author":"A Badirova","year":"2023","unstructured":"Badirova A, Dabbaghi S, Moghaddam FF, Wieder P, Yahyapour R (2023) A Survey on Identity and Access Management for Cross-Domain Dynamic Users: Issues, Solutions, and Challenges. IEEE Access 11:61660\u201361679. https:\/\/doi.org\/10.1109\/access.2023.3279492.","journal-title":"IEEE Access"},{"issue":"3","key":"715_CR10","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1145\/3616400","volume":"56","author":"KL Tan","year":"2024","unstructured":"Tan KL, Chi CH, Lam KY (2024) Survey on Digital Sovereignty and Identity: From Digitization to Digitalization. ACM Comput Surv 56(3):36. https:\/\/doi.org\/10.1145\/3616400.","journal-title":"ACM Comput Surv"},{"key":"715_CR11","doi-asserted-by":"publisher","first-page":"7637","DOI":"10.1109\/access.2023.3349095","volume":"12","author":"R Bochnia","year":"2024","unstructured":"Bochnia R, Richter D, Anke J (2024) Self-Sovereign Identity for Organizations: Requirements for Enterprise Software. IEEE Access 12:7637\u20137660. https:\/\/doi.org\/10.1109\/access.2023.3349095.","journal-title":"IEEE Access"},{"issue":"1","key":"715_CR12","doi-asserted-by":"publisher","first-page":"5429195","DOI":"10.1155\/2022\/5429195","volume":"2022","author":"Y Ren","year":"2022","unstructured":"Ren Y, Liu X, Wu Q, Wang L, Zhang W (2022) Cryptographic Accumulator and Its Application: A Survey. Secur Commun Netw 2022(1):5429195. https:\/\/doi.org\/10.1155\/2022\/5429195.","journal-title":"Secur Commun Netw"},{"key":"715_CR13","doi-asserted-by":"publisher","first-page":"16151","DOI":"10.1109\/ACCESS.2024.3357940","volume":"12","author":"A Satybaldy","year":"2024","unstructured":"Satybaldy A, Ferdous MS, Nowostawski M (2024) A Taxonomy of Challenges for Self-Sovereign Identity Systems. IEEE Access 12:16151\u201316177. https:\/\/doi.org\/10.1109\/ACCESS.2024.3357940,ISSN=2169-3536.","journal-title":"IEEE Access"},{"key":"715_CR14","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1016\/j.jisa.2024.103789","volume":"83","author":"A Flamini","year":"2024","unstructured":"Flamini A, Sciarretta G, Scuro M, Sharif A, Tomasi A, Ranise S (2024) On cryptographic mechanisms for the selective disclosure of verifiable credentials. J Inf Secur Appl 83:18. https:\/\/doi.org\/10.1016\/j.jisa.2024.103789.","journal-title":"J Inf Secur Appl"},{"key":"715_CR15","doi-asserted-by":"publisher","first-page":"60928","DOI":"10.1109\/access.2024.3394537","volume":"12","author":"CN Butincu","year":"2024","unstructured":"Butincu CN, Alexandrescu A (2024) Design Aspects of Decentralized Identifiers and Self-Sovereign Identity Systems. IEEE Access 12:60928\u201360942. https:\/\/doi.org\/10.1109\/access.2024.3394537.","journal-title":"IEEE Access"},{"issue":"4","key":"715_CR16","doi-asserted-by":"publisher","first-page":"1008","DOI":"10.1109\/tem.2019.2926471","volume":"67","author":"M Kuperberg","year":"2020","unstructured":"Kuperberg M (2020) Blockchain-Based Identity Management: A Survey From the Enterprise and Ecosystem Perspective. IEEE Trans Eng Manage 67(4):1008\u20131027. https:\/\/doi.org\/10.1109\/tem.2019.2926471.","journal-title":"IEEE Trans Eng Manage"},{"key":"715_CR17","doi-asserted-by":"publisher","unstructured":"Grnner A, Muenhle A, Lockenvitz N, Meinel C. Analyzing and comparing the security of self-sovereign identity management systems through threat modeling. Int J Inf Secur. 2023:18. https:\/\/doi.org\/10.1007\/s10207-023-00688-w.","DOI":"10.1007\/s10207-023-00688-w"},{"key":"715_CR18","volume-title":"Cohen MSTTJIHMBJG,\u00a0editor","author":"MSDLDLO Steele","year":"2024","unstructured":"Steele MSDLDLO (2024) Verifiable Credentials Data Model v2.0\u00a0W3C Candidate Recommendation Draft. Cohen MSTTJIHMBJG,\u00a0editor"},{"key":"715_CR19","volume-title":"Decentralized identifiers (dids) v1. 0:[J]. W3C Working Draft, 2020, 8. Decentralized Identifiers (DIDs) v1.0:Core architecture, data model, and representations","author":"SM Reed D","year":"2022","unstructured":"Reed D SM, Longley D et al (2022) Decentralized identifiers (dids) v1. 0:[J]. W3C Working Draft, 2020, 8. Decentralized Identifiers (DIDs) v1.0:Core architecture, data model, and representations"},{"key":"715_CR20","first-page":"960","volume-title":"Blockchain-based Verifiable Credential Sharing with Selective Disclosure. 19th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom)","author":"R Mukta","year":"2020","unstructured":"Mukta R, Martens J, Paik HY, Lu QH, Kanhere SS (2020) Blockchain-based Verifiable Credential Sharing with Selective Disclosure. 19th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom). Ieee Computer Soc, Guangzhou, PEOPLES R CHINA, pp 960\u20137"},{"key":"715_CR21","volume-title":"Coconut: Threshold Issuance Selective Disclosure Credentials with Applications to Distributed Ledgers. 26th Annual Network and Distributed System Security Symposium (NDSS)","author":"A Sonnino","year":"2019","unstructured":"Sonnino A, Al-Bassam M, Bano S, Meiklejohn S, Danezis G, Internet S (2019) Coconut: Threshold Issuance Selective Disclosure Credentials with Applications to Distributed Ledgers. 26th Annual Network and Distributed System Security Symposium (NDSS). Internet Soc, San Diego, CA"},{"issue":"2","key":"715_CR22","doi-asserted-by":"publisher","first-page":"43","DOI":"10.4236\/jis.2022.132003","volume":"13","author":"Z Li","year":"2022","unstructured":"Li Z (2022) A verifiable credentials system with privacy-preserving based on blockchain. J Inf Secur 13(2):43\u201365. https:\/\/doi.org\/10.4236\/jis.2022.132003.","journal-title":"J Inf Secur"},{"issue":"10","key":"715_CR23","doi-asserted-by":"publisher","first-page":"8387","DOI":"10.1109\/JIOT.2020.3045451","volume":"8","author":"T Li","year":"2021","unstructured":"Li T, Wang H, He D, Yu J (2021) Permissioned Blockchain-Based Anonymous and Traceable Aggregate Signature Scheme for Industrial Internet of Things. IEEE Internet Things J 8(10):8387\u20138398. https:\/\/doi.org\/10.1109\/JIOT.2020.3045451,ISSN=2327-4662.","journal-title":"IEEE Internet Things J"},{"key":"715_CR24","doi-asserted-by":"publisher","DOI":"10.1016\/j.ic.2023.105060","volume":"293","author":"H Chlo\u00e9","year":"2023","unstructured":"Chlo\u00e9 H, David P (2023) Traceable constant-size multi-authority credentials. Inf Comput 293:105060. https:\/\/doi.org\/10.1016\/j.ic.2023.105060.","journal-title":"Inf Comput"},{"issue":"1","key":"715_CR25","doi-asserted-by":"publisher","first-page":"57","DOI":"10.1109\/JIOT.2022.3199480","volume":"10","author":"L Deng","year":"2023","unstructured":"Deng L, Wang T, Feng S, Qu Y, Li S (2023) Secure Identity-Based Designated Verifier Anonymous Aggregate Signature Scheme Suitable for Smart Grids. IEEE Internet Things J 10(1):57\u201365. https:\/\/doi.org\/10.1109\/JIOT.2022.3199480,ISSN=2327-4662.","journal-title":"IEEE Internet Things J"},{"key":"715_CR26","doi-asserted-by":"publisher","unstructured":"Wang Z, Yang S, Li F, Geng K, Peng T, Shi M. Efficient and provably-secure certificateless sequential aggregate signature scheme. J Commun. 2022;43(5):58-67. https:\/\/doi.org\/10.11959\/j.issn.1000\u2212436x.2022073.","DOI":"10.11959\/j.issn.1000\u2212436x.2022073"},{"key":"715_CR27","doi-asserted-by":"crossref","unstructured":"Yue X, Yang L, Wang X, Zeng S, Xu J, Bai S, He Y. An Aggregate Anonymous Credential Scheme in C-ITS for Multi-Service with Revocation. 2021 IEEE 20th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom). Shenyang: IEEE, New York; 2021. p. 452\u20139.","DOI":"10.1109\/TrustCom53373.2021.00074"},{"key":"715_CR28","doi-asserted-by":"publisher","first-page":"401","DOI":"10.1007\/978-3-030-57990-6_20","volume-title":"Short threshold dynamic group signatures. Security and Cryptography for Networks: 12th International Conference, SCN 2020","author":"J Camenisch","year":"2020","unstructured":"Camenisch J, Drijvers M, Lehmann A, Neven G, Towa P (2020) Short threshold dynamic group signatures. Security and Cryptography for Networks: 12th International Conference, SCN 2020. Springer, Amalfi, Italy, September 14\u201316, 2020, Proceedings, pp 401\u201323"},{"issue":"12","key":"715_CR29","doi-asserted-by":"publisher","first-page":"34581","DOI":"10.1007\/s11042-023-17002-4","volume":"83","author":"SS Sahoo","year":"2024","unstructured":"Sahoo SS, Chaurasiya VK (2024) EASB: ECC based aggregate signature without bilinear pairing for blockchain. Multimed Tools Appl 83(12):34581\u201334600. https:\/\/doi.org\/10.1007\/s11042-023-17002-4.","journal-title":"Multimed Tools Appl"},{"key":"715_CR30","first-page":"111","volume-title":"Short Randomizable Signatures. Cryptographers Track at the RSA Conference (CT-RSA)","author":"D Pointcheval","year":"2016","unstructured":"Pointcheval D, Sanders O (2016) Short Randomizable Signatures. Cryptographers Track at the RSA Conference (CT-RSA). Springer, San Francisco, CA, pp 111\u201326"},{"issue":"2","key":"715_CR31","doi-asserted-by":"publisher","first-page":"498","DOI":"10.1007\/s00145-018-9281-4","volume":"32","author":"G Fuchsbauer","year":"2019","unstructured":"Fuchsbauer G, Hanser C, Slamanig D (2019) Structure-Preserving Signatures on Equivalence Classes and Constant-Size Anonymous Credentials. J Cryptol 32(2):498\u2013546. https:\/\/doi.org\/10.1007\/s00145-018-9281-4.","journal-title":"J Cryptol"},{"issue":"5","key":"715_CR32","doi-asserted-by":"publisher","first-page":"3290","DOI":"10.1109\/tii.2019.2944678","volume":"16","author":"Y Yu","year":"2020","unstructured":"Yu Y, Zhao YQ, Li YN, Du XJ, Wang LH, Guizani M (2020) Blockchain-Based Anonymous Authentication With Selective Revocation for Smart Industrial Applications. IEEE Trans Ind Inform 16(5):3290\u20133300. https:\/\/doi.org\/10.1109\/tii.2019.2944678.","journal-title":"IEEE Trans Ind Inform"},{"key":"715_CR33","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2020.102807","volume":"171","author":"N Kaaniche","year":"2020","unstructured":"Kaaniche N, Laurent M, Belguith S (2020) Privacy enhancing technologies for solving the privacy-personalization paradox: Taxonomy and survey. J Netw Comput Appl 171:102807.","journal-title":"J Netw Comput Appl"},{"issue":"18","key":"715_CR34","doi-asserted-by":"publisher","first-page":"3918","DOI":"10.3390\/math11183918","volume":"11","author":"NAS Amir","year":"2023","unstructured":"Amir NAS, Othman WAM, Wong KB (2023) Securing an Authenticated Privacy Preserving Protocol in a Group Signature Scheme Based on a Group Ring. Mathematics 11(18):3918.","journal-title":"Mathematics"},{"key":"715_CR35","first-page":"437","volume-title":"Who Let the DOGS Out: Anonymous but Auditable Communications Using Group Signature Schemes with Distributed Opening","author":"M Dehez-Clementi","year":"2020","unstructured":"Dehez-Clementi M, Deneuville J-C, Lacan J, Asghar H, Kaafar D (2020) Who Let the $$\\mathcal {DOGS}$$Out: Anonymous but Auditable Communications Using Group Signature Schemes with Distributed Opening. Springer International Publishing, Cham, pp 437\u2013446."},{"key":"715_CR36","first-page":"127","volume-title":"Efficient Credential Revocation Using Cryptographic Accumulators. 5th IEEE International Conference on Decentralized Applications and Infrastructures (IEEE DAPPS)","author":"D Schumm","year":"2023","unstructured":"Schumm D, Mukta R, Paik HY, Ieee (2023) Efficient Credential Revocation Using Cryptographic Accumulators. 5th IEEE International Conference on Decentralized Applications and Infrastructures (IEEE DAPPS). Ieee Computer Soc, Athens, GREECE, pp 127\u201334"},{"key":"715_CR37","doi-asserted-by":"crossref","unstructured":"Baldimtsi F, Camenisch J, Dubovitskaya M, Lysyanskaya A, Reyzin L, Samelin K, Yakoubov S. Accumulators with applications to anonymity-preserving revocation. 2017 IEEE European Symposium on Security and Privacy (EuroS&P): Paris: IEEE, New York; 2017. p. 301\u201315.","DOI":"10.1109\/EuroSP.2017.13"},{"issue":"2","key":"715_CR38","doi-asserted-by":"publisher","first-page":"1524","DOI":"10.1109\/TII.2022.3206798","volume":"19","author":"Z Bao","year":"2022","unstructured":"Bao Z, He D, Khan MK, Luo M, Xie Q (2022) PBidm: Privacy-Preserving Blockchain-Based Identity Management System for Industrial Internet of Things. IEEE Trans Ind Inform 19(2):1524\u20131534. https:\/\/doi.org\/10.1109\/TII.2022.3206798.","journal-title":"IEEE Trans Ind Inform"},{"key":"715_CR39","first-page":"61","volume-title":"Crypto","author":"J Camenisch","year":"2002","unstructured":"Camenisch J, Lysyanskaya A (2002) Dynamic accumulators and application to efficient revocation of anonymous credentials. In: Yung M (ed) Crypto. California, Springer, Berlin, Heidelberg, pp 61\u201376"},{"key":"715_CR40","first-page":"275","volume-title":"Accumulators from bilinear pairings and applications. Topics in Cryptology\u2013CT-RSA 2005: The Cryptographers\u2019 Track at the RSA Conference 2005","author":"L Nguyen","year":"2005","unstructured":"Nguyen L (2005) Accumulators from bilinear pairings and applications. Topics in Cryptology\u2013CT-RSA 2005: The Cryptographers\u2019 Track at the RSA Conference 2005. Springer, San Francisco, CA, USA, February 14\u201318, 2005 Proceedings, pp 275\u201392"},{"issue":"4","key":"715_CR41","doi-asserted-by":"publisher","first-page":"469","DOI":"10.1109\/TIT.1985.1057074","volume":"31","author":"T ElGamal","year":"1985","unstructured":"ElGamal T (1985) A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Trans Inf Theory 31(4):469\u2013472. https:\/\/doi.org\/10.1109\/TIT.1985.1057074.","journal-title":"IEEE Trans Inf Theory"},{"key":"715_CR42","doi-asserted-by":"crossref","unstructured":"Feldman P. A practical scheme for non-interactive verifiable secret sharing. 28th Annual Symposium on Foundations of Computer Science (sfcs 1987). Los Angeles: IEEE, New York; 1987. p. 427\u201338.","DOI":"10.1109\/SFCS.1987.4"},{"key":"715_CR43","first-page":"2719","volume-title":"Batching, Aggregation, and Zero-Knowledge Proofs in Bilinear Accumulators. Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security","author":"S Srinivasan","year":"2022","unstructured":"Srinivasan S, Karantaidou I, Baldimtsi F, Papamanthou C (2022) Batching, Aggregation, and Zero-Knowledge Proofs in Bilinear Accumulators. Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security. pp 2719\u201333"}],"container-title":["Journal of Cloud Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s13677-024-00715-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1186\/s13677-024-00715-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s13677-024-00715-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,8]],"date-time":"2024-11-08T14:03:54Z","timestamp":1731074634000},"score":1,"resource":{"primary":{"URL":"https:\/\/journalofcloudcomputing.springeropen.com\/articles\/10.1186\/s13677-024-00715-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,11,8]]},"references-count":43,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2024,12]]}},"alternative-id":["715"],"URL":"https:\/\/doi.org\/10.1186\/s13677-024-00715-8","relation":{},"ISSN":["2192-113X"],"issn-type":[{"value":"2192-113X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,11,8]]},"assertion":[{"value":"25 June 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"20 October 2024","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"8 November 2024","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"154"}}