{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,9,3]],"date-time":"2023-09-03T06:11:11Z","timestamp":1693721471827},"reference-count":10,"publisher":"Wiley","issue":"3","license":[{"start":{"date-parts":[[2016,1,6]],"date-time":"2016-01-06T00:00:00Z","timestamp":1452038400000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/onlinelibrary.wiley.com\/termsAndConditions#vor"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Concurrency and Computation"],"published-print":{"date-parts":[[2016,3,10]]},"DOI":"10.1002\/cpe.3755","type":"journal-article","created":{"date-parts":[[2016,1,8]],"date-time":"2016-01-08T05:27:26Z","timestamp":1452230846000},"page":"581-582","source":"Crossref","is-referenced-by-count":2,"title":["Security and reliability in big data"],"prefix":"10.1002","volume":"28","author":[{"given":"Yang","family":"Xiang","sequence":"first","affiliation":[{"name":"School of Information Technology Deakin University Geelong Australia"}]},{"given":"Ivan","family":"Stojmenovic","sequence":"additional","affiliation":[{"name":"School of Information Technology Deakin University Geelong Australia"}]},{"given":"Peter","family":"Mueller","sequence":"additional","affiliation":[{"name":"IBM Zurich Research Laboratory Switzerland"}]},{"given":"Jun","family":"Zhang","sequence":"additional","affiliation":[{"name":"School of Information Technology Deakin University Geelong Australia"}]}],"member":"311","published-online":{"date-parts":[[2016,1,6]]},"reference":[{"key":"e_1_2_3_2_1","doi-asserted-by":"crossref","unstructured":"HwangG\u2010H HuangW\u2010 S PengJ\u2010Z LinY\u2010W.Fulfilling mutual nonrepudiation for cloud storage Concurrency and Computation: Practice and Experience2016;28(3):583\u2013559.","DOI":"10.1002\/cpe.3315"},{"key":"e_1_2_3_3_1","doi-asserted-by":"crossref","unstructured":"WangH YiX BertinoE SunL.Protecting outsourced data in cloud computing through access management Concurrency and Computation: Practice and Experience2016;28(3):600\u2013615.","DOI":"10.1002\/cpe.3286"},{"key":"e_1_2_3_4_1","doi-asserted-by":"crossref","unstructured":"HanC LiZ XieG UhligS WuY LiL GeJ LiuY.Insights into the issue in IPv6 adoption: a view from the Chinese IPv6 application mix Concurrency and Computation: Practice and Experience2016;28(3):616\u2013630.","DOI":"10.1002\/cpe.3327"},{"key":"e_1_2_3_5_1","doi-asserted-by":"crossref","unstructured":"ZhouW XuY WangG.Decentralized group key management for hierarchical access control using multilinear forms Concurrency and Computation: Practice and Experience2016;28(3):631\u2013645.","DOI":"10.1002\/cpe.3328"},{"key":"e_1_2_3_6_1","doi-asserted-by":"crossref","unstructured":"LiuC BeaugeardN YangC ZhangX ChenJ.HKE\u2010BC: hierarchical key exchange for secure scheduling and auditing of big data in cloud computing Concurrency and Computation: Practice and Experience2016;28(3):646\u2013660.","DOI":"10.1002\/cpe.3426"},{"key":"e_1_2_3_7_1","doi-asserted-by":"crossref","unstructured":"ZhangJ HuangML.Density approach: a new model for bigdata analysis and visualizaiton Concurrency and Computation: Practice and Experience2016;28(3):661\u2013673.","DOI":"10.1002\/cpe.3337"},{"key":"e_1_2_3_8_1","doi-asserted-by":"crossref","unstructured":"MaoY ZhuP WeiG HassanMM HossainMA.A game\u2010based incentive model for service cooperation in VANETs Concurrency and Computation: Practice and Experience2016;28(3):674\u2013687.","DOI":"10.1002\/cpe.3340"},{"key":"e_1_2_3_9_1","doi-asserted-by":"crossref","unstructured":"MuhlbauerA ZelinskyT KanhereSS.Platform zero: a step closer to ubiquitous computing Concurrency and Computation: Practice and Experience2016;28(3):688\u2013706.","DOI":"10.1002\/cpe.3366"},{"key":"e_1_2_3_10_1","doi-asserted-by":"crossref","unstructured":"ThulasiramRK ThulasiramanP PrasainH JhaGK.Nature\u2010inspired soft computing for financial option pricing using high\u2010performance analytics Concurrency and Computation: Practice and Experience2016;28(3):707\u2013728.","DOI":"10.1002\/cpe.3360"},{"key":"e_1_2_3_11_1","doi-asserted-by":"crossref","unstructured":"ZhouW HanJ GaoY XuZ.An efficient graph data processing system for large\u2010scale SNS applications Concurrency and Computation: Practice and Experience2016;28(3):729\u2013747.","DOI":"10.1002\/cpe.3393"}],"container-title":["Concurrency and Computation: Practice and Experience"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.wiley.com\/onlinelibrary\/tdm\/v1\/articles\/10.1002%2Fcpe.3755","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.wiley.com\/onlinelibrary\/tdm\/v1\/articles\/10.1002%2Fcpe.3755","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1002\/cpe.3755","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,2]],"date-time":"2023-09-02T14:13:36Z","timestamp":1693664016000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1002\/cpe.3755"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,1,6]]},"references-count":10,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2016,3,10]]}},"alternative-id":["10.1002\/cpe.3755"],"URL":"https:\/\/doi.org\/10.1002\/cpe.3755","archive":["Portico"],"relation":{},"ISSN":["1532-0626","1532-0634"],"issn-type":[{"value":"1532-0626","type":"print"},{"value":"1532-0634","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,1,6]]}}}