{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,8,24]],"date-time":"2024-08-24T04:32:06Z","timestamp":1724473926985},"reference-count":21,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2014,2,15]],"date-time":"2014-02-15T00:00:00Z","timestamp":1392422400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Vietnam J Comput Sci"],"published-print":{"date-parts":[[2014,5]]},"DOI":"10.1007\/s40595-014-0015-8","type":"journal-article","created":{"date-parts":[[2014,2,14]],"date-time":"2014-02-14T08:22:00Z","timestamp":1392366120000},"page":"129-140","source":"Crossref","is-referenced-by-count":1,"title":["Applying authentication and network security to in-cloud enterprise resource planning system"],"prefix":"10.1007","volume":"1","author":[{"given":"Bao Rong","family":"Chang","sequence":"first","affiliation":[]},{"given":"Hsiu-Fen","family":"Tsai","sequence":"additional","affiliation":[]},{"given":"Yun-Che","family":"Tsai","sequence":"additional","affiliation":[]},{"given":"Yi-Sheng","family":"Chang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,2,15]]},"reference":[{"key":"15_CR1","doi-asserted-by":"crossref","unstructured":"Beloglazov, A., Buyya, R.: Energy efficient allocation of virtual machines in cloud data centers. In: Proceedings 10th IEEE\/ACM international conference on cluster, cloud and grid, computing, pp. 577\u2013578 (2010)","DOI":"10.1109\/CCGRID.2010.45"},{"key":"15_CR2","doi-asserted-by":"crossref","unstructured":"Laurikainen, R., Laitinen, J., Lehtovuori, P., Nurminen, J.K.: Improving the efficiency of deploying virtual machines in a cloud environment. In: Proceedings 2012 international conference on cloud and service, computing, pp. 232\u2013239 (2012)","DOI":"10.1109\/CSC.2012.43"},{"key":"15_CR3","doi-asserted-by":"crossref","unstructured":"Sotiriadis, S., Bessis, N., Xhafa, F., Antonopoulos, N.: Cloud virtual machine scheduling: modelling the cloud virtual machine instantiation. In: Proceedings sixth international conference on complex, intelligent and software intensive systems, pp. 233\u2013240 (2012)","DOI":"10.1109\/CISIS.2012.113"},{"key":"15_CR4","doi-asserted-by":"crossref","unstructured":"Yang, T.-S., Choi, J., Zheng, X., Sun, Y.-H., Ouyang, C.-S., Huang, Y.-X.: Research of enterprise resource planning in a specific enterprise. In: Proceedings 2006 IEEE international conference on systems, man, and cybernetics, pp. 418\u2013422 (2006)","DOI":"10.1109\/ICSMC.2006.384418"},{"issue":"5","key":"15_CR5","doi-asserted-by":"crossref","first-page":"39","DOI":"10.1109\/MITP.2008.100","volume":"10","author":"RA Carvalho de","year":"2008","unstructured":"de Carvalho, R.A., Monnerat, R.M., Sun, Y.-H., Ouyang, C.-S., Huang, Y.-X.: Development support tools for enterprise resource planning. IT Prof. Mag. 10(5), 39\u201345 (2008)","journal-title":"IT Prof. Mag."},{"key":"15_CR6","unstructured":"Wu, H.-Q., Ding, Y., Winer, C., Yao, L.: Network security for virtual machine in cloud computing. In: Proceedings 5th international conference on computer sciences and convergence information technology, pp. 18\u201321 (2010)"},{"key":"15_CR7","unstructured":"OpenERP, open source business applications: http:\/\/v6.openerp.com\/ (2013)"},{"key":"15_CR8","unstructured":"Zhao, J.-G., Liu, J.-C., Fan, J.-J., Di, J.-X.: The security research of network access control system. In: Proceedings first ACIS international symposium on cryptography and network security, data mining and knowledge discovery, E-commerce & its applications and embedded systems, pp. 283\u2013288 (2010)"},{"key":"15_CR9","doi-asserted-by":"crossref","unstructured":"Metz, C.: AAA protocols: authentication, authorization, and accounting for the Internet. IEEE Internet Comput. 3(6), 75\u201379 (1999)","DOI":"10.1109\/4236.807015"},{"key":"15_CR10","doi-asserted-by":"crossref","unstructured":"Zhang, L.-F., Persaud, A.G., Johnson, A., Yong, G.: Detection of stepping stone attack under delay and chaff perturbations. In: Proceedings 25th annual international performance $$, $$ , computing, and communications conference, p. 256 (2006)","DOI":"10.1109\/.2006.1629414"},{"key":"15_CR11","doi-asserted-by":"crossref","unstructured":"Yang, H.-Y., Xie, L.-X., Xie, F.: A new approach to network anomaly attack detection. In: Proceedings fifth international conference on fuzzy systems and knowledge, discovery, pp. 317\u2013321 (2008)","DOI":"10.1109\/FSKD.2008.15"},{"issue":"3","key":"15_CR12","first-page":"192","volume":"4","author":"BR Chan","year":"2013","unstructured":"Chan, B.R., Tsai, H.-F., Chen, C.-M.: Evaluation of virtual machine performance and virtual consolidation ratio in cloud computing system. J. Inf. Hiding Multimed. Signal Process. 4(3), 192\u2013200 (2013)","journal-title":"J. Inf. Hiding Multimed. Signal Process."},{"key":"15_CR13","doi-asserted-by":"crossref","unstructured":"Chang, B.R., Tsai, H.-F., Chen, C.-M., Lin, Z.-Y., Huang, C.-F.: Assessment of hypervisor and shared storage for cloud computing server. In: Proceedings the 3rd international conference on innovations in bio-inspired computing and applications, pp. 67\u201372 (2012)","DOI":"10.1109\/IBICA.2012.68"},{"issue":"3","key":"15_CR14","first-page":"356","volume":"7198","author":"BR Chang","year":"2012","unstructured":"Chang, B.R., Tsai, H.-F., Lin, Z.-Y., Chen, C.-M., Huang, C.-F.: Adaptive performance for VVoIP implementation in cloud computing environment. Lecture Notes Artif. Intell. 7198(3), 356\u2013365 (2012)","journal-title":"Lecture Notes Artif. Intell."},{"issue":"2","key":"15_CR15","doi-asserted-by":"crossref","first-page":"30","DOI":"10.1109\/MSP.2008.28","volume":"6","author":"JL Wayman","year":"2008","unstructured":"Wayman, J.L.: Biometrics in identity management systems. IEEE Secur. Priv. 6(2), 30\u201337 (2008)","journal-title":"IEEE Secur. Priv."},{"issue":"2","key":"15_CR16","first-page":"176","volume":"3","author":"BR Chang","year":"2012","unstructured":"Chang, B.R., Huang, C.-F., Tsai, H.-F., Lin, Z.-Y.: Rapid access control on Ubuntu cloud computing with facial recognition and fingerprint identification. J. Inf. Hiding Multimed. Signal Process. 3(2), 176\u2013190 (2012)","journal-title":"J. Inf. Hiding Multimed. Signal Process."},{"key":"15_CR17","unstructured":"pfSense.: http:\/\/www.pfsense.org\/ (2013)"},{"key":"15_CR18","unstructured":"Zentyal.: http:\/\/www.zentyal.com\/ (2013)"},{"key":"15_CR19","unstructured":"ZDbox, version: 3.5.222.: https:\/\/play.google.com\/store\/apps\/details?id=com.zdworks.android.toolbox&feature=search_result#?t=W251bGwsMSwxLDEsImNvbS56ZHdvcmtzLmFuZHJvaWQudG9vbGJveCJd (2013)"},{"key":"15_CR20","doi-asserted-by":"crossref","unstructured":"Doedt, M., Steffen, B.,: Requirement-driven evaluation of remote ERP-system solutions: a service-oriented perspective. In: Proceedings 2011 34th IEEE software engineering, workshop, pp. 57\u201366 (2011)","DOI":"10.1109\/SEW.2011.14"},{"key":"15_CR21","doi-asserted-by":"crossref","unstructured":"Elragal, A., Kommos, M.E.: In-house versus in-cloud ERP systems: a comparative study. J. Enterp. Res. Plan. Stud. 2012, (13). Article ID 659957 (2012)","DOI":"10.5171\/2012.659957"}],"container-title":["Vietnam Journal of Computer Science"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s40595-014-0015-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s40595-014-0015-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s40595-014-0015-8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,7]],"date-time":"2019-08-07T16:41:30Z","timestamp":1565196090000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s40595-014-0015-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,2,15]]},"references-count":21,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2014,5]]}},"alternative-id":["15"],"URL":"https:\/\/doi.org\/10.1007\/s40595-014-0015-8","relation":{},"ISSN":["2196-8888","2196-8896"],"issn-type":[{"value":"2196-8888","type":"print"},{"value":"2196-8896","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014,2,15]]}}}