{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,3,30]],"date-time":"2022-03-30T16:16:02Z","timestamp":1648656962951},"reference-count":8,"publisher":"Elsevier BV","issue":"8","license":[{"start":{"date-parts":[[2014,12,1]],"date-time":"2014-12-01T00:00:00Z","timestamp":1417392000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2018,12,11]],"date-time":"2018-12-11T00:00:00Z","timestamp":1544486400000},"content-version":"vor","delay-in-days":1471,"URL":"http:\/\/www.elsevier.com\/open-access\/userlicense\/1.0\/"}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Journal of Computer and System Sciences"],"published-print":{"date-parts":[[2014,12]]},"DOI":"10.1016\/j.jcss.2014.04.016","type":"journal-article","created":{"date-parts":[[2014,4,16]],"date-time":"2014-04-16T03:31:50Z","timestamp":1397619110000},"page":"1491-1492","update-policy":"http:\/\/dx.doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":0,"title":["Editorial: Special Issue on Theory and Applications in Parallel and Distributed Computing Systems"],"prefix":"10.1016","volume":"80","author":[{"given":"Yang","family":"Xiang","sequence":"first","affiliation":[]},{"given":"Ivan","family":"Stojmenovic","sequence":"additional","affiliation":[]},{"given":"Peter","family":"Mueller","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"issue":"8","key":"10.1016\/j.jcss.2014.04.016_br0010","doi-asserted-by":"crossref","first-page":"1493","DOI":"10.1016\/j.jcss.2014.04.017","article-title":"Building access control policy model for privacy preserving and testing policy conflicting problems","volume":"80","author":"Wang","year":"2014","journal-title":"J. Comput. Syst. Sci."},{"issue":"8","key":"10.1016\/j.jcss.2014.04.016_br0020","doi-asserted-by":"crossref","first-page":"1504","DOI":"10.1016\/j.jcss.2014.04.018","article-title":"Proactive workload management in dynamic virtualized environments","volume":"80","author":"Sallam","year":"2014","journal-title":"J. Comput. Syst. Sci."},{"issue":"8","key":"10.1016\/j.jcss.2014.04.016_br0030","doi-asserted-by":"crossref","first-page":"1518","DOI":"10.1016\/j.jcss.2014.04.019","article-title":"Secure administration of cryptographic role-based access control for large-scale cloud storage systems","volume":"80","author":"Zhou","year":"2014","journal-title":"J. Comput. Syst. Sci."},{"issue":"8","key":"10.1016\/j.jcss.2014.04.016_br0040","doi-asserted-by":"crossref","first-page":"1534","DOI":"10.1016\/j.jcss.2014.04.020","article-title":"Dynamics stability in wireless senor networks active defense model","volume":"80","author":"Chen","year":"2014","journal-title":"J. Comput. Syst. Sci."},{"issue":"8","key":"10.1016\/j.jcss.2014.04.016_br0050","doi-asserted-by":"crossref","first-page":"1549","DOI":"10.1016\/j.jcss.2014.04.021","article-title":"EFADS: efficient, flexible and anonymous data sharing protocol for cloud computing with proxy re-encryption","volume":"80","author":"Wei","year":"2014","journal-title":"J. Comput. Syst. Sci."},{"issue":"8","key":"10.1016\/j.jcss.2014.04.016_br0060","doi-asserted-by":"crossref","first-page":"1563","DOI":"10.1016\/j.jcss.2014.04.022","article-title":"A spatiotemporal compression based approach for efficient big data processing on cloud","volume":"80","author":"Yang","year":"2014","journal-title":"J. Comput. Syst. Sci."},{"issue":"8","key":"10.1016\/j.jcss.2014.04.016_br0070","doi-asserted-by":"crossref","first-page":"1584","DOI":"10.1016\/j.jcss.2014.04.023","article-title":"One-time packet key exchange scheme for secure real-time multimedia applications","volume":"80","author":"Jung","year":"2014","journal-title":"J. Comput. Syst. Sci."},{"issue":"8","key":"10.1016\/j.jcss.2014.04.016_br0080","doi-asserted-by":"crossref","first-page":"1597","DOI":"10.1016\/j.jcss.2014.04.024","article-title":"De-anonymization attack on geolocated data","volume":"80","author":"Gambs","year":"2014","journal-title":"J. Comput. Syst. Sci."}],"container-title":["Journal of Computer and System Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0022000014000609?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0022000014000609?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2018,12,11]],"date-time":"2018-12-11T19:26:32Z","timestamp":1544556392000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0022000014000609"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,12]]},"references-count":8,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2014,12]]}},"alternative-id":["S0022000014000609"],"URL":"https:\/\/doi.org\/10.1016\/j.jcss.2014.04.016","relation":{},"ISSN":["0022-0000"],"issn-type":[{"value":"0022-0000","type":"print"}],"subject":[],"published":{"date-parts":[[2014,12]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Editorial: Special Issue on Theory and Applications in Parallel and Distributed Computing Systems","name":"articletitle","label":"Article Title"},{"value":"Journal of Computer and System Sciences","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.jcss.2014.04.016","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"simple-article","name":"content_type","label":"Content Type"},{"value":"Copyright \u00a9 2014 Elsevier Inc. All rights reserved.","name":"copyright","label":"Copyright"}]}}