{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,8,15]],"date-time":"2024-08-15T15:49:05Z","timestamp":1723736945011},"reference-count":31,"publisher":"Zhejiang University Press","issue":"12","license":[{"start":{"date-parts":[[2018,12,1]],"date-time":"2018-12-01T00:00:00Z","timestamp":1543622400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61521003","61602509"],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"the National Key Technologies R&D Program of China","award":["2016YFB0800100","2016YFB0800101"]},{"name":"the Key Technologies R&D Program of Henan Province, China","award":["172102210615"]}],"content-domain":{"domain":["springerlink.com","jzus.zju.edu.cn"],"crossmark-restriction":true},"short-container-title":["Frontiers Inf Technol Electronic Eng"],"published-print":{"date-parts":[[2018,12]]},"DOI":"10.1631\/fitee.1800621","type":"journal-article","created":{"date-parts":[[2019,1,10]],"date-time":"2019-01-10T05:14:06Z","timestamp":1547097246000},"page":"1522-1536","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":24,"title":["Scientific workflow execution system based on mimic defense in the cloud environment"],"prefix":"10.1631","volume":"19","author":[{"ORCID":"http:\/\/orcid.org\/0000-0003-4783-0450","authenticated-orcid":false,"given":"Ya-wen","family":"Wang","sequence":"first","affiliation":[]},{"given":"Jiang-xing","family":"Wu","sequence":"additional","affiliation":[]},{"given":"Yun-fei","family":"Guo","sequence":"additional","affiliation":[]},{"given":"Hong-chao","family":"Hu","sequence":"additional","affiliation":[]},{"given":"Wen-yan","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Guo-zhen","family":"Cheng","sequence":"additional","affiliation":[]}],"member":"635","published-online":{"date-parts":[[2019,1,10]]},"reference":[{"issue":"5","key":"1325_CR1","doi-asserted-by":"publisher","first-page":"1850045","DOI":"10.1142\/S1793962318500459","volume":"9","author":"B Ainapure","year":"2018","unstructured":"Ainapure B, Shah D, Rao AA, 2018. Adaptive multilevel fuzzy\u2013based authentication framework to mitigate cache side channel attack in cloud computing. Int J Model Simul Sci Comput, 9(5):1850045. \n https:\/\/doi.org\/10.1142\/S1793962318500459","journal-title":"Int^J Model Simul Sci Comput"},{"key":"1325_CR2","doi-asserted-by":"publisher","DOI":"10.1109\/NDM.2014.9","volume-title":"Flexible scheduling and control of bandwidth and in\u2013transit services for end\u2013to\u2013end application workflows","author":"MF Aktas","year":"2014","unstructured":"Aktas MF, Haldeman G, Parashar M, 2014. Flexible scheduling and control of bandwidth and in\u2013transit services for end\u2013to\u2013end application workflows. 4th IEEE Int Workshop on Network\u2013Aware Data Management, p.28\u201331. \n https:\/\/doi.org\/10.1109\/NDM.2014.9"},{"key":"1325_CR3","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2015.12.005","volume-title":"Fut Gener Comput Syst","author":"I Casas","year":"2017","unstructured":"Casas I, Taheri J, Ranjan R, et al., 2017. A balanced scheduler with data reuse and replication for scientific workflows in cloud computing systems. Fut Gener Comput Syst, 74: 168\u2013178. \n https:\/\/doi.org\/10.1016\/j.future.2015.12.005"},{"key":"1325_CR4","doi-asserted-by":"publisher","DOI":"10.1109\/eScience.2012.6404430","volume-title":"Workflowsim: a toolkit for simulating scientific workflows in distributed environments","author":"WW Chen","year":"2012","unstructured":"Chen WW, Deelman E, 2012. Workflowsim: a toolkit for simulating scientific workflows in distributed environments. 8th IEEE Int Conf on E\u2013Science, p.1\u20138. \n https:\/\/doi.org\/10.1109\/eScience.2012.6404430"},{"key":"1325_CR5","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-016-1789-5","volume-title":"J Supercomput","author":"A Deldari","year":"2017","unstructured":"Deldari A, Naghibzadeh M, Abrishami S, 2017. CCA: a deadline\u2013constrained workflow scheduling algorithm for multicore resources on the cloud. J Supercomput, 73(2): 756\u2013781. \n https:\/\/doi.org\/10.1007\/s11227-016-1789-5"},{"key":"1325_CR6","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1016\/j.ins.2017.01.035","volume":"393","author":"YS Ding","year":"2017","unstructured":"Ding YS, Yao GS, Hao KR, 2017. Fault\u2013tolerant elastic scheduling algorithm for workflow in cloud systems. Inform Sci, 393:47\u201365. \n https:\/\/doi.org\/10.1016\/j.ins.2017.01.035","journal-title":"Inform Sci"},{"key":"1325_CR7","volume-title":"Multiple operating system rotation environment moving target defense","author":"N Evans","year":"2016","unstructured":"Evans N, Thompson M, 2016. Multiple operating system rotation environment moving target defense. US Patent, 9 294 504."},{"key":"1325_CR8","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2011.5958251","volume-title":"OS diversity for intrusion tolerance: myth or reality?","author":"M Garcia","year":"2011","unstructured":"Garcia M, Bessani A, Gashi I, et al., 2011. OS diversity for intrusion tolerance: myth or reality? 41st IEEE Int Conf on Dependable Systems & Networks, p.383\u2013394. \n https:\/\/doi.org\/10.1109\/DSN.2011.5958251"},{"issue":"6","key":"1325_CR9","doi-asserted-by":"publisher","first-page":"735","DOI":"10.1002\/spe.2180","volume":"44","author":"M Garcia","year":"2014","unstructured":"Garcia M, Bessani A, Gashi I, et al., 2014. Analysis of operating system diversity for intrusion tolerance. Softw Pract Exp, 44(6):735\u2013770. \n https:\/\/doi.org\/10.1002\/spe.2180","journal-title":"Softw Pract Exp"},{"key":"1325_CR10","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2010.115","volume-title":"IEEE Secur Priv","author":"B Grobauer","year":"2011","unstructured":"Grobauer B, Walloschek T, Stocker E, 2011. Understanding cloud computing vulnerabilities. IEEE Secur Priv, 9(2): 50\u201357. \n https:\/\/doi.org\/10.1109\/MSP.2010.115"},{"key":"1325_CR11","doi-asserted-by":"publisher","DOI":"10.1145\/2602087.2602116","volume-title":"Diverse virtual replicas for improving intrusion tolerance in cloud","author":"MZ Guo","year":"2014","unstructured":"Guo MZ, Bhattacharya P, 2014. Diverse virtual replicas for improving intrusion tolerance in cloud. 9th Annual Cyber and Information Security Research Conf, p.41\u201344. \n https:\/\/doi.org\/10.1145\/2602087.2602116"},{"key":"1325_CR12","doi-asserted-by":"publisher","DOI":"10.1109\/ICACCI.2016.7732066","volume-title":"Compute\u2013intensive workflow scheduling in multi\u2013cloud environment","author":"I Gupta","year":"2016","unstructured":"Gupta I, Kumar MS, Jana PK, 2016. Compute\u2013intensive workflow scheduling in multi\u2013cloud environment. Int Conf on Advances in Computing, Communications and Informatics, p.315\u2013321. \n https:\/\/doi.org\/10.1109\/ICACCI.2016.7732066"},{"issue":"6","key":"1325_CR13","doi-asserted-by":"publisher","first-page":"345","DOI":"10.1049\/iet-ifs.2017.0085","volume":"11","author":"HC Hu","year":"2017","unstructured":"Hu HC, Wang ZP, Cheng GZ, et al., 2017. MNOS: a mimic network operating system for software defined networks. IET Inform Secur, 11(6):345\u2013355. \n https:\/\/doi.org\/10.1049\/iet-ifs.2017.0085","journal-title":"IET Inform Secur"},{"key":"1325_CR14","doi-asserted-by":"publisher","unstructured":"Juve G, Deelman E, 2011. Scientific workflows in the cloud. In: Cafaro M, Aloisio G (Eds.), Grids, Clouds and Virtualization. Springer, London, p.71\u201391. \n https:\/\/doi.org\/10.1007\/978-0-85729-049-6_4","DOI":"10.1007\/978-0-85729-049-6_4"},{"key":"1325_CR15","volume-title":"Defeating Signed^BIOS Enforcement","author":"C Kallenberg","year":"2013","unstructured":"Kallenberg C, Butterworth J, Kovah X, et al., 2013. Defeating Signed BIOS Enforcement. \n https:\/\/doi.org\/www.mitre.org\/sites\/default\/files\/publications\/defeating-signed-bios-enforcement.pdf"},{"key":"1325_CR16","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2015.02.012","volume-title":"Knowl\u2013Based Syst","author":"YC Lee","year":"2015","unstructured":"Lee YC, Han H, Zomaya AY, et al., 2015. Resource\u2013efficient workflow scheduling in clouds. Knowl\u2013Based Syst, 80: 153\u2013162. \n https:\/\/doi.org\/10.1016\/j.knosys.2015.02.012"},{"issue":"7","key":"1325_CR17","doi-asserted-by":"publisher","first-page":"553","DOI":"10.1631\/FITEE.1400410","volume":"16","author":"HW Lv","year":"2015","unstructured":"Lv HW, Lin JY, Wang HQ, et al., 2015. Analyzing the service availability of mobile cloud computing systems by fluidflow approximation. Front Inform Technol Electron Eng, 16(7):553\u2013567. \n https:\/\/doi.org\/10.1631\/FITEE.1400410","journal-title":"Front Inform Technol Electron Eng"},{"key":"1325_CR18","doi-asserted-by":"publisher","DOI":"10.1109\/AINA.2010.31","volume-title":"A particle swarm optimization\u2013based heuristic for scheduling workflow applications in cloud computing environments","author":"S Pandey","year":"2010","unstructured":"Pandey S, Wu LL, Guru SM, et al., 2010. A particle swarm optimization\u2013based heuristic for scheduling workflow applications in cloud computing environments. 24th IEEE Int Conf on Advanced Information Networking and Applications, p.400\u2013407. \n https:\/\/doi.org\/10.1109\/AINA.2010.31"},{"key":"1325_CR19","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2014.6883418","volume-title":"A moving\u2013target defense strategy for Cloud\u2013based services with heterogeneous and dynamic attack surfaces","author":"W Peng","year":"2014","unstructured":"Peng W, Li F, Huang CT, et al., 2014. A moving\u2013target defense strategy for Cloud\u2013based services with heterogeneous and dynamic attack surfaces. IEEE Int Conf on Communications, p.804\u2013809. \n https:\/\/doi.org\/10.1109\/ICC.2014.6883418"},{"key":"1325_CR20","doi-asserted-by":"publisher","DOI":"10.1109\/SRDS.2014.16","volume-title":"Towards a practical survivable intrusion tolerant replication system","author":"M Platania","year":"2014","unstructured":"Platania M, Obenshain D, Tantillo T, et al., 2014. Towards a practical survivable intrusion tolerant replication system. 33rd IEEE Int Symp on Reliable Distributed Systems, p.242\u2013252. \n https:\/\/doi.org\/10.1109\/SRDS.2014.16"},{"key":"1325_CR21","doi-asserted-by":"publisher","DOI":"10.1145\/2886780","volume-title":"On choosing server\u2013or client\u2013side solutions for^BFT","author":"M Platania","year":"2016","unstructured":"Platania M, Obenshain D, Tantillo T, et al., 2016. On choosing server\u2013or client\u2013side solutions for BFT. ACM Comput Surv, 48(4), Article 61. \n https:\/\/doi.org\/10.1145\/2886780"},{"key":"1325_CR22","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-37300-8_2","volume-title":"Understanding^DMA malware","author":"P Stewin","year":"2012","unstructured":"Stewin P, Bystrov I, 2012. Understanding DMA malware. 9th Int Conf on Detection of Intrusions and Malware, and Vulnerability Assessment, p.21\u201341. \n https:\/\/doi.org\/10.1007\/978-3-642-37300-8_2"},{"key":"1325_CR23","doi-asserted-by":"publisher","first-page":"260","DOI":"10.1109\/71.993206","volume-title":"IEEE Trans Parall Distrib Syst","author":"H Topcuoglu","year":"2002","unstructured":"Topcuoglu H, Hariri S, Wu MY, 2002. Performance\u2013effective and low\u2013complexity task scheduling for heterogeneous computing. IEEE Trans Parall Distrib Syst, 13(3): 260\u2013274. \n https:\/\/doi.org\/10.1109\/71.993206"},{"issue":"3","key":"1325_CR24","first-page":"83","volume":"15","author":"A Verma","year":"2017","unstructured":"Verma A, Mittal M, Chhabra B, 2017. The mutual authentication scheme to detect virtual side channel attack in cloud computing. Int J Comput Sci Inform Secur, 15(3):83\u201398.","journal-title":"Int^J Comput Sci Inform Secur"},{"key":"1325_CR25","doi-asserted-by":"publisher","first-page":"546","DOI":"10.1016\/j.procs.2014.05.049","volume":"29","author":"JW Wang","year":"2014","unstructured":"Wang JW, Korambath P, Altintas I, et al., 2014. Workflow as a service in the cloud: architecture and scheduling algorithms. Proc Comput Sci, 29:546\u2013556. \n https:\/\/doi.org\/10.1016\/j.procs.2014.05.049","journal-title":"Proc Comput Sci"},{"issue":"1","key":"1325_CR26","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1109\/TNSM.2018.2799000","volume":"15","author":"J Wu","year":"2018","unstructured":"Wu J, Dong MX, Ota K, et al., 2018. Big data analysis\u2013based secure cluster management for optimized control plane in software\u2013defined networks. IEEE Trans Netw Serv Manag, 15(1):27\u201338. \n https:\/\/doi.org\/10.1109\/TNSM.2018.2799000","journal-title":"IEEE Trans Netw Serv Manag"},{"key":"1325_CR27","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-22915-7_40","volume-title":"Technical aspects of cyber kill chain","author":"T Yadav","year":"2015","unstructured":"Yadav T, Rao AM, 2015. Technical aspects of cyber kill chain. 3rd Int Symp on Security in Computing and Communication, p.438\u2013452. \n https:\/\/doi.org\/10.1007\/978-3-319-22915-7_40"},{"key":"1325_CR28","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1016\/j.knosys.2016.01.037","volume":"99","author":"GS Yao","year":"2016","unstructured":"Yao GS, Ding YS, Ren LH, et al., 2016. An immune systeminspired rescheduling algorithm for workflow in cloud systems. Knowl\u2013Based Syst, 99:39\u201350. \n https:\/\/doi.org\/10.1016\/j.knosys.2016.01.037","journal-title":"Knowl\u2013Based Syst"},{"issue":"12","key":"1325_CR29","doi-asserted-by":"publisher","first-page":"3671","DOI":"10.1109\/TPDS.2017.2687923","volume":"28","author":"GS Yao","year":"2017","unstructured":"Yao GS, Ding YS, Hao KR, 2017. Using imbalance characteristic for fault\u2013tolerant workflow scheduling in cloud systems. IEEE Trans Parall Distrib Syst, 28(12):3671\u20133683. \n https:\/\/doi.org\/10.1109\/TPDS.2017.2687923","journal-title":"IEEE Trans Parall Distrib Syst"},{"key":"1325_CR30","doi-asserted-by":"publisher","first-page":"956","DOI":"10.1002\/cpe.1636","volume-title":"Concurr Comput Pract Exp","author":"D Yuan","year":"2012","unstructured":"Yuan D, Yang Y, Liu X, et al., 2012. A data dependency based strategy for intermediate data storage in scientific cloud workflow systems. Concurr Comput Pract Exp, 24(9): 956\u2013976. \n https:\/\/doi.org\/10.1002\/cpe.1636"},{"issue":"4","key":"1325_CR31","doi-asserted-by":"publisher","first-page":"540","DOI":"10.1109\/TSC.2011.42","volume":"5","author":"ZB Zheng","year":"2012","unstructured":"Zheng ZB, Zhou TC, Lyu MR, et al., 2012. Component ranking for fault\u2013tolerant cloud applications. IEEE Trans Serv Comput, 5(4):540\u2013550. \n https:\/\/doi.org\/10.1109\/TSC.2011.42","journal-title":"IEEE Trans Serv Comput"}],"container-title":["Frontiers of Information Technology & Electronic Engineering"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1631\/FITEE.1800621.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1631\/FITEE.1800621\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1631\/FITEE.1800621.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,5,27]],"date-time":"2020-05-27T07:56:53Z","timestamp":1590566213000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1631\/FITEE.1800621"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,12]]},"references-count":31,"journal-issue":{"issue":"12","published-print":{"date-parts":[[2018,12]]}},"alternative-id":["1325"],"URL":"https:\/\/doi.org\/10.1631\/fitee.1800621","relation":{},"ISSN":["2095-9184","2095-9230"],"issn-type":[{"value":"2095-9184","type":"print"},{"value":"2095-9230","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,12]]},"assertion":[{"value":"http:\/\/orcid.org\/0000-0003-4783-0450","URL":"http","order":0,"name":"name","label":"Ya-wen WANG","group":{"name":"orcid","label":"ORCID"}},{"value":"2018-10-07","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2018-11-17","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2018-12-17","order":2,"name":"crosschecked","label":"Crosschecked","group":{"name":"publication_history","label":"Publication History"}},{"value":"Article","order":0,"name":"content_type","group":{"name":"content_type","label":"Content Type"}},{"value":"\u00a9 Zhejiang University and Springer-Verlag GmbH Germany, part of Springer Nature 2018","order":0,"name":"copyright","group":{"name":"copyright","label":"Copyright"}}]}}