{"id":"https://openalex.org/W2509145137","doi":"https://doi.org/10.1109/fruct-ispit.2016.7561514","title":"Performance evaluation of cloud computing accounting for expenses on information security","display_name":"Performance evaluation of cloud computing accounting for expenses on information security","publication_year":2016,"publication_date":"2016-04-01","ids":{"openalex":"https://openalex.org/W2509145137","doi":"https://doi.org/10.1109/fruct-ispit.2016.7561514","mag":"2509145137"},"language":"en","primary_location":{"id":"doi:10.1109/fruct-ispit.2016.7561514","is_oa":false,"landing_page_url":"https://doi.org/10.1109/fruct-ispit.2016.7561514","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2016 18th Conference of Open Innovations Association and Seminar on Information Security and Protection of Information Technology (FRUCT-ISPIT)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://doaj.org/article/d8d071c6db994258bedf4ea329dca17e","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5048973187","display_name":"\u0410. \u0414. \u0425\u043e\u043c\u043e\u043d\u0435\u043d\u043a\u043e","orcid":"https://orcid.org/0000-0003-0411-258X"},"institutions":[{"id":"https://openalex.org/I7888777","display_name":"Petersburg State Transport University","ror":"https://ror.org/02fh3dt13","country_code":"RU","type":"education","lineage":["https://openalex.org/I7888777"]}],"countries":["RU"],"is_corresponding":true,"raw_author_name":"Anatoly Khomonenko","raw_affiliation_strings":["Petersburg State Transport University, Saint Petersburg, Russia"],"affiliations":[{"raw_affiliation_string":"Petersburg State Transport University, Saint Petersburg, Russia","institution_ids":["https://openalex.org/I7888777"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5025582761","display_name":"Sergey I. Gindin","orcid":null},"institutions":[{"id":"https://openalex.org/I7888777","display_name":"Petersburg State Transport University","ror":"https://ror.org/02fh3dt13","country_code":"RU","type":"education","lineage":["https://openalex.org/I7888777"]}],"countries":["RU"],"is_corresponding":false,"raw_author_name":"Sergey Gindin","raw_affiliation_strings":["Petersburg State Transport University, Saint Petersburg, Russia"],"affiliations":[{"raw_affiliation_string":"Petersburg State Transport University, Saint Petersburg, Russia","institution_ids":["https://openalex.org/I7888777"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5048973187"],"corresponding_institution_ids":["https://openalex.org/I7888777"],"apc_list":null,"apc_paid":null,"fwci":1.2143,"has_fulltext":false,"cited_by_count":8,"citation_normalized_percentile":{"value":0.82149935,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":"1","issue":null,"first_page":"100","last_page":"105"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T13983","display_name":"Cybersecurity and Information Systems","score":0.9970999956130981,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T13983","display_name":"Cybersecurity and Information Systems","score":0.9970999956130981,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T14470","display_name":"Advanced Data Processing Techniques","score":0.9909999966621399,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12734","display_name":"Information Systems and Technology Applications","score":0.9879000186920166,"subfield":{"id":"https://openalex.org/subfields/1404","display_name":"Management Information Systems"},"field":{"id":"https://openalex.org/fields/14","display_name":"Business, Management and Accounting"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.8066226243972778},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.79746413230896},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.5122625231742859},{"id":"https://openalex.org/keywords/cloud-computing-security","display_name":"Cloud computing security","score":0.48165690898895264},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.47586697340011597},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.47558438777923584},{"id":"https://openalex.org/keywords/queueing-theory","display_name":"Queueing theory","score":0.4590233266353607},{"id":"https://openalex.org/keywords/markov-process","display_name":"Markov process","score":0.44071608781814575},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.35312536358833313},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.347245454788208},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3215353488922119},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.20954692363739014}],"concepts":[{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.8066226243972778},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.79746413230896},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.5122625231742859},{"id":"https://openalex.org/C184842701","wikidata":"https://www.wikidata.org/wiki/Q370563","display_name":"Cloud computing security","level":3,"score":0.48165690898895264},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.47586697340011597},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.47558438777923584},{"id":"https://openalex.org/C22684755","wikidata":"https://www.wikidata.org/wiki/Q847526","display_name":"Queueing theory","level":2,"score":0.4590233266353607},{"id":"https://openalex.org/C159886148","wikidata":"https://www.wikidata.org/wiki/Q176645","display_name":"Markov process","level":2,"score":0.44071608781814575},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.35312536358833313},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.347245454788208},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3215353488922119},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.20954692363739014},{"id":"https://openalex.org/C105795698","wikidata":"https://www.wikidata.org/wiki/Q12483","display_name":"Statistics","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/fruct-ispit.2016.7561514","is_oa":false,"landing_page_url":"https://doi.org/10.1109/fruct-ispit.2016.7561514","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2016 18th Conference of Open Innovations Association and Seminar on Information Security and Protection of Information Technology (FRUCT-ISPIT)","raw_type":"proceedings-article"},{"id":"pmh:oai:doaj.org/article:d8d071c6db994258bedf4ea329dca17e","is_oa":true,"landing_page_url":"https://doaj.org/article/d8d071c6db994258bedf4ea329dca17e","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Proceedings of the XXth Conference of Open Innovations Association FRUCT, Vol 664, Iss 18, Pp 100-105 (2016)","raw_type":"article"}],"best_oa_location":{"id":"pmh:oai:doaj.org/article:d8d071c6db994258bedf4ea329dca17e","is_oa":true,"landing_page_url":"https://doaj.org/article/d8d071c6db994258bedf4ea329dca17e","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Proceedings of the XXth Conference of Open Innovations Association FRUCT, Vol 664, Iss 18, Pp 100-105 (2016)","raw_type":"article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":22,"referenced_works":["https://openalex.org/W614088647","https://openalex.org/W1561023823","https://openalex.org/W1972939426","https://openalex.org/W2033031224","https://openalex.org/W2070164835","https://openalex.org/W2091998499","https://openalex.org/W2093681954","https://openalex.org/W2097031892","https://openalex.org/W2099072674","https://openalex.org/W2114703322","https://openalex.org/W2119296771","https://openalex.org/W2125262761","https://openalex.org/W2142442427","https://openalex.org/W2147607210","https://openalex.org/W2159785449","https://openalex.org/W2315595201","https://openalex.org/W2319401203","https://openalex.org/W2518704876","https://openalex.org/W4241387486","https://openalex.org/W4253033130","https://openalex.org/W6674962140","https://openalex.org/W6726329090"],"related_works":["https://openalex.org/W2100090372","https://openalex.org/W4361205702","https://openalex.org/W2385965183","https://openalex.org/W2013342653","https://openalex.org/W2901818815","https://openalex.org/W4289281780","https://openalex.org/W2359552542","https://openalex.org/W2374897487","https://openalex.org/W2115248066","https://openalex.org/W4235045732"],"abstract_inverted_index":{"An":[0],"approach":[1],"to":[2,35,75,82],"the":[3,11,21,60,63,67,73,85,104,108,113],"performance":[4,70],"evaluation":[5],"of":[6,23,62,96,100],"cloud":[7,39,68],"computing":[8,40,69],"accounting":[9],"for":[10,90],"expenses":[12],"on":[13,66,112],"information":[14,36],"security":[15,37],"is":[16,31],"proposed.":[17],"For":[18],"this":[19],"purpose":[20],"model":[22],"multi-channel":[24],"non-Markov":[25],"queueing":[26],"system":[27,86,114],"with":[28],"a":[29],"\u201cwarm-up\u201d":[30,64,80,109],"used.":[32],"When":[33],"applied":[34],"at":[38],"warm-up":[41],"can":[42],"be":[43],"understood":[44],"as:":[45],"user/terminal":[46],"authentication,":[47],"network":[48],"encryption,":[49],"caching":[50],"database":[51],"queries,":[52],"on-demand":[53],"resource":[54],"allocation,":[55],"etc.":[56],"The":[57],"study":[58],"demonstrates":[59],"influence":[61,105],"process":[65,110],"and":[71,78,94],"shows":[72],"need":[74],"collect":[76],"data":[77],"examine":[79],"patterns":[81,95,106],"assure":[83],"that":[84],"capabilities":[87],"are":[88],"appropriate":[89],"significantly":[91],"different":[92],"levels":[93],"demand.":[97],"Obtained":[98],"results":[99],"numerical":[101],"experiments":[102],"show":[103],"which":[107],"has":[111],"performance.":[115]},"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":2},{"year":2020,"cited_by_count":1},{"year":2019,"cited_by_count":1},{"year":2017,"cited_by_count":2},{"year":2016,"cited_by_count":1}],"updated_date":"2026-03-10T16:38:18.471706","created_date":"2025-10-10T00:00:00"}
