{"id":"https://openalex.org/W1506620405","doi":"https://doi.org/10.1109/iccnc.2015.7069318","title":"A practical approach to the attestation of computational integrity in hybrid cloud","display_name":"A practical approach to the attestation of computational integrity in hybrid cloud","publication_year":2015,"publication_date":"2015-02-01","ids":{"openalex":"https://openalex.org/W1506620405","doi":"https://doi.org/10.1109/iccnc.2015.7069318","mag":"1506620405"},"language":"en","primary_location":{"id":"doi:10.1109/iccnc.2015.7069318","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iccnc.2015.7069318","pdf_url":null,"source":{"id":"https://openalex.org/S4306497949","display_name":"2015 International Conference on Computing, Networking and Communications (ICNC)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2015 International Conference on Computing, Networking and Communications (ICNC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5086812994","display_name":"Andrew Pawloski","orcid":null},"institutions":[{"id":"https://openalex.org/I84392919","display_name":"Temple University","ror":"https://ror.org/00kx1jb78","country_code":"US","type":"education","lineage":["https://openalex.org/I84392919"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Andrew Pawloski","raw_affiliation_strings":["Dept. of Computer and Information Science, Temple University, Philadelphia, Pennsylvania","Department of Computer and Information Science, Temple University, Philadelphia, Pennsylvania, 19122"],"affiliations":[{"raw_affiliation_string":"Dept. of Computer and Information Science, Temple University, Philadelphia, Pennsylvania","institution_ids":["https://openalex.org/I84392919"]},{"raw_affiliation_string":"Department of Computer and Information Science, Temple University, Philadelphia, Pennsylvania, 19122","institution_ids":["https://openalex.org/I84392919"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5012848570","display_name":"Longfei Wu","orcid":"https://orcid.org/0000-0003-2325-5009"},"institutions":[{"id":"https://openalex.org/I84392919","display_name":"Temple University","ror":"https://ror.org/00kx1jb78","country_code":"US","type":"education","lineage":["https://openalex.org/I84392919"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Longfei Wu","raw_affiliation_strings":["Dept. of Computer and Information Science, Temple University, Philadelphia, Pennsylvania","Department of Computer and Information Science, Temple University, Philadelphia, Pennsylvania, 19122"],"affiliations":[{"raw_affiliation_string":"Dept. of Computer and Information Science, Temple University, Philadelphia, Pennsylvania","institution_ids":["https://openalex.org/I84392919"]},{"raw_affiliation_string":"Department of Computer and Information Science, Temple University, Philadelphia, Pennsylvania, 19122","institution_ids":["https://openalex.org/I84392919"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5060514022","display_name":"Xiaojiang Du","orcid":"https://orcid.org/0000-0003-4235-9671"},"institutions":[{"id":"https://openalex.org/I84392919","display_name":"Temple University","ror":"https://ror.org/00kx1jb78","country_code":"US","type":"education","lineage":["https://openalex.org/I84392919"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Xiaojiang Du","raw_affiliation_strings":["Dept. of Computer and Information Science, Temple University, Philadelphia, Pennsylvania","Department of Computer and Information Science, Temple University, Philadelphia, Pennsylvania, 19122"],"affiliations":[{"raw_affiliation_string":"Dept. of Computer and Information Science, Temple University, Philadelphia, Pennsylvania","institution_ids":["https://openalex.org/I84392919"]},{"raw_affiliation_string":"Department of Computer and Information Science, Temple University, Philadelphia, Pennsylvania, 19122","institution_ids":["https://openalex.org/I84392919"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5085031765","display_name":"Lijun Qian","orcid":"https://orcid.org/0000-0003-1577-3359"},"institutions":[{"id":"https://openalex.org/I250520410","display_name":"Prairie View A&M University","ror":"https://ror.org/0449kf092","country_code":"US","type":"education","lineage":["https://openalex.org/I250520410"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Lijun Qian","raw_affiliation_strings":["Dept. of of Electrical and Computer Engineering, Prairie View A&M University, Prairie View, Texas","Dept. of of Electrical and Computer Engineering, Prairie View A&M University, Prairie View, Texas 77446"],"affiliations":[{"raw_affiliation_string":"Dept. of of Electrical and Computer Engineering, Prairie View A&M University, Prairie View, Texas","institution_ids":["https://openalex.org/I250520410"]},{"raw_affiliation_string":"Dept. of of Electrical and Computer Engineering, Prairie View A&M University, Prairie View, Texas 77446","institution_ids":["https://openalex.org/I250520410"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5086812994"],"corresponding_institution_ids":["https://openalex.org/I84392919"],"apc_list":null,"apc_paid":null,"fwci":0.2973,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.52562418,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"72","last_page":"76"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9976000189781189,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10101","display_name":"Cloud Computing and Resource Management","score":0.9925000071525574,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.8878511190414429},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8029465079307556},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.651419997215271},{"id":"https://openalex.org/keywords/context","display_name":"Context (archaeology)","score":0.5580054521560669},{"id":"https://openalex.org/keywords/byzantine-fault-tolerance","display_name":"Byzantine fault tolerance","score":0.5536426901817322},{"id":"https://openalex.org/keywords/computation","display_name":"Computation","score":0.5269879698753357},{"id":"https://openalex.org/keywords/crash","display_name":"Crash","score":0.5048611760139465},{"id":"https://openalex.org/keywords/component","display_name":"Component (thermodynamics)","score":0.5036391615867615},{"id":"https://openalex.org/keywords/fault-tolerance","display_name":"Fault tolerance","score":0.5024409294128418},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4584907591342926},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.10440242290496826},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.09804952144622803}],"concepts":[{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.8878511190414429},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8029465079307556},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.651419997215271},{"id":"https://openalex.org/C2779343474","wikidata":"https://www.wikidata.org/wiki/Q3109175","display_name":"Context (archaeology)","level":2,"score":0.5580054521560669},{"id":"https://openalex.org/C168021876","wikidata":"https://www.wikidata.org/wiki/Q1353446","display_name":"Byzantine fault tolerance","level":3,"score":0.5536426901817322},{"id":"https://openalex.org/C45374587","wikidata":"https://www.wikidata.org/wiki/Q12525525","display_name":"Computation","level":2,"score":0.5269879698753357},{"id":"https://openalex.org/C183469790","wikidata":"https://www.wikidata.org/wiki/Q333501","display_name":"Crash","level":2,"score":0.5048611760139465},{"id":"https://openalex.org/C168167062","wikidata":"https://www.wikidata.org/wiki/Q1117970","display_name":"Component (thermodynamics)","level":2,"score":0.5036391615867615},{"id":"https://openalex.org/C63540848","wikidata":"https://www.wikidata.org/wiki/Q3140932","display_name":"Fault tolerance","level":2,"score":0.5024409294128418},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4584907591342926},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.10440242290496826},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.09804952144622803},{"id":"https://openalex.org/C97355855","wikidata":"https://www.wikidata.org/wiki/Q11473","display_name":"Thermodynamics","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C151730666","wikidata":"https://www.wikidata.org/wiki/Q7205","display_name":"Paleontology","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/iccnc.2015.7069318","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iccnc.2015.7069318","pdf_url":null,"source":{"id":"https://openalex.org/S4306497949","display_name":"2015 International Conference on Computing, Networking and Communications (ICNC)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2015 International Conference on Computing, Networking and Communications (ICNC)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":22,"referenced_works":["https://openalex.org/W1217794466","https://openalex.org/W1861377444","https://openalex.org/W2021079631","https://openalex.org/W2077523495","https://openalex.org/W2105746252","https://openalex.org/W2106289562","https://openalex.org/W2108749707","https://openalex.org/W2114296561","https://openalex.org/W2114743410","https://openalex.org/W2116653107","https://openalex.org/W2121884932","https://openalex.org/W2131646073","https://openalex.org/W2131900781","https://openalex.org/W2141102961","https://openalex.org/W2157053949","https://openalex.org/W2275530856","https://openalex.org/W3150995746","https://openalex.org/W3151869053","https://openalex.org/W6627959685","https://openalex.org/W6639193275","https://openalex.org/W6677524324","https://openalex.org/W6694821995"],"related_works":["https://openalex.org/W2026516036","https://openalex.org/W626940945","https://openalex.org/W4244478748","https://openalex.org/W2111579573","https://openalex.org/W375763875","https://openalex.org/W2040826996","https://openalex.org/W120748129","https://openalex.org/W2145120192","https://openalex.org/W4214672453","https://openalex.org/W2012215169"],"abstract_inverted_index":{"In":[0,106],"the":[1,63,102],"context":[2],"of":[3,14,45,116],"a":[4,10,28,34,42,46],"heterogeneous":[5],"trust":[6],"environment,":[7],"such":[8],"as":[9],"hybrid":[11,103,120],"cloud":[12,36,104],"(consisting":[13],"public":[15,35],"and":[16,71,92],"private":[17],"cloud),":[18],"it":[19],"is":[20],"possible":[21],"for":[22,114],"an":[23,69,111],"untrusted":[24],"component":[25],"to":[26,51,81,98],"create":[27],"Byzantine":[29,84],"fault":[30],"intentionally.":[31],"For":[32],"example,":[33],"service":[37],"provider":[38],"may":[39],"only":[40],"do":[41],"partial":[43],"(instead":[44],"complete)":[47],"database":[48],"search":[49],"just":[50],"save":[52],"its":[53],"computation.":[54],"These":[55],"malicious":[56,83],"events":[57],"can":[58],"be":[59,75,99],"particularly":[60],"dangerous":[61],"because":[62],"system":[64],"does":[65],"not":[66],"crash":[67],"but":[68],"incorrect":[70],"actionable":[72],"result":[73],"will":[74],"produced.":[76],"Although":[77],"there":[78],"are":[79],"ways":[80],"provide":[82],"Fault-Tolerance":[85],"in":[86,101,119],"classical":[87],"distributed":[88],"systems,":[89],"their":[90],"computation":[91],"communication":[93],"properties":[94],"make":[95],"them":[96],"infeasible":[97],"used":[100],"environment.":[105],"this":[107],"paper,":[108],"we":[109],"present":[110],"efficient":[112],"method":[113],"attestation":[115],"computational":[117],"integrity":[118],"cloud.":[121]},"counts_by_year":[{"year":2019,"cited_by_count":1},{"year":2018,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
