{"id":"https://openalex.org/W7125645552","doi":"https://doi.org/10.1186/s42400-025-00410-4","title":"Software-Defined platform management for data center: security, low entropy, and efficiency","display_name":"Software-Defined platform management for data center: security, low entropy, and efficiency","publication_year":2026,"publication_date":"2026-01-26","ids":{"openalex":"https://openalex.org/W7125645552","doi":"https://doi.org/10.1186/s42400-025-00410-4"},"language":"en","primary_location":{"id":"doi:10.1186/s42400-025-00410-4","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s42400-025-00410-4","pdf_url":"https://link.springer.com/content/pdf/10.1186/s42400-025-00410-4.pdf","source":{"id":"https://openalex.org/S3035238565","display_name":"Cybersecurity","issn_l":"2523-3246","issn":["2523-3246"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cybersecurity","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"diamond","oa_url":"https://link.springer.com/content/pdf/10.1186/s42400-025-00410-4.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5123817060","display_name":"Da Zhang","orcid":null},"institutions":[{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"government","lineage":["https://openalex.org/I19820366"]},{"id":"https://openalex.org/I37448385","display_name":"China People's Public Security University","ror":"https://ror.org/05twya590","country_code":"CN","type":"education","lineage":["https://openalex.org/I37448385"]},{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Da Zhang","raw_affiliation_strings":["Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China","School of Cyber Security, Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]},{"raw_affiliation_string":"School of Cyber Security, Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I37448385","https://openalex.org/I19820366"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5025547988","display_name":"Haojun Xia","orcid":null},"institutions":[{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"government","lineage":["https://openalex.org/I19820366"]},{"id":"https://openalex.org/I37448385","display_name":"China People's Public Security University","ror":"https://ror.org/05twya590","country_code":"CN","type":"education","lineage":["https://openalex.org/I37448385"]},{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Haojun Xia","raw_affiliation_strings":["Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China","School of Cyber Security, Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]},{"raw_affiliation_string":"School of Cyber Security, Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I37448385","https://openalex.org/I19820366"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5031695688","display_name":"Xiao-Jie Wang","orcid":"https://orcid.org/0000-0002-2887-1081"},"institutions":[{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"government","lineage":["https://openalex.org/I19820366"]},{"id":"https://openalex.org/I37448385","display_name":"China People's Public Security University","ror":"https://ror.org/05twya590","country_code":"CN","type":"education","lineage":["https://openalex.org/I37448385"]},{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiaotong Wang","raw_affiliation_strings":["Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China","School of Cyber Security, Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]},{"raw_affiliation_string":"School of Cyber Security, Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I37448385","https://openalex.org/I19820366"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5044179042","display_name":"Bibo Tu","orcid":"https://orcid.org/0000-0002-0278-7420"},"institutions":[{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"government","lineage":["https://openalex.org/I19820366"]},{"id":"https://openalex.org/I37448385","display_name":"China People's Public Security University","ror":"https://ror.org/05twya590","country_code":"CN","type":"education","lineage":["https://openalex.org/I37448385"]},{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Bibo Tu","raw_affiliation_strings":["Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China","School of Cyber Security, Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]},{"raw_affiliation_string":"School of Cyber Security, Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I37448385","https://openalex.org/I19820366"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5044179042"],"corresponding_institution_ids":["https://openalex.org/I19820366","https://openalex.org/I37448385","https://openalex.org/I4210156404"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":true,"cited_by_count":0,"citation_normalized_percentile":{"value":0.1635942,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"9","issue":"1","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10101","display_name":"Cloud Computing and Resource Management","score":0.6425999999046326,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10101","display_name":"Cloud Computing and Resource Management","score":0.6425999999046326,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T14347","display_name":"Big Data and Digital Economy","score":0.05920000001788139,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10714","display_name":"Software-Defined Networks and 5G","score":0.023900000378489494,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/data-center","display_name":"Data center","score":0.6485000252723694},{"id":"https://openalex.org/keywords/server","display_name":"Server","score":0.5928999781608582},{"id":"https://openalex.org/keywords/software-deployment","display_name":"Software deployment","score":0.5853999853134155},{"id":"https://openalex.org/keywords/energy-consumption","display_name":"Energy consumption","score":0.5562999844551086},{"id":"https://openalex.org/keywords/resource-management","display_name":"Resource management (computing)","score":0.5196999907493591},{"id":"https://openalex.org/keywords/architecture","display_name":"Architecture","score":0.5146999955177307},{"id":"https://openalex.org/keywords/efficient-energy-use","display_name":"Efficient energy use","score":0.5115000009536743},{"id":"https://openalex.org/keywords/data-management","display_name":"Data management","score":0.4867999851703644},{"id":"https://openalex.org/keywords/access-control","display_name":"Access control","score":0.43459999561309814},{"id":"https://openalex.org/keywords/energy-management","display_name":"Energy management","score":0.4253000020980835}],"concepts":[{"id":"https://openalex.org/C153740404","wikidata":"https://www.wikidata.org/wiki/Q671224","display_name":"Data center","level":2,"score":0.6485000252723694},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6204000115394592},{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.5928999781608582},{"id":"https://openalex.org/C105339364","wikidata":"https://www.wikidata.org/wiki/Q2297740","display_name":"Software deployment","level":2,"score":0.5853999853134155},{"id":"https://openalex.org/C2780165032","wikidata":"https://www.wikidata.org/wiki/Q16869822","display_name":"Energy consumption","level":2,"score":0.5562999844551086},{"id":"https://openalex.org/C2780609101","wikidata":"https://www.wikidata.org/wiki/Q17156588","display_name":"Resource management (computing)","level":2,"score":0.5196999907493591},{"id":"https://openalex.org/C123657996","wikidata":"https://www.wikidata.org/wiki/Q12271","display_name":"Architecture","level":2,"score":0.5146999955177307},{"id":"https://openalex.org/C2742236","wikidata":"https://www.wikidata.org/wiki/Q924713","display_name":"Efficient energy use","level":2,"score":0.5115000009536743},{"id":"https://openalex.org/C1668388","wikidata":"https://www.wikidata.org/wiki/Q1149776","display_name":"Data management","level":2,"score":0.4867999851703644},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.43459999561309814},{"id":"https://openalex.org/C7817414","wikidata":"https://www.wikidata.org/wiki/Q1779504","display_name":"Energy management","level":3,"score":0.4253000020980835},{"id":"https://openalex.org/C25344961","wikidata":"https://www.wikidata.org/wiki/Q192726","display_name":"Virtual machine","level":2,"score":0.41839998960494995},{"id":"https://openalex.org/C206345919","wikidata":"https://www.wikidata.org/wiki/Q20380951","display_name":"Resource (disambiguation)","level":2,"score":0.39959999918937683},{"id":"https://openalex.org/C2778002324","wikidata":"https://www.wikidata.org/wiki/Q4488810","display_name":"Access management","level":2,"score":0.39890000224113464},{"id":"https://openalex.org/C10511746","wikidata":"https://www.wikidata.org/wiki/Q899388","display_name":"Data security","level":3,"score":0.3792000114917755},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.35679998993873596},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.350600004196167},{"id":"https://openalex.org/C35869016","wikidata":"https://www.wikidata.org/wiki/Q846636","display_name":"Software architecture","level":3,"score":0.3458000123500824},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.3386000096797943},{"id":"https://openalex.org/C47487241","wikidata":"https://www.wikidata.org/wiki/Q5227230","display_name":"Data access","level":2,"score":0.33480000495910645},{"id":"https://openalex.org/C31139447","wikidata":"https://www.wikidata.org/wiki/Q5380386","display_name":"Enterprise information security architecture","level":2,"score":0.3262999951839447},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3253999948501587},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.32170000672340393},{"id":"https://openalex.org/C29202148","wikidata":"https://www.wikidata.org/wiki/Q287260","display_name":"Resource allocation","level":2,"score":0.30889999866485596},{"id":"https://openalex.org/C83163435","wikidata":"https://www.wikidata.org/wiki/Q3954104","display_name":"Security management","level":2,"score":0.30309998989105225},{"id":"https://openalex.org/C2775924081","wikidata":"https://www.wikidata.org/wiki/Q55608371","display_name":"Control (management)","level":2,"score":0.30239999294281006},{"id":"https://openalex.org/C106527866","wikidata":"https://www.wikidata.org/wiki/Q1489497","display_name":"Building management system","level":3,"score":0.2913999855518341},{"id":"https://openalex.org/C2778274720","wikidata":"https://www.wikidata.org/wiki/Q7315806","display_name":"Resource Management System","level":3,"score":0.28130000829696655},{"id":"https://openalex.org/C176649486","wikidata":"https://www.wikidata.org/wiki/Q2308807","display_name":"Memory management","level":3,"score":0.28029999136924744},{"id":"https://openalex.org/C513985346","wikidata":"https://www.wikidata.org/wiki/Q270471","display_name":"Virtualization","level":3,"score":0.27549999952316284},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.26820001006126404},{"id":"https://openalex.org/C154908896","wikidata":"https://www.wikidata.org/wiki/Q2167404","display_name":"Security policy","level":2,"score":0.26570001244544983},{"id":"https://openalex.org/C67186912","wikidata":"https://www.wikidata.org/wiki/Q367664","display_name":"Data modeling","level":2,"score":0.263700008392334},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.26030001044273376},{"id":"https://openalex.org/C77290126","wikidata":"https://www.wikidata.org/wiki/Q5283128","display_name":"Distributed System Security Architecture","level":5,"score":0.2567000091075897},{"id":"https://openalex.org/C112904061","wikidata":"https://www.wikidata.org/wiki/Q1077480","display_name":"Hypervisor","level":4,"score":0.2563000023365021}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1186/s42400-025-00410-4","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s42400-025-00410-4","pdf_url":"https://link.springer.com/content/pdf/10.1186/s42400-025-00410-4.pdf","source":{"id":"https://openalex.org/S3035238565","display_name":"Cybersecurity","issn_l":"2523-3246","issn":["2523-3246"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cybersecurity","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:ff21f04cbad24d33bc708683f3c145a1","is_oa":true,"landing_page_url":"https://doaj.org/article/ff21f04cbad24d33bc708683f3c145a1","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Cybersecurity, Vol 9, Iss 1, Pp 1-23 (2026)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1186/s42400-025-00410-4","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s42400-025-00410-4","pdf_url":"https://link.springer.com/content/pdf/10.1186/s42400-025-00410-4.pdf","source":{"id":"https://openalex.org/S3035238565","display_name":"Cybersecurity","issn_l":"2523-3246","issn":["2523-3246"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cybersecurity","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G2688386868","display_name":null,"funder_award_id":"2023YFB3106303","funder_id":"https://openalex.org/F4320335777","funder_display_name":"National Key Research and Development Program of China"}],"funders":[{"id":"https://openalex.org/F4320335777","display_name":"National Key Research and Development Program of China","ror":null}],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W7125645552.pdf","grobid_xml":"https://content.openalex.org/works/W7125645552.grobid-xml"},"referenced_works_count":33,"referenced_works":["https://openalex.org/W1923260719","https://openalex.org/W2009390220","https://openalex.org/W2063272066","https://openalex.org/W2068040370","https://openalex.org/W2069499594","https://openalex.org/W2076014973","https://openalex.org/W2147118406","https://openalex.org/W2755987998","https://openalex.org/W2766335005","https://openalex.org/W2767616556","https://openalex.org/W2793963472","https://openalex.org/W2800044535","https://openalex.org/W2925744458","https://openalex.org/W2953169926","https://openalex.org/W2960278926","https://openalex.org/W2964229770","https://openalex.org/W2982316422","https://openalex.org/W2999600391","https://openalex.org/W3000517111","https://openalex.org/W3010927549","https://openalex.org/W3097239682","https://openalex.org/W3103243695","https://openalex.org/W3153001680","https://openalex.org/W3157888572","https://openalex.org/W4249878737","https://openalex.org/W4283332153","https://openalex.org/W4304148173","https://openalex.org/W4312630909","https://openalex.org/W4360764294","https://openalex.org/W4362566328","https://openalex.org/W4398762689","https://openalex.org/W4401276542","https://openalex.org/W4403313129"],"related_works":[],"abstract_inverted_index":{"Abstract":[0],"The":[1],"trend":[2],"of":[3,9,21,146],"heterogeneous":[4,90],"servers":[5],"and":[6,23,30,38,54,101,121,132,155,159,181],"the":[7,33,106,137],"rise":[8],"Software-Defined":[10,66],"Data":[11],"Center":[12],"(SDDC)":[13],"have":[14],"transformed":[15],"data":[16,42,185],"center":[17,43],"management.":[18,74],"Collaborative":[19],"management":[20,44,80],"hardware":[22],"software":[24],"is":[25],"crucial":[26],"for":[27,110],"rapid":[28],"deployment":[29],"migration.":[31],"As":[32],"boundary":[34],"between":[35],"physical":[36,83],"infrastructure":[37,40,84],"virtual":[39,86,147],"blurs,":[41],"faces":[45],"challenges":[46],"in":[47,175,183],"fine-grained":[48],"resource":[49,111,177],"provisioning,":[50,112,178],"energy":[51,113,151,179],"efficiency":[52],"optimization,":[53],"security":[55,182],"assurance.":[56],"To":[57],"address":[58],"these":[59],"challenges,":[60],"this":[61],"paper":[62],"proposes":[63],"a":[64,97,129],"novel":[65],"Platform":[67],"Management":[68],"(SDPM)":[69],"architecture":[70,76,107,138],"based":[71,143],"on":[72,128,144],"out-of-band":[73],"This":[75],"extends":[77],"server":[78,131],"platform":[79],"capabilities":[81,109],"from":[82],"to":[85,164],"machines.":[87],"By":[88],"abstracting":[89],"resources":[91,142],"into":[92],"execution":[93],"points":[94],"managed":[95],"by":[96],"centralized":[98],"control":[99,120,168],"plane":[100],"consolidating":[102],"standard":[103],"industry":[104],"interfaces,":[105],"introduces":[108],"consumption":[114,152],"regulation,":[115],"as":[116,118],"well":[117],"access":[119,167],"trusted":[122],"computing":[123],"support.":[124],"A":[125],"prototype":[126],"implementation":[127],"real":[130],"experimental":[133],"results":[134,171],"demonstrate":[135],"that":[136],"can":[139],"dynamically":[140],"allocate":[141],"predictions":[145],"machine":[148],"workloads,":[149],"optimize":[150],"through":[153],"workload-aware":[154],"temperature-driven":[156],"fan":[157],"control,":[158],"support":[160],"secure":[161],"communication":[162],"channels":[163],"implement":[165],"advanced":[166],"policies.":[169],"These":[170],"highlight":[172],"SDPM\u2019s":[173],"potential":[174],"advancing":[176],"efficiency,":[180],"modern":[184],"centers.":[186]},"counts_by_year":[],"updated_date":"2026-03-25T14:56:36.534964","created_date":"2026-01-26T00:00:00"}
