{“状态”:“确定”,“消息类型”:“工作”,“信息版本”:“1.0.0”,“邮件”:{“索引”:{“日期-部件”:[[2024,5,15]],“日期-时间”:“2024-05-15T05:51:33Z”,“时间戳”:1715752293503},“引用-计数”:35,“发布者”:“IEEE”,“许可证”:[{“开始”:{'日期-部件“:[2020,6,1]],”日期-时间“:”2020-06-01T00:00:00Z“,”timestamp“:1590969600000},”content-version“:”vor“,“delay-in-days”:0,“URL”:“https:\/\/ieeexplore.iee.org\/Xplorehelp\/downloads\/license-information\/ieee.html”},{“start”:{“date-parts”:[[2020,6,1]],“date-time”:“2020-06-01T00:00:00Z”,“timestamp”:1590969600000},“content-version”:“stm-asf”,“delay-in-days“:0,”URL“https:\\/doi.org\/10.1 5223\/policy-029“},{“开始”:{“日期部分”:[[2020,6,1]],“date-time”:“2020-06-01T00:00:00Z”,“timestamp”:1590969600000},“content-version”:“stm-asf”,“delay-in-days”:0,“URL”:“https:\\/doi.org\/10.15223\/policy-037”}],“content-domain”:{“domain”:[],“crossmark-restriction”:false},”short-container-title“:[],”published-print“:{”date-parts“:[2020,6]},“doi”:“10.1109\/cns48642.2020.9162251”,“类型”:“procesdings-article”,“created”:{“date-parts”:[[2020,8,7]],“date-time”:“2020-08-07T21:54:40Z”,“timestamp”:1596837280000},“source”:“Crossref”,“is-referenced-by-count”:2,“title”:[“Catching Falling Dominoes:Cloud Management-Level Provenance Analysis with Application to OpenStack”],“prefix”:“10.1109”,”author“:[{”given“Azadeh”,“family”:“Tabiban”,“sequence”:“first”,“affiliation”:[]},{“given”:“Yosr”,“family”:“Jarraya”,“segment”:“additional”,“filiation“:[]{”given“:”Mengyuan“,”family“:”Zhang“,”sequence“:”additional“,”affiliance“:[]},}“giving”:“Makan”,“家族”:“Pourzandi”,“序列”:“附加的”,“从属关系”:[]{“给定的”:“玲珑”,“家庭”:“Wang”,“sequence”:“additional”,“affiliation”:[]},{“given”:“Mourad”,“family”:“Debbabi”,“sequence”:“additional”,“affiliation”:[]}],“member”:“263”,“reference”:[{“key”:”ref33“,”doi-asserted-by“:”publisher“,”doi“:”10.14722\/ndss.2018.23282“},{“密钥”:“ref32”,“doi-assetd-by”:“publisher”,“doi”:“10.1145\/3243734.3243749”},“key“:”ref31“,”doi-asserted-by“:”publisher“,”doi“:”10.1145\/3243734.3243759“},{“key”:“ref30”,“doi asserted by”:“publisher”,“doi”:“10.1109\/CNS.201.8433180”},{“key”:“ref35”,“doi asserted by”:“publisher”,“doi”:“10.1145\/2619239.2626335”},{“key”:“ref34”,“doi asserted by”:“publisher”,“doi”:“10.14722\/nds.2017.23665”},{“key”:“ref10”,“doi asserted by”:“publisher”,“doi”:“10.14722\/nds.2017.23665”4722\/nds.201923349“},{“key”:“ref11”,“doi-asserted-by”:“publisher”,“doi”:“10.1145\/945465.945467”},{“key”:“ref12”,“doi-asserted-by”:”publisher“,”doi“:”10.1145\/2523649.2523680“},“key“:”ref13“,”doi-assert-by“:”publicher“,”doi“:“10.1109\/CLOUD.2016.0017”},{“key”:“ref15”,“首页”:“1”,“文章标题”:“Istop:审核openstack中跨云层的虚拟网络隔离”,“volume”:“22”,“author”:“madi”,“year”:“2018”,“journal-title”:“ACM Transactions on Privacy and Security(TOPS)”},{“key”:”ref16“,”doi-asserted-by“:”publisher“,”doi“:”10.1109\/CloudCom2018.2018.00042:“10.1007 \/978-3-319-66399-9_15”},{“key”:“ref18”,“doi-asserted-by”:“publisher”,“doi”:“10.3233 \/JCS-181137”},“year”:“2019”,“journal-title”:“Int Conf on Adaptive and Self-Adaptive Systems and Applications”},{“key”:“ref4”,“article-title“:”Prov-dm:The Prov data model“,”author“:”belhajjame“,”year“:”2013“,”journal-title“:”W3C Recommendation“},”{“密钥”:“ref27”,“doi-asserted-by”:“publisher”,“doi”:“10.1109\/COMST.2018.2859449”}“,”doi-asserted-by“:“publisher”,“DOI”:“10.1145\/2775111”},{“key”:“ref6”,“year”:“2020”,“journal-title”:“Cisco avos”},“文章标题”:“假毕加索案:通过可靠的出处防止历史伪造”,“作者”:“哈桑”,“年份”:“2009年”,“日记标题”:“更快”},{“关键”:“ref7”,“文章标题”:”Frappuccino:通过出处的运行时分析进行错误检测“,”作者“:”han“,”年份“:”2017“,”日记标题“:”HotCloud“},”{“重点”:“ref2”,“首页”:“319”,“论文标题”:“值得信赖的linux内核全系统起源”,“author”:“bates”,“year”:“0”,“journal-title”:“In USENIX Security(2015)”}“首页”:“17”,“文章标题”:“Linux安全模块:Linux内核的通用安全支持”,“作者”:“morris”,“年份”:“2002”,“日志标题”:“Proc USENIX Security07”},{“密钥”:“ref22”,“doi-asserted-by”:“publisher”,“doi”:“10.1007\/978-3-319-11698-3_2”}:“2006”,“journal-title”:“In USENIX Annual Technical Conference General Track”},{“key”:“ref24”,“year”:“2015”,“日记标题”:“OpenStack Congress”}“,”doi-asserted-by“:“publisher”,“DOI”:“10.1145\/3127479.3129249”}],“event”:{“name”:“2020 IEEE通信和网络安全会议(CNS)”,“location”:“Avignon,France”,“start”:{“date-parts”:[[2020,6,29]]},“end”:{-“date-ports”:[2020,7,1]]}},”container-title“:[”2020 IEEE通讯和网络安全(CNS,CNS)会议“],“original-title”:[],“link”用法:[{“URL”:“http://\/xplorestaging.ieee.org\/ielx7\/9153729\/9162157\/09162251.pdf?arnumber=9162251”,“content-type”:“unspecified”,“content-version”:“vor”,“intended-application”:“similarity-checking”},“deposed”:{“date-parts”:[2022,6,27]],“date-time”:”2022-06-27T15:58:42Z“,”timestamp“:1656345522000},”score“:1,”资源“:{”主“:{“URL”:“https:\/\/ieeexplore.iee.org\/document\/9162251\/”}},“副标题”:[],“短标题”:[],“已发布”:{“日期-部件”:[[2020,6]]},”引用计数“:35,”URL“:”http://\/dx.doi.org\/10.109\/cns48642.2020.9162251“,”关系“:{}”,“主题”:[]],“发布”:}“日期部件”:[2020,6]]}}}