{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,9,12]],"date-time":"2023-09-12T11:14:24Z","timestamp":1694517264953},"reference-count":19,"publisher":"Wiley","issue":"14","license":[{"start":{"date-parts":[[2017,6,14]],"date-time":"2017-06-14T00:00:00Z","timestamp":1497398400000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/onlinelibrary.wiley.com\/termsAndConditions#vor"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Concurrency and Computation"],"published-print":{"date-parts":[[2017,7,25]]},"DOI":"10.1002\/cpe.4215","type":"journal-article","created":{"date-parts":[[2017,6,14]],"date-time":"2017-06-14T07:43:15Z","timestamp":1497426195000},"source":"Crossref","is-referenced-by-count":1,"title":["Special issue on Big Data Security and Intelligent Data in Clouds (