{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,8]],"date-time":"2026-05-08T14:10:16Z","timestamp":1778249416710,"version":"3.51.4"},"publisher-location":"Boston, MA","reference-count":10,"publisher":"Springer US","isbn-type":[{"value":"9781402079009","type":"print"},{"value":"9781402079016","type":"electronic"}],"license":[{"start":{"date-parts":[[2004,1,1]],"date-time":"2004-01-01T00:00:00Z","timestamp":1072915200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2004,1,1]],"date-time":"2004-01-01T00:00:00Z","timestamp":1072915200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004]]},"DOI":"10.1007\/1-4020-7901-x_1","type":"book-chapter","created":{"date-parts":[[2005,12,21]],"date-time":"2005-12-21T11:51:38Z","timestamp":1135165898000},"page":"1-11","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":148,"title":["Remote Integrity Checking"],"prefix":"10.1007","author":[{"given":"Yves","family":"Deswarte","sequence":"first","affiliation":[]},{"given":"Jean-Jacques","family":"Quisquater","sequence":"additional","affiliation":[]},{"given":"Ayda","family":"Sa\u00efdane","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"1_CR1","unstructured":"CERT Advisory CA-2002-24, Trojan Horse OpenSSH Distribution, August 1, 2002."},{"key":"1_CR2","doi-asserted-by":"crossref","first-page":"644","DOI":"10.1109\/TIT.1976.1055638","volume":"22","author":"W. Diffie","year":"1976","unstructured":"W. Diffie and M.E. Hellman, \u201cNew Directions in Cryptography\u201d, IEEE Transactions in Information Theory, 22(1976), pp. 644\u2013654.","journal-title":"IEEE Transactions in Information Theory"},{"key":"1_CR3","doi-asserted-by":"crossref","unstructured":"T. Fraser, L. Badger and M. Feldman, \u201cHardening COTS Software With Generic Software Wrappers\u201d, Proc. of IEEE Symposium on Security and Privacy, 1999, pp. 2\u201316.","DOI":"10.1109\/SECPRI.1999.766713"},{"key":"1_CR4","unstructured":"John Green, David Marchette, Stephen Northcutt, Bill Ralph, \u201cAnalysis Techniques for Detecting Coordinated Attacks and Probes\u201d, in Proc. 1st USENIX Workshop on Intrusion Detection and Network Monitoring, Santa Clara, California, USA, April 9\u201312, 1999, available at: <http:\/\/www.usenix.org\/publications\/library\/proceedings\/detection99\/full_papers\/green\/green_html\/>"},{"key":"1_CR5","doi-asserted-by":"crossref","unstructured":"Y. Huang, C. Kintala, N. Kolettis, N.D. Fulton, \u201cSoftware Rejuvenation: Analysis, Module and Applications\u201d, in Proc. 25th IEEE Symposium on Fault Tolerant Computing Conference (FTCS-25), Pasadena, CA, USA, June 1995, pp. 381\u2013390.","DOI":"10.1109\/FTCS.1995.466961"},{"issue":"[5]","key":"1_CR6","doi-asserted-by":"crossref","first-page":"80","DOI":"10.1145\/173668.168626","volume":"27","author":"M. Jones","year":"1993","unstructured":"M. Jones, \u201cInterposition Agents: Transparently Interposing User Code at the System Interface\u201d, Proc. 14th ACM Symp. on Operating Systems Principles, Operating Systems Review, 27[5], December 1993, pp. 80\u201393.","journal-title":"Proc. 14th ACM Symp. on Operating Systems Principles, Operating Systems Review"},{"key":"1_CR7","unstructured":"G.H. Kim and E.H. Spafford, The Design and Implementation of Tripwire: a File System Integrity Checker, Technical Report CSD-TR-93-071, Computer Science Dept, Purdue University, 1993."},{"issue":"11","key":"1_CR8","doi-asserted-by":"crossref","first-page":"770","DOI":"10.1145\/358790.358797","volume":"24","author":"L. Lamport","year":"1981","unstructured":"Leslie Lamport, \u201cPassword Authentication with Insecure Communication\u201d, Comunications of the ACM, 24(11), pp. 770\u2013772, November 1981.","journal-title":"Comunications of the ACM"},{"key":"1_CR9","unstructured":"Vin\u00edcius da Silveira Serafim and Raul Fernando Weber, The SOFFIC Project, < http:\/\/www.inf.ufrgs.br\/~gseg\/projetos\/the_soffic_project.pdf >."},{"key":"1_CR10","unstructured":"A. Valdes, M. Almgren, S. Cheung, Y. Deswarte, B. Dutertre, J. Levy, H. Sa\u00efdi, V. Stavridou and T. Uribe, \u201cAn Adaptative Intrusion-Tolerant Server Architecture\u201d, in Proc. 10th International Workshop on Security Protocols, Cambridge (UK), April 2002, to appear in Springer LNCS Series."}],"container-title":["IFIP International Federation for Information Processing","Integrity and Internal Control in Information Systems VI"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/1-4020-7901-X_1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,5,8]],"date-time":"2026-05-08T13:14:22Z","timestamp":1778246062000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/1-4020-7901-X_1"}},"subtitle":["How to Trust Files Stored on Untrusted Servers"],"short-title":[],"issued":{"date-parts":[[2004]]},"ISBN":["9781402079009","9781402079016"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/1-4020-7901-x_1","relation":{},"ISSN":["1571-5736"],"issn-type":[{"value":"1571-5736","type":"print"}],"subject":[],"published":{"date-parts":[[2004]]},"assertion":[{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}