{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,19]],"date-time":"2025-03-19T15:19:42Z","timestamp":1742397582318},"publisher-location":"Berlin, Heidelberg","reference-count":11,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540290681"},{"type":"electronic","value":"9783540319061"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1007\/11558989_22","type":"book-chapter","created":{"date-parts":[[2005,11,2]],"date-time":"2005-11-02T03:51:51Z","timestamp":1130903511000},"page":"240-251","source":"Crossref","is-referenced-by-count":3,"title":["Conservation vs. Consensus in Peer-to-Peer Preservation Systems"],"prefix":"10.1007","author":[{"given":"Prashanth P.","family":"Bungale","sequence":"first","affiliation":[]},{"given":"Geoffrey","family":"Goodell","sequence":"additional","affiliation":[]},{"given":"Mema","family":"Roussopoulos","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"22_CR1","unstructured":"ARL \u2013 Association of Research Libraries. ARL Statistics 2000-01 (2001), http:\/\/www.arl.org\/stats\/arlstat\/01pub\/intro.html"},{"key":"22_CR2","unstructured":"Burkard, T.: Herodotus: A Peer-to-Peer Web Archival System, Master\u2019s thesis, MIT (June 2002)"},{"key":"22_CR3","doi-asserted-by":"crossref","unstructured":"Cooper, B.F., Garcia-Molina, H.: Peer-to-peer data preservation through storage auctions. IEEE Transactions on Parallel and Distributed Systems (to appear)","DOI":"10.1109\/TPDS.2005.34"},{"key":"22_CR4","doi-asserted-by":"crossref","unstructured":"Cox, L.P., Noble, B.D.: Samsara: Honor Among Thieves in Peer-to-Peer Storage. In: Proceedings of the Nineteenth ACM Symposium on Operating Systems Principles, Bolton Landing, NY, USA, October 2003, pp. 120\u2013132 (2003)","DOI":"10.1145\/945445.945458"},{"key":"22_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"251","DOI":"10.1007\/3-540-45748-8_24","volume-title":"Peer-to-Peer Systems","author":"J. Douceur","year":"2002","unstructured":"Douceur, J.: The Sybil Attack. In: Druschel, P., Kaashoek, M.F., Rowstron, A. (eds.) IPTPS 2002. LNCS, vol.\u00a02429, p. 251. Springer, Heidelberg (2002)"},{"key":"22_CR6","unstructured":"HiveCache, Inc. Distributed disk-based backups, Available at http:\/\/www.hivecache.com\/"},{"key":"22_CR7","doi-asserted-by":"crossref","unstructured":"Maniatis, P., Roussopoulos, M., Giuli, T.J., Rosenthal, D.S.H., Baker, M., Muliadi, Y.: Preserving Peer Replicas By Rate-Limited Sampled Voting. In: SOSP (2003)","DOI":"10.1145\/945445.945451"},{"key":"22_CR8","unstructured":"Parno, B., Roussopoulos, M.: Predicting Adversary Infiltration in the LOCKSS System. Technical Report TR-28-04, Harvard University (October 2004)"},{"key":"22_CR9","unstructured":"Rosenthal, D.S.H., Roussopoulos, M., Maniatis, P., Baker, M.: Economic Measures to Resist Attacks on a Peer-to-Peer Network. In: Workshop on Economics of Peer-to-Peer Systems, Berkeley, CA, USA (June 2003)"},{"key":"22_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1007\/978-3-540-30183-7_4","volume-title":"Peer-to-Peer Systems III","author":"M. Roussopoulos","year":"2005","unstructured":"Roussopoulos, M., Giuli, T.J., Baker, M., Maniatis, P., Rosenthal, D.S.H., Mogul, J.: 2 P2P or Not 2 P2P? In: Voelker, G.M., Shenker, S. (eds.) IPTPS 2004. LNCS, vol.\u00a03279, pp. 33\u201343. Springer, Heidelberg (2005)"},{"key":"22_CR11","doi-asserted-by":"crossref","unstructured":"Wallach, D.: A Survey of Peer-to-Peer Security Issues. In: Intl. Symp. on Software Security (2002)","DOI":"10.1007\/3-540-36532-X_4"}],"container-title":["Lecture Notes in Computer Science","Peer-to-Peer Systems IV"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11558989_22","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,4,10]],"date-time":"2020-04-10T12:09:18Z","timestamp":1586520558000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11558989_22"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"ISBN":["9783540290681","9783540319061"],"references-count":11,"URL":"https:\/\/doi.org\/10.1007\/11558989_22","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2005]]}}}