{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T00:30:36Z","timestamp":1725496236742},"publisher-location":"Boston, MA","reference-count":21,"publisher":"Springer US","isbn-type":[{"type":"print","value":"9780387736549"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-0-387-73655-6_25","type":"book-chapter","created":{"date-parts":[[2007,11,23]],"date-time":"2007-11-23T01:41:46Z","timestamp":1195782106000},"page":"383-398","source":"Crossref","is-referenced-by-count":1,"title":["Resilia: a Safe and Secure Distributed Backup System for Small and Medium Enterprises"],"prefix":"10.1007","author":[{"given":"Christian Damsgaard","family":"Jensen","sequence":"first","affiliation":[]},{"given":"Fernando","family":"Meira","sequence":"additional","affiliation":[]},{"given":"Jacob","family":"Nittegaard-Nielsen","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"25_CR1","unstructured":"S. Armour (2006) Lost digital data cost businesses billions. In USA TODAY 12 June 2006."},{"key":"25_CR2","unstructured":"Data Deposit Box (2007) Data Loss Quotes and Statistics. Available at URL: http:\/\/www.datadepositbox.com\/media\/data-loss-statistics.asp , visited 21 February 2007."},{"key":"25_CR3","unstructured":"Sun Developer Network (2007) Java Tecchnology: Reference. Available at URL: http:\/\/www.java.sun.com\/reference\/index.html , visited 21 February 2007"},{"key":"25_CR4","unstructured":"J. D. Gradecki (2002) Mastering JXTA: building Java peer-to-peer applications. Wiley Publishing"},{"key":"25_CR5","doi-asserted-by":"crossref","unstructured":"D. Dolev, A. C. Yao (1981) On the security of public key protocols. In Proceedings of the IEEE 22nd Annual Symposium on Foundations of Computer Science, pp. 350\u2013357","DOI":"10.1109\/SFCS.1981.32"},{"issue":"11","key":"25_CR6","doi-asserted-by":"publisher","first-page":"612","DOI":"10.1145\/359168.359176","volume":"22","author":"A. Shamir","year":"1979","unstructured":"A. Shamir (1979) How to share a secret. In Communications of the ACM, vol. 22, no. 11, pp. 612\u2013613","journal-title":"Communications of the ACM"},{"key":"25_CR7","first-page":"313","volume":"48","author":"G. R. Blakley","year":"1979","unstructured":"G. R. Blakley (1979) Safeguarding cryptographic keys. In AFIPS 1979 NCC, Vol. 48, pp. 313\u2013317.","journal-title":"AFIPS"},{"key":"25_CR8","doi-asserted-by":"crossref","unstructured":"P. Feldman (1987) A practical scheme for non-interactive verifiable secret sharing. In Proceedings of the 28th IEEE Symposium on Foundations of Computer Science (FOCS\u2019 87)","DOI":"10.1109\/SFCS.1987.4"},{"key":"25_CR9","unstructured":"T. P. Pedersen (1991) Non-interactive and information-theoretic secure verifiable secret sharing. In Proceedings of Crypto\u201991 (LNCS 576), pp. 129\u2013140"},{"key":"25_CR10","doi-asserted-by":"crossref","unstructured":"A. Herzberg, S. Jarecki, H. Krawczyk, and M. Yung (1995) Proactive secret sharing or: How to cope with perpetual leakage. In Proceedings of Crypto\u201995 (LNCS 963)","DOI":"10.1007\/3-540-44750-4_27"},{"key":"25_CR11","doi-asserted-by":"publisher","first-page":"335","DOI":"10.1145\/62044.62050","volume":"36","author":"M. O. Rabin","year":"1989","unstructured":"M. O. Rabin (1989) Efficient dispersal of information for security, load balancing, and fault tolerance. In Journal of the ACM, Vol. 36, No. 2, pp. 335\u2013348","journal-title":"Journal of the ACM"},{"key":"25_CR12","unstructured":"J. Nittegaard-Nielsen (2004) Sikkert og plideligt peer-to-peer filsystem. Master\u2019s thesis, Technical University of Denmark (in Danish)"},{"key":"25_CR13","unstructured":"F. Meira (2005) Resilia: A safe & secure backup-system. Final year project, Engineerng Faculty of the University of Porto"},{"key":"25_CR14","doi-asserted-by":"crossref","unstructured":"S. Garfinkel (1994) PGP: Pretty Good Privacy. O\u2019Reilly","DOI":"10.1016\/0142-0496(94)90185-6"},{"key":"25_CR15","unstructured":"C. Batten, K. Barr, A. Saraf, and S. Trepetin (2002) pStore: A secure peer-to-peer backup system. Technical Memo MIT-LCS-TM-632, Massachusetts Institute of Technology Laboratory for Computer Science"},{"key":"25_CR16","unstructured":"E. Martinian (2007) Distributed internet backup system (dibs). Available at URL http:\/\/www.csua.berkeley.edu\/~emin\/source_code\/dibs"},{"key":"25_CR17","doi-asserted-by":"crossref","unstructured":"L. P. Cox and B. D. Noble (2003) Samsara: honor among thieves in peer-to-peer storage. In Proceedings of the nineteenth ACM symposium on Operating systems principles","DOI":"10.1145\/945445.945458"},{"issue":"SI","key":"25_CR18","doi-asserted-by":"publisher","first-page":"285","DOI":"10.1145\/844128.844155","volume":"36","author":"L. P. Cox","year":"2002","unstructured":"L. P. Cox, C. D. Murray, and B. D. Noble (2002) Pastiche: making backup cheap and easy. SIGOPS Opererating Systems Review, 36(SI):285\u2013298","journal-title":"SIGOPS Opererating Systems Review"},{"key":"25_CR19","unstructured":"CleverSafe Project (2007) Cleversafe dispersed storage project. Available at URL http:\/\/www.cleversafe.org\/wiki\/Cleversafe_Dispersed_Storage"},{"key":"25_CR20","doi-asserted-by":"publisher","first-page":"63","DOI":"10.1016\/j.entcs.2004.11.046","volume":"142","author":"G. Bella","year":"2006","unstructured":"G. Bella, C. Pistagna, S. Riccobene (2006) Distributed Backup through Information Dispersal. In Electronic Notes in Theoretical Computer Science, Vol 142:63\u201377","journal-title":"Electronic Notes in Theoretical Computer Science"},{"key":"25_CR21","doi-asserted-by":"crossref","unstructured":"I. Stoica, R. Morris, D. Karger, M. F. Kaashoek, H. Balakrishnan (2001) Chord: A Scalable Peer-to-peer Lookup Service for Internet Applications. In Proceedings of the 2001 ACM SIGCOMM Conference","DOI":"10.1145\/383059.383071"}],"container-title":["IFIP International Federation for Information Processing","Trust Management"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-0-387-73655-6_25.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,29]],"date-time":"2021-04-29T00:12:44Z","timestamp":1619655164000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-0-387-73655-6_25"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9780387736549"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-0-387-73655-6_25","relation":{},"subject":[]}}