{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,10]],"date-time":"2024-09-10T18:21:05Z","timestamp":1725992465972},"publisher-location":"Cham","reference-count":17,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030016883"},{"type":"electronic","value":"9783030016890"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-030-01689-0_15","type":"book-chapter","created":{"date-parts":[[2018,9,22]],"date-time":"2018-09-22T07:22:22Z","timestamp":1537600942000},"page":"181-193","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Selective All-Or-Nothing Transform: Protecting Outsourced Data Against Key Exposure"],"prefix":"10.1007","author":[{"given":"Katarzyna","family":"Kapusta","sequence":"first","affiliation":[]},{"given":"Gerard","family":"Memmi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,9,23]]},"reference":[{"key":"15_CR1","doi-asserted-by":"publisher","unstructured":"Bacis, E., De Capitani di Vimercati, S., Foresti, S., Paraboschi, S., Rosa, M., Samarati, P.: Mix&Slice: efficient access revocation in the cloud. In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, CCS 2016, pp. 217\u2013228. ACM, New York (2016). https:\/\/doi.org\/10.1145\/2976749.2978377","DOI":"10.1145\/2976749.2978377"},{"issue":"4","key":"15_CR2","doi-asserted-by":"publisher","first-page":"12:1","DOI":"10.1145\/2535929","volume":"9","author":"A Bessani","year":"2013","unstructured":"Bessani, A., Correia, M., Quaresma, B., Andr\u00e9, F., Sousa, P.: DEPSKY: dependable and secure storage in a cloud-of-clouds. Trans. Storage 9(4), 12:1\u201312:33 (2013). https:\/\/doi.org\/10.1145\/2535929","journal-title":"Trans. Storage"},{"key":"15_CR3","doi-asserted-by":"publisher","unstructured":"Bowers, K.D., Juels, A., Oprea, A.: HAIL: a high-availability and integrity layer for cloud storage. In: Proceedings of the 16th ACM Conference on Computer and Communications Security, CCS 2009, pp. 187\u2013198. ACM, New York (2009). https:\/\/doi.org\/10.1145\/1653662.1653686","DOI":"10.1145\/1653662.1653686"},{"key":"15_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"40","DOI":"10.1007\/978-3-319-57339-7_3","volume-title":"Progress in Cryptology - AFRICACRYPT 2017","author":"L Chen","year":"2017","unstructured":"Chen, L., Laing, T.M., Martin, K.M.: Revisiting and extending the AONT-RS scheme: a robust computationally secure secret sharing scheme. In: Joye, M., Nitaj, A. (eds.) AFRICACRYPT 2017. LNCS, vol. 10239, pp. 40\u201357. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-57339-7_3"},{"key":"15_CR5","doi-asserted-by":"crossref","unstructured":"Cincilla, P., Boudguiga, A., Hadji, M., Kaiser, A.: Light blind: Why encrypt if you can share? In: 2015 12th International Joint Conference on e-Business and Telecommunications (ICETE). vol. 04, pp. 361\u2013368 (July 2015)","DOI":"10.5220\/0005562203610368"},{"key":"15_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"359","DOI":"10.1007\/3-540-44598-6_23","volume-title":"Advances in Cryptology \u2014 CRYPTO 2000","author":"A Desai","year":"2000","unstructured":"Desai, A.: The security of all-or-nothing encryption: protecting against exhaustive key search. In: Bellare, M. (ed.) CRYPTO 2000. LNCS, vol. 1880, pp. 359\u2013375. Springer, Heidelberg (2000). https:\/\/doi.org\/10.1007\/3-540-44598-6_23"},{"key":"15_CR7","doi-asserted-by":"publisher","unstructured":"Kapusta, K., Memmi, G.: Data protection by means of fragmentation in distributed storage systems. In: International Conference on Protocol Engineering (ICPE) and International Conference on New Technologies of Distributed Systems (NTDS), pp. 1\u20138, July 2015. https:\/\/doi.org\/10.1109\/NOTERE.2015.7293486","DOI":"10.1109\/NOTERE.2015.7293486"},{"key":"15_CR8","doi-asserted-by":"crossref","unstructured":"Kapusta, K., Memmi, G.: Enhancing data protection with a structure-wise fragmentation and dispersal of encrypted data. In: The 17th International Joint Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom), August 2018","DOI":"10.1109\/TrustCom\/BigDataSE.2018.00064"},{"key":"15_CR9","doi-asserted-by":"publisher","unstructured":"Kapusta, K., Memmi, G., Noura, H.: Secure and resilient scheme for data protection in unattended wireless sensor networks. In: 2017 1st Cyber Security in Networking Conference (CSNet), pp. 1\u20138, October 2017. https:\/\/doi.org\/10.1109\/CSNET.2017.8241998","DOI":"10.1109\/CSNET.2017.8241998"},{"key":"15_CR10","doi-asserted-by":"publisher","unstructured":"Kapusta, K., Memmi, G., Noura, H.: POSTER: a keyless efficient algorithm for data protection by means of fragmentation. In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, CCS 2016, pp. 1745\u20131747. ACM, New York (2016). https:\/\/doi.org\/10.1145\/2976749.2989043","DOI":"10.1145\/2976749.2989043"},{"key":"15_CR11","doi-asserted-by":"publisher","unstructured":"Karame, G.O., Soriente, C., Lichota, K., Capkun, S.: Securing cloud data under key exposure. IEEE Trans. Cloud Comput., p. 1 (2017). https:\/\/doi.org\/10.1109\/TCC.2017.2670559","DOI":"10.1109\/TCC.2017.2670559"},{"key":"15_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"136","DOI":"10.1007\/3-540-48329-2_12","volume-title":"Advances in Cryptology \u2014 CRYPTO 1993","author":"H Krawczyk","year":"1994","unstructured":"Krawczyk, H.: Secret sharing made short. In: Stinson, D.R. (ed.) CRYPTO 1993. LNCS, vol. 773, pp. 136\u2013146. Springer, Heidelberg (1994). https:\/\/doi.org\/10.1007\/3-540-48329-2_12"},{"key":"15_CR13","doi-asserted-by":"publisher","unstructured":"Memmi, G., Kapusta, K., Qiu, H.: Data protection: combining fragmentation, encryption, and dispersion. In: 2015 International Conference on Cyber Security of Smart Cities, Industrial Control System and Communications (SSIC), pp. 1\u20139, August 2015. https:\/\/doi.org\/10.1109\/SSIC.2015.7245680","DOI":"10.1109\/SSIC.2015.7245680"},{"issue":"2","key":"15_CR14","doi-asserted-by":"publisher","first-page":"300","DOI":"10.1137\/0108018","volume":"8","author":"IS Reed","year":"1960","unstructured":"Reed, I.S., Solomon, G.: Polynomial codes over certain finite fields. J. Soc. Ind. Appl. Math. 8(2), 300\u2013304 (1960). https:\/\/doi.org\/10.1137\/0108018","journal-title":"J. Soc. Ind. Appl. Math."},{"key":"15_CR15","unstructured":"Resch, J.K., Plank, J.S.: AONT-RS: blending security and performance in dispersed storage systems. In: Proceedings of the 9th USENIX Conference on File and Storage Technologies, FAST 2011, p. 14, Berkeley, CA, USA (2011). http:\/\/dl.acm.org\/citation.cfm?id=1960475.1960489"},{"key":"15_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"210","DOI":"10.1007\/BFb0052348","volume-title":"Fast Software Encryption","author":"RL Rivest","year":"1997","unstructured":"Rivest, R.L.: All-or-nothing encryption and the package transform. In: Biham, E. (ed.) FSE 1997. LNCS, vol. 1267, pp. 210\u2013218. Springer, Heidelberg (1997). https:\/\/doi.org\/10.1007\/BFb0052348"},{"issue":"2","key":"15_CR17","doi-asserted-by":"publisher","first-page":"133","DOI":"10.1023\/A:1008304703074","volume":"22","author":"DR Stinson","year":"2001","unstructured":"Stinson, D.R.: Something about all or nothing (transforms). Des. Codes Cryptogr. 22(2), 133\u2013138 (2001). https:\/\/doi.org\/10.1023\/A:1008304703074","journal-title":"Des. Codes Cryptogr."}],"container-title":["Lecture Notes in Computer Science","Cyberspace Safety and Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-01689-0_15","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,24]],"date-time":"2019-10-24T13:05:51Z","timestamp":1571922351000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-01689-0_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783030016883","9783030016890"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-01689-0_15","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"CSS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Symposium on Cyberspace Safety and Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Amalfi","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Italy","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29 October 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"31 October 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"10","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"css2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/css2018.di.unisa.it\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}