{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T20:23:10Z","timestamp":1743020590947,"version":"3.40.3"},"publisher-location":"Cham","reference-count":28,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319281650"},{"type":"electronic","value":"9783319281667"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-28166-7_11","type":"book-chapter","created":{"date-parts":[[2016,1,8]],"date-time":"2016-01-08T15:29:04Z","timestamp":1452266944000},"page":"215-239","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["LightCore: Lightweight Collaborative Editing Cloud Services for Sensitive Data"],"prefix":"10.1007","author":[{"given":"Weiyu","family":"Jiang","sequence":"first","affiliation":[]},{"given":"Jingqiang","family":"Lin","sequence":"additional","affiliation":[]},{"given":"Zhan","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Huorong","family":"Li","sequence":"additional","affiliation":[]},{"given":"Lei","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,1,9]]},"reference":[{"issue":"10","key":"11_CR1","doi-asserted-by":"publisher","first-page":"1454","DOI":"10.1109\/TPDS.2008.240","volume":"20","author":"D Sun","year":"2009","unstructured":"Sun, D., Sun, C.: Context-based operational transformation in distributed collaborative editing systems. IEEE Trans. Parallel Distrib. Syst. 20(10), 1454\u20131470 (2009)","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"key":"11_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"78","DOI":"10.1007\/978-3-540-30539-2_6","volume-title":"Advances in Cryptology - ASIACRYPT 2004","author":"A Shamir","year":"2004","unstructured":"Shamir, A.: Stream ciphers: dead or alive? In: Lee, P.J. (ed.) ASIACRYPT 2004. LNCS, vol. 3329, pp. 78\u201378. Springer, Heidelberg (2004)"},{"key":"11_CR3","doi-asserted-by":"crossref","unstructured":"Lautam\u00e4ki, J., Nieminen, A., Koskinen, J., Aho, T., Mikkonen, T., Englund, M.: Cored: browser-based collaborative real-time editor for Java web applications. In: 12 Computer Supported Cooperative Work (CSCW), pp. 1307\u20131316 (2012)","DOI":"10.1145\/2145204.2145399"},{"issue":"2","key":"11_CR4","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1145\/2340416.2340420","volume":"12","author":"H Fan","year":"2012","unstructured":"Fan, H., Sun, C.: Supporting semantic conflict prevention in real-time collaborative programming environments. ACM SIGAPP Appl. Comput. Rev. 12(2), 39\u201352 (2012)","journal-title":"ACM SIGAPP Appl. Comput. Rev."},{"issue":"7","key":"11_CR5","doi-asserted-by":"publisher","first-page":"558","DOI":"10.1145\/359545.359563","volume":"21","author":"L Lamport","year":"1978","unstructured":"Lamport, L.: Time, clocks, and the ordering of events in a distributed system. Commun. ACM 21(7), 558\u2013565 (1978)","journal-title":"Commun. ACM"},{"key":"11_CR6","doi-asserted-by":"crossref","unstructured":"N\u00e9delec, B., Molli, P., Most\u00e9faoui, A., Desmontils, E.: LSEQ: an adaptive structure for sequences in distributed collaborative editing. In: Proceedings of the 2013 ACM symposium on Document engineering, pp. 37\u201346 (2013)","DOI":"10.1145\/2494266.2494278"},{"key":"11_CR7","unstructured":"N\u00e9delec, B., Molli, P., Most\u00e9faoui, A., Desmontils, E.: Concurrency effects over variable-size identifiers in distributed collaborative editing. In: Proceedings of the International workshop on Document Changes: Modeling, Detection, Storage and Visualization (2013)"},{"key":"11_CR8","doi-asserted-by":"crossref","unstructured":"Vidot, N., Cart, M., Ferri\u00e9, J., Suleiman, M.: Copies convergence in a distributed real-time collaborative environment. In: Proceeding on the ACM 2000 Conference on Computer Supported Cooperative Work (CSCW), pp. 171\u2013180 (2000)","DOI":"10.1145\/358916.358988"},{"key":"11_CR9","unstructured":"Google Docs (2014). http:\/\/docs.google.com\/"},{"key":"11_CR10","unstructured":"Office Online (2014). http:\/\/office.microsoft.com\/zh-cn\/online\/FX100996074.aspx"},{"key":"11_CR11","doi-asserted-by":"crossref","unstructured":"Raykova, M., Zhao, H., Bellovin, S.M.: Privacy enhanced access control for outsourced data sharing. In: 16th International Conference on Financial Cryptography and Data Security (FC), pp. 223\u2013238 (2012)","DOI":"10.1007\/978-3-642-32946-3_17"},{"key":"11_CR12","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1016\/j.cose.2013.01.008","volume":"39","author":"SDC di Vimercati","year":"2013","unstructured":"di Vimercati, S.D.C., Foresti, S., Jajodia, S., Livraga, G., Paraboschi, S., Samarati, P.: Enforcing dynamic write privileges in data outsourcing. Comput. Secur. 39, 47\u201363 (2013)","journal-title":"Comput. Secur."},{"issue":"8","key":"11_CR13","doi-asserted-by":"publisher","first-page":"1518","DOI":"10.1016\/j.jcss.2014.04.019","volume":"80","author":"L Zhou","year":"2014","unstructured":"Zhou, L., Varadharajan, V., Hitchens, M.: Secure administration of cryptographic role-based access control for large-scale cloud storage systems. J. Comput. Syst. Sci. 80(8), 1518\u20131533 (2014)","journal-title":"J. Comput. Syst. Sci."},{"key":"11_CR14","series-title":"Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","doi-asserted-by":"publisher","first-page":"89","DOI":"10.1007\/978-3-642-16161-2_6","volume-title":"Security and Privacy in Communication Networks","author":"M Li","year":"2010","unstructured":"Li, M., Yu, S., Ren, K., Lou, W.: Securing personal health records in cloud computing: patient-centric and fine-grained data access control in multi-owner settings. In: Jajodia, S., Zhou, J. (eds.) SecureComm 2010. LNICST, vol. 50, pp. 89\u2013106. Springer, Heidelberg (2010)"},{"key":"11_CR15","unstructured":"Feldman, A.J., Zeller, W.P., Freedman, M.J., Felten, E.W.: SPORC: group collaboration using untrusted cloud resources. In: 9th USENIX Symposium on Operating Systems Design and Implementation, pp. 337\u2013350 (2010)"},{"key":"11_CR16","doi-asserted-by":"crossref","unstructured":"Sang, C., Li, Q., Kong, L.: Tenant oriented lock concurrency control in the shared storage multi-tenant database. In: 16th IEEE International Enterprise Distributed Object Computing Conference Workshops (EDOC), pp. 179\u2013189 (2012)","DOI":"10.1109\/EDOCW.2012.32"},{"issue":"9","key":"11_CR17","doi-asserted-by":"publisher","first-page":"994","DOI":"10.1109\/TPDS.2002.1036072","volume":"13","author":"C Sun","year":"2002","unstructured":"Sun, C.: Optional and responsive fine-grain locking in internet-based collaborative systems. IEEE Trans. Parallel Distrib. Syst. 13(9), 994\u20131008 (2002)","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"key":"11_CR18","doi-asserted-by":"crossref","unstructured":"Fraser, N.: Differential synchronization. In: Proceedings of the 2009 ACM Symposium on Document Engineering, New York, USA, pp. 13\u201320 (2009)","DOI":"10.1145\/1600193.1600198"},{"key":"11_CR19","unstructured":"Fuzzy patch April 2009. http:\/\/neil.fraser.name\/writing\/patch\/"},{"issue":"2","key":"11_CR20","doi-asserted-by":"publisher","first-page":"251","DOI":"10.1007\/BF01840446","volume":"1","author":"EW Myers","year":"1986","unstructured":"Myers, E.W.: An O(ND) difference algorithm and its variations. Algorithmica 1(2), 251\u2013266 (1986)","journal-title":"Algorithmica"},{"key":"11_CR21","volume-title":"Concurrency Control and Recovery in Database Systems","author":"PA Bernstein","year":"1987","unstructured":"Bernstein, P.A., Hadzilacos, V., Goodman, N.: Concurrency Control and Recovery in Database Systems. Addison Wesley, Reading (1987)"},{"key":"11_CR22","doi-asserted-by":"crossref","unstructured":"Ressel, M., Nitsche-Ruhland, D., Gunzenh\u00e4user, R.: An integrating, transformation-oriented approach to concurrency control and undo in group editors. In: Proceedings of the ACM 1996 Conference on Computer Supported Cooperative Work (CSCW), pp. 288\u2013297 (1996)","DOI":"10.1145\/240080.240305"},{"key":"11_CR23","doi-asserted-by":"crossref","unstructured":"Ressel, M., Gunzenh\u00e4user, R.: Reducing the problems of group undo. In: Proceedings of the International ACM SIGGROUP Conference on Supporting Group Work, pp. 131\u2013139 (1999)","DOI":"10.1145\/320297.320312"},{"issue":"2","key":"11_CR24","doi-asserted-by":"publisher","first-page":"7","DOI":"10.1145\/637848.637852","volume":"10","author":"C Sun","year":"2003","unstructured":"Sun, C.: Undo as concurrent inverse in group editors. Interactions 10(2), 7\u20138 (2003)","journal-title":"Interactions"},{"key":"11_CR25","unstructured":"Schneier, B.: Fast software encryption. In: 7th International Workshop (FSE 2000), vol. 1978, pp. 182\u2013184 (1994)"},{"key":"11_CR26","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"307","DOI":"10.1007\/978-3-540-39887-5_23","volume-title":"Fast Software Encryption","author":"M Boesgaard","year":"2003","unstructured":"Boesgaard, M., Vesterager, M., Pedersen, T., Christiansen, J., Scavenius, O.: Rabbit: a new high-performance stream cipher. In: Johansson, T. (ed.) FSE 2003. LNCS, vol. 2887, pp. 307\u2013329. Springer, Heidelberg (2003)"},{"issue":"2","key":"11_CR27","first-page":"44","volume":"3","author":"A Mousa","year":"2006","unstructured":"Mousa, A., Hamad, A.: Evaluation of the RC4 algorithm for data encryption. IJCSA 3(2), 44\u201356 (2006)","journal-title":"IJCSA"},{"key":"11_CR28","doi-asserted-by":"crossref","unstructured":"Hoffman, P., Yergeau, F.: Utf-16, an encoding of iso 10646, Technical report RFC 2781, February 2000","DOI":"10.17487\/rfc2781"}],"container-title":["Lecture Notes in Computer Science","Applied Cryptography and Network Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-28166-7_11","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,1]],"date-time":"2022-06-01T05:35:49Z","timestamp":1654061749000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-28166-7_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319281650","9783319281667"],"references-count":28,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-28166-7_11","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]},"assertion":[{"value":"9 January 2016","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}