{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T23:56:09Z","timestamp":1725494169468},"publisher-location":"Berlin, Heidelberg","reference-count":21,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540768364"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-76837-1_60","type":"book-chapter","created":{"date-parts":[[2007,11,6]],"date-time":"2007-11-06T10:25:50Z","timestamp":1194344750000},"page":"551-559","source":"Crossref","is-referenced-by-count":0,"title":["The Security Threats and Corresponding Measures to Distributed Storage Systems"],"prefix":"10.1007","author":[{"given":"Lanxiang","family":"Chen","sequence":"first","affiliation":[]},{"given":"Dan","family":"Feng","sequence":"additional","affiliation":[]},{"given":"Liang","family":"Ming","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"60_CR1","unstructured":"Gordon, L.A., Loeb, M.P., Lucyshyn, W., Richardson, R.: Computer Crime and Security Survey. Compute Security Institute (2006)"},{"key":"60_CR2","doi-asserted-by":"crossref","unstructured":"Hasan, R., Myagmar, S., Lee, A.J., Yurcik, W.: Toward a Threat Model for Storage Systems. StorageSS (2005)","DOI":"10.1145\/1103780.1103795"},{"key":"60_CR3","unstructured":"Myagmar, S., Lee, A.J., Yurcik, W.: Threat Modeling as a Basis for Security Requirements (SREIS). In: Symposium on Requirements Engineering for Information Security (2005)"},{"key":"60_CR4","unstructured":"Myagmar, S.: Threat Modeling Networked and Data-Centric Systems. University of Illinois at Urbana-Champaign, Department of Computer Science M.S. Thesis, August (2005)"},{"key":"60_CR5","unstructured":"Hibbard, E.A., Budnik, L., Austin, R.: Introduction to Storage Security A SNIA Security White Paper. White Paper (October 14, 2005)"},{"key":"60_CR6","unstructured":"Edmonds, A.: Towards Securing Information End-to-End: Networked Storage Security Update and Best Practices. White Paper (February 2003)"},{"key":"60_CR7","unstructured":"Gruener, J., Kovar, M.: The Emerging Storage Security Challenge. Yankee Group Report (September 2003)"},{"key":"60_CR8","unstructured":"The 451 Group, Storage Security Market: Emerging Opportunities, Unseen Threats. (May 2003)"},{"key":"60_CR9","unstructured":"Swiderski, F., Snyder, W.: Threat Modeling. Microsoft Press (2004)"},{"issue":"2","key":"60_CR10","doi-asserted-by":"publisher","first-page":"145","DOI":"10.1145\/176979.176981","volume":"26","author":"P.M. Chen","year":"1994","unstructured":"Chen, P.M., Lee, E.K., Gibson, G.A., Katz, R.H., Patterson, D.A.: RAID: High-performance, reliable secondary storage. ACM Computing Surveys\u00a026(2), 145\u2013185 (1994)","journal-title":"ACM Computing Surveys"},{"key":"60_CR11","unstructured":"Chervenak, A., Vellanki, V., Kurmas, Z.: Protecting file systems: A survey of backup techniques (1998)"},{"key":"60_CR12","unstructured":"Zhu, N., Chiueh, T.: Design, implementation, and evaluation of repairable file service. In: Proceedings of Dependable Systems and Networks (DSN) (2003)"},{"key":"60_CR13","unstructured":"National Institute of Standards and Technology, Data Encryption Standard (DES), FIPS Publication 46-3 (October 1999)"},{"key":"60_CR14","unstructured":"National Institute of Standards and Technology (NIST).Federal Information Processing Standards Publication 197 (FIPS PUB 197): Specification for the Advanced Encryption Standard (AES) (November 2001)"},{"key":"60_CR15","unstructured":"Information technology - SCSI Object-Based Storage Device Commands -2 (OSD-2). T10 Working Draft, (October 2004), \n                    \n                      http:\/\/www.t10.org\/ftp\/t10\/drafts\/osd2\/osd2r00.pdf"},{"key":"60_CR16","unstructured":"Du, D., He, D., Hong, C., Jeong, J., Kher, V., Kim, Y., Lu, Y., Raghuveer, A., Sharafkandi, S.: Experiences in Building an Object-Based Storage System based on the OSD T-10 Standard. In: MSST 2006. Proceedings of the 23nd IEEE \/ 14th NASA Goddard Conference on Mass Storage Systems and Technologies, College Park, MD (May 2006)"},{"key":"60_CR17","unstructured":"Weil, S.A., Brandt, S.A., Miller, E.L., Long, D.D.E., Maltzahn, C., Ceph, A.: scalable, high-performance distributed file system. In: Proceedings of the 7th Symposium on Operating Systems Design and Implementation (OSDI). Seattle, WA (November 2006)"},{"key":"60_CR18","unstructured":"Information technology - Fibre Channel Security Protocol. T10 Working Draft (February 2006), \n                    \n                      http:\/\/www.t11.org\/ftp\/t11\/pub\/fc\/sp\/06-157v0.pdf"},{"key":"60_CR19","unstructured":"Storage Network Industry Association (SNIA) - SNIA Storage Management Initiative Specification (SMI-S) (December 23, 2003)"},{"key":"60_CR20","unstructured":"IEEE, Draft proposal for tweakable wide-block encryption (May 2007), \n                    \n                      http:\/\/ieee-p1619.wetpaint.com\/?t=anon"},{"key":"60_CR21","unstructured":"Chirillo, J., Blaul, S.: Storage Security: Protecting, SANs, NAS and DAS. Wiley (2002)"}],"container-title":["Lecture Notes in Computer Science","Advanced Parallel Processing Technologies"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-76837-1_60.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T10:41:09Z","timestamp":1619520069000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-76837-1_60"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540768364"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-76837-1_60","relation":{},"subject":[]}}