{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T07:18:00Z","timestamp":1725520680473},"publisher-location":"Berlin, Heidelberg","reference-count":31,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540881803"},{"type":"electronic","value":"9783540881810"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-88181-0_38","type":"book-chapter","created":{"date-parts":[[2008,10,20]],"date-time":"2008-10-20T11:31:09Z","timestamp":1224502269000},"page":"294-300","source":"Crossref","is-referenced-by-count":1,"title":["Random r-Continuous Matching Rule for Immune-Based Secure Storage System"],"prefix":"10.1007","author":[{"given":"Cai","family":"Tao","sequence":"first","affiliation":[]},{"given":"Ju","family":"ShiGuang","sequence":"additional","affiliation":[]},{"given":"Zhong","family":"Wei","sequence":"additional","affiliation":[]},{"given":"Niu","family":"DeJiao","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"doi-asserted-by":"crossref","unstructured":"Blaze, M.: A cryptographic file system for UNIX. In: Proceedings of 1st ACM Conference on Communications and Computing Security (1993)","key":"38_CR1","DOI":"10.1145\/168588.168590"},{"doi-asserted-by":"crossref","unstructured":"Howard, J., Kazar, M., Menees, S., Nichols, D., Satyanarayanan, M., Sidebotham, R., West, M.: Scale and performance in a distributed file system. ACM TOCS\u00a06(1) (February 1988)","key":"38_CR2","DOI":"10.1145\/35037.35059"},{"unstructured":"Fu, K., Kaashoek, M., Mazieres, D.: Fast and secure distributed read-only file system. OSDI (October 2000)","key":"38_CR3"},{"doi-asserted-by":"crossref","unstructured":"Mazieres, D., Kaminsky, M., Kaashoek, M., Witchel, E.: Separating key management from file system security. SOSP (December 1999)","key":"38_CR4","DOI":"10.1145\/319151.319160"},{"doi-asserted-by":"crossref","unstructured":"Li, X., Yang, J., Wu, Z.: An NFSv4-Based Security Scheme for NAS, Parallel and Distributed Processing and Applications, NanJiang, China (2005)","key":"38_CR5","DOI":"10.1007\/11576259_15"},{"doi-asserted-by":"crossref","unstructured":"Gobioff, H., Nagle, D., Gibson, G.: Embedded Security for Network-Attached Storage, CMU SCS technical report CMU-CS-99-154 (June 1999)","key":"38_CR6","DOI":"10.21236\/ADA367675"},{"unstructured":"John, D., Strunk, G.R., Goodson, M.L., Sheinholtz, C.A.N., Soules, G.R.: Self-Securing Storage: Protecting Data in Compromised Systems. In: 4th Symposium on Operating System Design and Implementation, San Diego, CA (October 2000)","key":"38_CR7"},{"doi-asserted-by":"crossref","unstructured":"Craig, A.N., Soules, G.R., Goodson, J.D., Strunk, G.R.: Metadata Efficiency in Versioning File Systems. In: 2nd USENIX Conference on File and Storage Technologies, San Francisco, CA, March 31-April 2 (2003)","key":"38_CR8","DOI":"10.21236\/ADA461077"},{"key":"38_CR9","volume-title":"Survivable information storage systems","author":"J. Wylie","year":"2000","unstructured":"Wylie, J., Bigrigg, M., Strunk, J., Ganger, G., Kiliccote, H., Khosla, P.: Survivable information storage systems. IEEE Computer, Los Alamitos (2000)"},{"key":"38_CR10","doi-asserted-by":"publisher","first-page":"184","DOI":"10.1109\/DISCEX.2001.932171","volume-title":"DARPA Information Survivability Conference and Exposition","author":"G.R. Ganger","year":"2001","unstructured":"Ganger, G.R., Khosla, P.K., Bakkaloglu, M., Bigrigg, M.W., Goodson, G.R., Oguz, S., Pandurangan, V., Soules, C.A.N., Strunk, J.D., Wylie, J.J.: Survivable Storage Systems. In: DARPA Information Survivability Conference and Exposition, Anaheim, CA, 12-14 June 2001, vol.\u00a02, pp. 184\u2013195. IEEE, Los Alamitos (2001)"},{"unstructured":"Kubiatowicz, J., Bindel, D., Chen, Y., Czerwinski, S., Eaton, P., Geels, D., Gummadi, R., Rhea, S., Weatherspoon, H., Weimer, W., Wells, C., Zhao, B.: OceanStore: An Architecture for Global-Scale Persistent Storage. In: ASPLOS (December 2000)","key":"38_CR11"},{"unstructured":"Freeman, W., Miller, E.: Design for a decentralized security system for network-attached storage. In: Proceedings of the 17th IEEE Symposium on Mass Storage Systems and Technologies, College Park, MD, pp. 361\u2013373 (March 2000)","key":"38_CR12"},{"key":"38_CR13","first-page":"34","volume-title":"Proceedings of the 20th IEEE international Performance, Computing and Communications Conference (IPCCC 2001)","author":"E.L. Miller","year":"2001","unstructured":"Miller, E.L., Long, D.D.E., Freeman, W., Reed, B.: Strong security for distributed file systems. In: Proceedings of the 20th IEEE international Performance, Computing and Communications Conference (IPCCC 2001), Phoenix, April 2001, pp. 34\u201340. IEEE, Los Alamitos (2001)"},{"unstructured":"Miller, E.L., Long, D.D.E., Freeman, W.E., Reed, B.C.: Strong Security for Network-Attached Storage. In: Proceedings of the 2002 Conference on File and Storage Technologies (FAST), January 2002, pp. 1\u201313 (2002)","key":"38_CR14"},{"key":"38_CR15","first-page":"29","volume-title":"Conference on File andStorage Technology (FAST 2003)","author":"M. Kallahalla","year":"2003","unstructured":"Kallahalla, M., Riedel, E., Swaminathan, R., Wang, Q., Fu, K.: PLUTUS: Scalable secure file sharing on untrusted storage. In: Conference on File andStorage Technology (FAST 2003), San Francisco, CA, 31 March - 2 April 2003, pp. 29\u201342. USENIX, Berkeley (2003)"},{"key":"38_CR16","first-page":"1223","volume":"7","author":"H. De-zhi","year":"2004","unstructured":"De-zhi, H., Xiang-lin, F., Jiang-zhong, H.: Study and Implementation of a iSCSI-Based Network Attached Storage Secure System. MINI-MICRO SYSTEMS\u00a07, 1223\u20131227 (2004)","journal-title":"MINI-MICRO SYSTEMS"},{"unstructured":"Goh, E.-J., Shacham, H., Modadugu, N., Boneh, D.: SiRiUS:Securing Remote Untrusted Storage. In: The proceedings of the Internet Society (ISOC) Network and Distributed Systems Security (NDSS) Symposium 2003(2003)","key":"38_CR17"},{"unstructured":"Azagury, A., Cabetti, R., Factor, M., Halevi, S., Henis, E., Naor, D., Rinetzky, N., Rodeh, O., Satran, J.: A Two Layered Approach for Secuting an Object Store Network. In: SISW 2002 (2002)","key":"38_CR18"},{"unstructured":"Hewlett-Packard Company. HP OpenView storage allocator (October 2001), www.openview.hp.com","key":"38_CR19"},{"unstructured":"Brocade Communications Systems, Inc. Advancing Security in Storage Area Networks. White Paper (June 2001)","key":"38_CR20"},{"unstructured":"Hewlett-Packard Company. HP SureStore E Secure Manager XP (March 2001), www.hp.com\/go\/storage","key":"38_CR21"},{"key":"38_CR22","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1007\/978-3-642-59901-9","volume-title":"Artificial immune systems and their applications","author":"D. Dasgupta","year":"1999","unstructured":"Dasgupta, D.: An overview of artificial immune systems and their applications. In: Dasgupta, D. (ed.) Artificial immune systems and their applications, pp. 3\u201323. Springer, Heidelberg (1999)"},{"key":"38_CR23","volume-title":"Artificial Immune Systems: A New Computational Approach","author":"L.N. Castro de","year":"2002","unstructured":"de Castro, L.N., Timmis, J.: Artificial Immune Systems: A New Computational Approach. Springer, London (2002)"},{"key":"38_CR24","first-page":"202","volume-title":"Proceedings IEEE Symposium on Research in Security and Privacy","author":"S. Forrest","year":"1994","unstructured":"Forrest, S., Perelson, A., Allen, L., Cherukuri, R.: Self-nonself discrimination in a computer. In: Proceedings IEEE Symposium on Research in Security and Privacy, Los Alamitos, CA, pp. 202\u2013212. IEEE Computer Society Press, Los Alamitos (1994)"},{"key":"38_CR25","first-page":"3","volume-title":"Proceedings of the Genetic and Evolutionary Computation Conference (GECCO)","author":"J. Balthrop","year":"2002","unstructured":"Balthrop, J., Esponda, F., Forrest, S., Glickman, M.: Coverage and generalization in an artificial immune system. In: Langdon, W.B., Cant\u00fa-Paz, E., Mathias, K., Roy, R., Davis, D., Poli, R., Balakrishnan, K., Honavar, V., Rudolph, G., Wegener, J., Bull, L., Potter, M.A., Schultz, A.C., Miller, J.F., Burke, E., Jonoska, N. (eds.) Proceedings of the Genetic and Evolutionary Computation Conference (GECCO), 9-13 July 2002, pp. 3\u201310. Morgan Kaufmann Publishers, San Francisco (2002)"},{"key":"38_CR26","doi-asserted-by":"publisher","first-page":"187","DOI":"10.1016\/0167-2789(86)90240-X","volume":"22","author":"J.D. Farmer","year":"1986","unstructured":"Farmer, J.D., Packard, N.H., Perelson, A.S.: The immune system, adaptation, and machine learning. Physica D\u00a022, 187\u2013204 (1986)","journal-title":"Physica D"},{"issue":"3","key":"38_CR27","doi-asserted-by":"publisher","first-page":"252","DOI":"10.1109\/TEVC.2002.1011540","volume":"6","author":"P. Harmer","year":"2002","unstructured":"Harmer, P., Williams, G., Gnusch, P.D., Lamont, G.: An Artificial Immune System Architecture for Computer Security Applications. IEEE Transactions on Evolutionary Computation\u00a06(3), 252\u2013280 (2002)","journal-title":"IEEE Transactions on Evolutionary Computation"},{"key":"38_CR28","first-page":"202","volume-title":"Proceeding of IEEE Symposium on Research in Security and Privacy","author":"S. Forrest","year":"1994","unstructured":"Forrest, S., Perelson, A.S., Allen, L., Cherukuri, R.: Self-Nonself Discrimination in a computer. In: Proceeding of IEEE Symposium on Research in Security and Privacy, pp. 202\u2013212. IEEE Computer Society Press, Los Alamitos (1994)"},{"unstructured":"Helman, P., Forrest, S.: An efficient algorithm for generating random antibody strings, Technical Report CS-94-07, The University of New Mexico, Albuquerque, NM (1994)","key":"38_CR29"},{"key":"38_CR30","doi-asserted-by":"crossref","first-page":"110","DOI":"10.1109\/SECPRI.1996.502674","volume-title":"Proceedings of the 1996 IEEE Symposium on Computer Security and Privacy","author":"P. D\u2019haeseleer","year":"1996","unstructured":"D\u2019haeseleer, P., Forrest, S., Helman, P.: An immunological approach to change detection: algorithms, analysis and implications. In: McHugh, J., Dinolt, G. (eds.) Proceedings of the 1996 IEEE Symposium on Computer Security and Privacy, USA, pp. 110\u2013119. IEEE Press, Los Alamitos (1996)"},{"unstructured":"D\u2019haeseleer, P.: Further efficient algorithms for generating antibody strings, Technical Report CS95-3, The University of New Mexico, Albuquerque, NM (1995)","key":"38_CR31"}],"container-title":["Advances in Soft Computing","Proceedings of the International Workshop on Computational Intelligence in Security for Information Systems CISIS\u201908"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-88181-0_38.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T11:57:09Z","timestamp":1619524629000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-88181-0_38"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540881803","9783540881810"],"references-count":31,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-88181-0_38","relation":{},"ISSN":["1867-5662","1860-0794"],"issn-type":[{"type":"print","value":"1867-5662"},{"type":"electronic","value":"1860-0794"}],"subject":[]}}