{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T03:46:40Z","timestamp":1742960800624,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":28,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642137075"},{"type":"electronic","value":"9783642137082"}],"license":[{"start":{"date-parts":[[2010,1,1]],"date-time":"2010-01-01T00:00:00Z","timestamp":1262304000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-13708-2_27","type":"book-chapter","created":{"date-parts":[[2010,6,23]],"date-time":"2010-06-23T07:56:06Z","timestamp":1277279766000},"page":"456-474","source":"Crossref","is-referenced-by-count":4,"title":["Regulatory Compliant Oblivious RAM"],"prefix":"10.1007","author":[{"given":"Bogdan","family":"Carbunar","sequence":"first","affiliation":[]},{"given":"Radu","family":"Sion","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"27_CR1","unstructured":"National Association of Insurance Commissioners. Graham-Leach-Bliley Act (1999), \n                    \n                      http:\/\/www.naic.org\/GLBA"},{"key":"27_CR2","unstructured":"U.S. Dept. of Health & Human Services. The Health Insurance Portability and Accountability Act (HIPAA) (1996), \n                    \n                      www.cms.gov\/hipaa"},{"key":"27_CR3","unstructured":"U.S. Public Law 107-347. The E-Government Act (2002)"},{"key":"27_CR4","unstructured":"U.S. Public Law No. 107-204, 116 Stat. 745. Public Company Accounting Reform and Investor Protection Act (2002)"},{"key":"27_CR5","unstructured":"The U.S. Securities and Exchange Commission. Rule 17a-3&4, 17 CFR Part 240: Electronic Storage of Broker-Dealer Records (2003), \n                    \n                      http:\/\/edocket.access.gpo.gov\/"},{"key":"27_CR6","unstructured":"The U.S. Department of Defense. Directive 5015.2: DOD Records Management Program (2002), \n                    \n                      http:\/\/www.dtic.mil\/whs\/directives\/corres\/pdf\/50152std_061902\/p50152s.p%df"},{"key":"27_CR7","unstructured":"The U.S. Department of Health and Human Services Food and Drug Administration. 21 CFR Part 11: Electronic Records and Signature Regulations (1997), \n                    \n                      http:\/\/www.fda.gov\/ora\/compliance_ref\/part11\/FRs\/background\/pt11finr.p%df"},{"key":"27_CR8","unstructured":"The U.S. Department of Education. 20 U.S.C. 1232g; 34 CFR Part 99:Family Educational Rights and Privacy Act (FERPA) (1974), \n                    \n                      http:\/\/www.ed.gov\/policy\/gen\/guid\/fpco\/ferpa"},{"key":"27_CR9","unstructured":"The Enterprise Storage Group. Compliance: The effect on information management and the storage industry (2003), \n                    \n                      http:\/\/www.enterprisestoragegroup.com\/"},{"key":"27_CR10","unstructured":"Enron email dataset, \n                    \n                      http:\/\/www.cs.cmu.edu\/enron\/"},{"key":"27_CR11","unstructured":"IBM Corp. IBM TotalStorage Enterprise (2007), \n                    \n                      http:\/\/www-03.ibm.com\/servers\/storage\/"},{"key":"27_CR12","unstructured":"HP. WORM Data Protection Solutions (2007), \n                    \n                      http:\/\/h18006.www1.hp.com\/products\/storageworks\/wormdps\/index.html"},{"key":"27_CR13","unstructured":"EMC. Centera Compliance Edition Plus (2007), \n                    \n                      http:\/\/www.emc.com\/centera\/\n                    \n                    \n                  , \n                    \n                      http:\/\/www.mosaictech.com\/pdf_docs\/emc\/centera.pdf"},{"key":"27_CR14","unstructured":"Hitachi Data Systems. The Message Archive for Compliance Solution, Data Retention Software Utility (2007), \n                    \n                      http:\/\/www.hds.com\/solutions\/data_life_cycle_archiving\/achievingregcomp%liance.html"},{"key":"27_CR15","unstructured":"Zantaz Inc. The ZANTAZ Digital Safe Product Family (2007), \n                    \n                      http:\/\/www.zantaz.com\/"},{"key":"27_CR16","unstructured":"StorageTek Inc. VolSafe secure tape-based write once read many (WORM) storage solution (2007), \n                    \n                      http:\/\/www.storagetek.com\/"},{"key":"27_CR17","unstructured":"Sun Microsystems. Sun StorageTek Compliance Archiving system and the Vignette Enterprise Content Management Suite (White Paper) (2007), \n                    \n                      http:\/\/www.sun.com\/storagetek\/white-papers\/Healthcare_Sun_NAS_Vignette_EHR_080806_Final.p%df"},{"key":"27_CR18","unstructured":"Sun Microsystems. Sun StorageTek Compliance Archiving Software (2007), \n                    \n                      http:\/\/www.sun.com\/storagetek\/management_software\/data_protection\/comp%liance_archiving\/"},{"key":"27_CR19","unstructured":"Network Appliance Inc. SnapLock Compliance and SnapLock Enterprise Software (2007), \n                    \n                      http:\/\/www.netapp.com\/products\/software\/snaplock.html"},{"key":"27_CR20","unstructured":"Quantum Inc. DLTSage Write Once Read Many Solution (2007), \n                    \n                      http:\/\/www.quantum.com\/Products\/TapeDrives\/DLT\/SDLT600\/DLTIce\/Index.aspx\n                    \n                    \n                  , \n                    \n                      http:\/\/www.quantum.com\/pdf\/DS00232.p%df"},{"key":"27_CR21","doi-asserted-by":"publisher","first-page":"431","DOI":"10.1145\/233551.233553","volume":"45","author":"O. Goldreich","year":"1996","unstructured":"Goldreich, O., Ostrovsky, R.: Software protection and simulation on oblivious ram. Journal of the ACM\u00a045, 431\u2013473 (1996)","journal-title":"Journal of the ACM"},{"key":"27_CR22","doi-asserted-by":"crossref","unstructured":"Williams, P., Sion, R., Carbunar, B.: Building Castles out of Mud: Practical Access Pattern Privacy and Correctness on Untrusted Storage. In: ACM Conference on Computer and Communication Security, CCS (2008)","DOI":"10.1145\/1455770.1455790"},{"key":"27_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"573","DOI":"10.1007\/978-3-540-72540-4_33","volume-title":"Advances in Cryptology - EUROCRYPT 2007","author":"J. Camenisch","year":"2007","unstructured":"Camenisch, J., Neven, G., Shelat, A.: Simulatable adaptive oblivious transfer. In: Naor, M. (ed.) EUROCRYPT 2007. LNCS, vol.\u00a04515, pp. 573\u2013590. Springer, Heidelberg (2007)"},{"key":"27_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-00468-1_28","volume-title":"Public Key Cryptography \u2013 PKC 2009","author":"S. Coull","year":"2009","unstructured":"Coull, S., Green, M., Hohenberger, S.: Controlling access to an oblivious database using stateful anonymous credentials. In: Jarecki, S., Tsudik, G. (eds.) Public Key Cryptography \u2013 PKC 2009. LNCS, vol.\u00a05443, Springer, Heidelberg (2009)"},{"key":"27_CR25","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511546891","volume-title":"Foundations of Cryptography I","author":"O. Goldreich","year":"2001","unstructured":"Goldreich, O.: Foundations of Cryptography I. Cambridge University Press, Cambridge (2001)"},{"key":"27_CR26","doi-asserted-by":"crossref","unstructured":"Goldwasser, S., Micali, S., Rackoff, C.: The knowledge complexity of interactive proof systems. SIAM J. Comput.\u00a018(1) (1989)","DOI":"10.1137\/0218012"},{"key":"27_CR27","doi-asserted-by":"crossref","unstructured":"Williams, P., Sion, R., Carbunar, B.: Building castles out of mud: practical access pattern privacy and correctness on untrusted storage. In: CCS \u201908: Proceedings of the 15th ACM conference on Computer and communications security (2008)","DOI":"10.1145\/1455770.1455790"},{"key":"27_CR28","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1007\/BFb0054851","volume-title":"Algorithmic Number Theory","author":"D. Boneh","year":"1998","unstructured":"Boneh, D.: The decision diffie-hellman problem. In: Buhler, J.P. (ed.) ANTS 1998. LNCS, vol.\u00a01423, pp. 48\u201363. Springer, Heidelberg (1998)"}],"container-title":["Lecture Notes in Computer Science","Applied Cryptography and Network Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-13708-2_27","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,19]],"date-time":"2019-05-19T15:09:52Z","timestamp":1558278592000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-13708-2_27"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642137075","9783642137082"],"references-count":28,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-13708-2_27","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2010]]}}}