{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T18:41:19Z","timestamp":1743014479612,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":32,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642226328"},{"type":"electronic","value":"9783642226335"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-22633-5_14","type":"book-chapter","created":{"date-parts":[[2011,8,23]],"date-time":"2011-08-23T21:20:32Z","timestamp":1314134432000},"page":"193-207","source":"Crossref","is-referenced-by-count":0,"title":["An Infrastructure for Long-Term Archiving of Authenticated and Sensitive Electronic Documents"],"prefix":"10.1007","author":[{"given":"Thiago Ac\u00f3rdi","family":"Ramos","sequence":"first","affiliation":[]},{"given":"Nelson","family":"da Silva","sequence":"additional","affiliation":[]},{"given":"Lau Cheuk","family":"Lung","sequence":"additional","affiliation":[]},{"given":"Jonathan Gehard","family":"Kohler","sequence":"additional","affiliation":[]},{"given":"Ricardo Felipe","family":"Cust\u00f3dio","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"14_CR1","doi-asserted-by":"crossref","unstructured":"Adya, A., Bolosky, W.J., Castro, M., Cermak, G., Chaiken, R., Douceur, J.R., Howell, J., Lorch, J.R., Theimer, M., Wattenhofer, R.P.: Farsite: Federated, Available, and Reliable Storage for an Incompletely Trusted Environment. Operating Systems Design and Implementation (2002)","DOI":"10.1145\/1060289.1060291"},{"key":"14_CR2","unstructured":"Beagrie, N., Jones, M.: Preservation Management of Digital Materials: The Handbook. Digital Preservation Coalition (2002)"},{"key":"14_CR3","doi-asserted-by":"crossref","unstructured":"Blazic, A.: Long Term Trusted Archive Services. In: First International Conference on the Digital Society (ICDS 2007), pp. 29\u201329 (2007)","DOI":"10.1109\/ICDS.2007.26"},{"key":"14_CR4","unstructured":"Borghoff, U., R\u00f6dig, P., Scheffczyk, J., Schmitz, L.: Long-term Preservation of Digital Documents: Principles and Practices (2006)"},{"key":"14_CR5","unstructured":"Brandner, R., Pordesch, U.: Long-term conservation of provability of electronically signed documents. Beitrag zu ISSE, pp. 2\u20135 (2002)"},{"key":"14_CR6","unstructured":"Brandner, R., Pordesch, U., Gondrom, T.: Evidence Record Syntax (ERS). Internet Engineering Task Force (IETF) Networking Group, Request for Comments 4998 (2007)"},{"key":"14_CR7","unstructured":"Desmedt, Y., Jajodia, S.: Redistributing Secret Shares to New Access Structures and its Applications (1997)"},{"key":"14_CR8","doi-asserted-by":"crossref","unstructured":"Druschel, P., Rowstron, A.: PAST: a Large-scale, Persistent Peer-to-Peer Storage Utility. In: Proceedings of the Eighth Workshop on Hot Topics in Operating Systems, 2001, pp. 75\u201380 (2001)","DOI":"10.1109\/HOTOS.2001.990064"},{"key":"14_CR9","unstructured":"European Telecommunications Standards Institute: Electronic Signatures and Infrastructures (ESI); CMS Advanced Electronic Signatures (CAdES) (November 2009)"},{"key":"14_CR10","unstructured":"European Telecommunications Standards Institute: Electronic Signatures and Infrastructures (ESI); XML Advanced Electronic Signatures (XAdES) (June 2009)"},{"key":"14_CR11","doi-asserted-by":"crossref","unstructured":"Feldman, P.: A Practical Scheme for Non-Interactive Verifiable Secret Sharing. In: 28th Annual Symposium on Foundations of Computer Science (sfcs 1987), pp. 427\u2013438 (October 1987)","DOI":"10.1109\/SFCS.1987.4"},{"key":"14_CR12","doi-asserted-by":"crossref","unstructured":"Gupta, V.H., Gopinath, K.: G $_{its}^{2}$ VSR: An Information Theoretical Secure Verifiable Secret Redistribution Protocol for Long-Term Archival Storage. In: Fourth International IEEE Security in Storage Workshop, pp. 22\u201333 (2007)","DOI":"10.1109\/SISW.2007.4389742"},{"key":"14_CR13","doi-asserted-by":"publisher","DOI":"10.1109\/ARES.2006.26","volume-title":"An Extended Verifiable Secret Redistribution Protocol for Archival Systems","author":"V. Gupta","year":"2006","unstructured":"Gupta, V., Gopinath, K.: An Extended Verifiable Secret Redistribution Protocol for Archival Systems. IEEE, Los Alamitos (2006)"},{"issue":"2","key":"14_CR14","doi-asserted-by":"publisher","first-page":"99","DOI":"10.1007\/BF00196791","volume":"3","author":"S. Haber","year":"1991","unstructured":"Haber, S., Stornetta, W.: How to Time-Stamp a Digital Document. Journal of Cryptology\u00a03(2), 99\u2013111 (1991)","journal-title":"Journal of Cryptology"},{"key":"14_CR15","unstructured":"Haeberlen, A., Mislove, A., Druschel, P.: Glacier: Highly Durable, Decentralized Storage Despite Massive Correlated Failures. In: Proceedings of the 2nd Conference on Symposium on Networked Systems Design & Implementation, vol. 2 (2005)"},{"key":"14_CR16","doi-asserted-by":"crossref","unstructured":"Herzberg, A., Krawczyk, H., Yung, M.: Proactive Secret Sharing Or: How to Cope With Perpetual Leakage. IBM TJ. Watson Research Center, 1\u201322 (1995)","DOI":"10.1007\/3-540-44750-4_27"},{"key":"14_CR17","doi-asserted-by":"crossref","unstructured":"Huhnlein, D., Korte, U., Langer, L., Wiesmaier, A.: A Comprehensive Reference Architecture for Trustworthy Long-Term Archiving of Sensitive Data. In: 2009 3rd International Conference on New Technologies, Mobility and Security, pp. 1\u20135 (December 2009)","DOI":"10.1109\/NTMS.2009.5384830"},{"key":"14_CR18","unstructured":"ISO: ISO\/IEC 14721:2003: Space Data and Information Transfer Systems \u2014 Open Archival Information System \u2014 Reference Model. International Standardization Organization, Geneva, Switzerland (2003)"},{"key":"14_CR19","unstructured":"Kotla, R., Alvisi, L., Dahlin, M.: SafeStore: a Durable and Practical Storage System. In: 2007 USENIX Annual Technical Conference on Proceedings of the USENIX Annual Technical Conference (2007)"},{"key":"14_CR20","doi-asserted-by":"crossref","unstructured":"Kubiatowicz, J., Bindel, D., Chen, Y., Czerwinski, S., Eaton, P., Geels, D., Gummadi, R., Rhea, S., Weatherspoon, H., Weimer, W., Wells, C., Zhao, B.: OceanStore: an Architecture for Global-Scale Persistent Storage. ACM SIGPLAN Notices 35(11) (2000)","DOI":"10.1145\/356989.357007"},{"key":"14_CR21","doi-asserted-by":"crossref","unstructured":"Merkle, R.C.: Protocols for public key cryptosystems. In: IEEE Symposium on Security and Privacy, vol. 0, p. 122 (1980)","DOI":"10.1109\/SP.1980.10006"},{"issue":"6","key":"14_CR22","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1002\/scj.20388","volume":"37","author":"T. Miyamoto","year":"2006","unstructured":"Miyamoto, T., Doi, S., Nogawa, H., Kumagai, S.: Autonomous Distributed Secret Sharing Storage System. Systems and Computers in Japan\u00a037(6), 55\u201363 (2006)","journal-title":"Systems and Computers in Japan"},{"key":"14_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"308","DOI":"10.1007\/978-3-540-30564-4_22","volume-title":"Selected Areas in Cryptography","author":"V. Nikov","year":"2004","unstructured":"Nikov, V., Nikova, S.: On proactive secret sharing schemes. In: Handschuh, H., Hasan, M.A. (eds.) SAC 2004. LNCS, vol.\u00a03357, pp. 308\u2013325. Springer, Heidelberg (2004)"},{"key":"14_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"129","DOI":"10.1007\/3-540-46766-1_9","volume-title":"Advances in Cryptology - CRYPTO \u201991","author":"T.P. Pedersen","year":"1992","unstructured":"Pedersen, T.P.: Non-interactive and Information-Theoretic Secure Verifiable Secret Sharing. In: Feigenbaum, J. (ed.) CRYPTO 1991. LNCS, vol.\u00a0576, pp. 129\u2013140. Springer, Heidelberg (1992)"},{"key":"14_CR25","doi-asserted-by":"crossref","unstructured":"Pinkas, D., Pope, N., Ross, J.: CMS Advanced Electronic Signatures (CAdES). Internet Engineering Task Force (IETF) Networking Group, Request for Comments 5126 (2008)","DOI":"10.17487\/rfc5126"},{"key":"14_CR26","doi-asserted-by":"crossref","unstructured":"Pinkas, D., Ross, J., Pope, N.: Electronic Signature Formats for Long Term Electronic Signatures. Internet Engineering Task Force (IETF) Networking Group, Request for Comments 3126 (2001)","DOI":"10.17487\/rfc3126"},{"issue":"11","key":"14_CR27","doi-asserted-by":"publisher","first-page":"612","DOI":"10.1145\/359168.359176","volume":"22","author":"A. Shamir","year":"1979","unstructured":"Shamir, A.: How to Share a Secret. Communications of the ACM\u00a022(11), 612\u2013613 (1979)","journal-title":"Communications of the ACM"},{"issue":"2","key":"14_CR28","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1534912.1534914","volume":"5","author":"M.W. Storer","year":"2009","unstructured":"Storer, M.W., Greenan, K.M., Miller, E.L., Voruganti, K.: POTSHARDS\u2014a secure, recoverable, long-term archival storage system. ACM Transactions on Storage\u00a05(2), 1\u201335 (2009)","journal-title":"ACM Transactions on Storage"},{"key":"14_CR29","doi-asserted-by":"crossref","unstructured":"Wallace, C., Pordesch, U., Brandner, R.: Long-term Archive Service Requirements. Internet Engineering Task Force (IETF) Networking Group, Request for Comments 4810 (2007)","DOI":"10.17487\/rfc4810"},{"key":"14_CR30","doi-asserted-by":"publisher","DOI":"10.1109\/EDOCW.2006.8","volume-title":"A Key-Recovery System for Long-term Encrypted Documents","author":"E. Wang","year":"2006","unstructured":"Wang, E., Yau, J., Hui, L., Jiang, Z., Yiu, S.: A Key-Recovery System for Long-term Encrypted Documents. IEEE, Los Alamitos (2006)"},{"key":"14_CR31","unstructured":"Wong, T., Wing, J.: Verifiable Secret Redistribution for Archive Systems. In: Proceedings of First International IEEE Security in Storage Workshop, 2002, pp. 94\u2013105 (December 2002)"},{"issue":"4","key":"14_CR32","doi-asserted-by":"publisher","first-page":"2633","DOI":"10.1109\/MITP.2008.82","volume":"10","author":"W. Zimmer","year":"2008","unstructured":"Zimmer, W., Langkabel, T., Hentrich, C.: ArchiSafe: Legally Compliant Electronic Storage. IT Professional\u00a010(4), 2633 (2008)","journal-title":"IT Professional"}],"container-title":["Lecture Notes in Computer Science","Public Key Infrastructures, Services and Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-22633-5_14","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,14]],"date-time":"2019-06-14T05:29:53Z","timestamp":1560490193000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-22633-5_14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642226328","9783642226335"],"references-count":32,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-22633-5_14","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2011]]}}}