{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,29]],"date-time":"2025-09-29T08:20:35Z","timestamp":1759134035507,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":23,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642243950"},{"type":"electronic","value":"9783642243967"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-24396-7_36","type":"book-chapter","created":{"date-parts":[[2011,9,14]],"date-time":"2011-09-14T01:34:51Z","timestamp":1315964091000},"page":"449-462","source":"Crossref","is-referenced-by-count":9,"title":["A Security and High-Availability Layer for Cloud Storage"],"prefix":"10.1007","author":[{"given":"Maxim","family":"Schnjakin","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Rehab","family":"Alnemr","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Christoph","family":"Meinel","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"key":"36_CR1","doi-asserted-by":"crossref","unstructured":"Abu-Libdeh, H., Princehouse, L., Weatherspoon, H.: Racs: A case for cloud storage diversity. In: SoCC 2010 (June 2010)","DOI":"10.1145\/1807128.1807165"},{"key":"36_CR2","doi-asserted-by":"crossref","unstructured":"Alnemr, R., Meinel, C.: Enabling reputation interoperability through semantic technologies. In: ACM International Conference on Semantic Systems (2010)","DOI":"10.1145\/1839707.1839723"},{"key":"36_CR3","doi-asserted-by":"crossref","unstructured":"Alnemr, R., Bross, J., Meinel, C.: Constructing a context-aware service-oriented reputation model using attention allocation points. In: Proceedings of the IEEE International Conference on Service Computing (2009)","DOI":"10.1109\/SCC.2009.55"},{"key":"36_CR4","doi-asserted-by":"crossref","unstructured":"Alnemr, R., Meinel, C.: Getting more from reputation systems: A context-aware reputation framework based on trust centers and agent lists. In: International Multi-Conference on Computing in the Global Information Technology (2008)","DOI":"10.1109\/ICCGI.2008.45"},{"key":"36_CR5","unstructured":"Amazon. Amazon ec2 service level agreement. online (2009)"},{"key":"36_CR6","unstructured":"Armbrust, M., Fox, A., Griffith, R., Joseph, A.D., Katz, R., Konwinski, A., Lee, G., Patterson, D., Rabkin, A., Stoica, I., Zaharia, M.: Above the clouds: A berkeley view of cloud computing. Technical Report UCB\/EECS-2009, EECS Department, University of California, Berkeley (2009)"},{"key":"36_CR7","doi-asserted-by":"crossref","unstructured":"Bowers, K.D., Juels, A., Oprea, A.: Hail: A high-availability and integrity layer for cloud storage. In: CCS 2009 (November 2009)","DOI":"10.1145\/1653662.1653686"},{"key":"36_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"178","DOI":"10.1007\/978-3-642-01247-1_17","volume-title":"Service-Oriented Computing \u2013 ICSOC 2008 Workshops","author":"J. Broberg","year":"2009","unstructured":"Broberg, J., Buyya, R., Tari, Z.: Creating a \u2018Cloud storage\u2019 mashup for high performance, low cost content delivery. In: Feuerlicht, G., Lamersdorf, W. (eds.) ICSOC 2008. LNCS, vol.\u00a05472, pp. 178\u2013183. Springer, Heidelberg (2009)"},{"key":"36_CR9","unstructured":"Burt, J.: Future for cloud computing looks good, report says. online (2009)"},{"key":"36_CR10","doi-asserted-by":"crossref","unstructured":"Buyya, R., Yeo, C.S., Venugopal, S.: Market-oriented cloud computing: Vision, hype, and reality for delivering it services as computing utilities. In: Proceedings of the 10th IEEE International Conference on High Performance Computing and Communications (August 2008)","DOI":"10.1109\/HPCC.2008.172"},{"key":"36_CR11","volume-title":"The Big Switch","author":"N. Carr","year":"2008","unstructured":"Carr, N.: The Big Switch. Norton, New York (2008)"},{"key":"36_CR12","unstructured":"Chen, Y., Edler, J., Goldberg, A., Gottlieb, A., Sobti, S., Yianilos, P.: Prototype implementation of archival intermemory. In: IEEE ICDE (February 1996)"},{"key":"36_CR13","doi-asserted-by":"crossref","unstructured":"Dabek, F., Kaashoek, M.F., Karger, D., Morris, R., Stoica, I.: Wide-area cooperative storage with cfs. In: ACM SOSP (2001)","DOI":"10.1145\/502034.502054"},{"key":"36_CR14","doi-asserted-by":"crossref","unstructured":"Dingledine, R., Freedman, M., Molnar, D.: The freehaven project: Distributed anonymous storage service. In: The Workshop on Design Issues in Anonymity and Unobservability (July 2000)","DOI":"10.1007\/3-540-44702-4_5"},{"key":"36_CR15","unstructured":"Keller, A., Ludwig, H.: The wsla framework: Specifying and monitoring service level agreements for web services. Journal of Network and Systems Management (2004)"},{"key":"36_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"129","DOI":"10.1007\/3-540-48658-5_15","volume-title":"Advances in Cryptology - CRYPTO \u201994","author":"H. Krawczyk","year":"1994","unstructured":"Krawczyk, H.: LFSR-based hashing and authentication. In: Desmedt, Y.G. (ed.) CRYPTO 1994. LNCS, vol.\u00a0839, pp. 129\u2013139. Springer, Heidelberg (1994)"},{"key":"36_CR17","doi-asserted-by":"crossref","unstructured":"Patterson, D., Gibson, G., Katz, R.: The case for raid: Redundant arrays of inexpensive disks. In: ACM SIGMOD (1988)","DOI":"10.1145\/50202.50214"},{"key":"36_CR18","doi-asserted-by":"crossref","unstructured":"Rhea, S., Wells, C., Eaton, P., Geels, D., Zhao, B., Weatherspoon, H., Kubiatowicz, J.: Maintenance free global storage in oceanstore. In: IEEE Internet Computing (September 2001)","DOI":"10.1109\/4236.957894"},{"key":"36_CR19","unstructured":"Smedinghoff, T.: Information Security: The Emerging Standard for Corporate Compliance. IT Governance Pub. (2008)"},{"key":"36_CR20","unstructured":"The Amazon\u00a0S3 Team. Amazon s3 availability event: July 20, 2008. online (2008)"},{"key":"36_CR21","volume-title":"Cloud Computing: A Practical Approach","author":"A.T. Velte","year":"2009","unstructured":"Velte, A.T., Velte, T.J., Elsenpeter, R.: Cloud Computing: A Practical Approach. McGraw Hill, New York (2009)"},{"key":"36_CR22","doi-asserted-by":"crossref","unstructured":"Venugopal, S., Chu, X., Buyya, R.: A negotiation mechanism for advance resource reservation using the alternate offers protocol. In: Proceedings of the 16th Int. Workshop on Quality of Service, IWQoS (June 2008)","DOI":"10.1109\/IWQOS.2008.10"},{"key":"36_CR23","doi-asserted-by":"crossref","unstructured":"Weatherspoon, H., Kubiatowicz, J.: Erasure coding vs. replication: A quantitative comparison. In: IPTPS (March 2002)","DOI":"10.1007\/3-540-45748-8_31"}],"container-title":["Lecture Notes in Computer Science","Web Information Systems Engineering \u2013 WISE 2010 Workshops"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-24396-7_36","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,15]],"date-time":"2019-06-15T09:36:40Z","timestamp":1560591400000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-24396-7_36"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642243950","9783642243967"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-24396-7_36","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2011]]}}}