{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T11:20:01Z","timestamp":1725621601084},"publisher-location":"Berlin, Heidelberg","reference-count":10,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642244025"},{"type":"electronic","value":"9783642244032"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-24403-2_11","type":"book-chapter","created":{"date-parts":[[2011,10,17]],"date-time":"2011-10-17T11:56:27Z","timestamp":1318852587000},"page":"135-145","source":"Crossref","is-referenced-by-count":1,"title":["A Way of Key Management in Cloud Storage Based on Trusted Computing"],"prefix":"10.1007","author":[{"given":"Xin","family":"Yang","sequence":"first","affiliation":[]},{"given":"Qingni","family":"Shen","sequence":"additional","affiliation":[]},{"given":"Yahui","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Sihan","family":"Qing","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"11_CR1","doi-asserted-by":"crossref","unstructured":"Kmara, S., Lauter, K.: Cryptographic Cloud Storage. In: Proceedings of Financial Cryptography: Workshop on Real-Life Cryptographic Protocols and Standardization 2010, pp. 111\u2013116 (January 2010)","DOI":"10.1007\/978-3-642-14992-4_13"},{"key":"11_CR2","unstructured":"Challener, D., Yoder, K.: A Practical Guide To Trusted Computing, pp. 17\u201318. IBM Press (2009)"},{"key":"11_CR3","first-page":"166","volume-title":"Trusted Computing Platforms","author":"B. Balacheff","year":"2009","unstructured":"Balacheff, B., Chen, L.: Trusted Computing Platforms, pp. 166\u2013167. Prentice Hall PTR, Englewood Cliffs (2009)"},{"key":"11_CR4","doi-asserted-by":"crossref","unstructured":"Wang, C., Wang, Q., Ren, K., Lou, W.: Ensuring data storage security in cloud computing. In: Proc. of IWQoS 2009, Charleston, South Carolina, USA (2009)","DOI":"10.1109\/IWQoS.2009.5201385"},{"key":"11_CR5","doi-asserted-by":"crossref","unstructured":"Ateniese, G., Di Pietro, R., Mancini, L.V., Tsudik, G.: Scalable and efficient provable data possession. In: Proc. of SecureComm. (2008)","DOI":"10.1145\/1460877.1460889"},{"key":"11_CR6","unstructured":"Stallings, W.: Cyptography and Network Security Principles and Practices, 4th edn., pp. 59\u201360 (2006)"},{"key":"11_CR7","doi-asserted-by":"crossref","unstructured":"Christodorescu, M., Sailer, R., Schales, D.L., Sgandurra, D., Zamboni, D.: Cloud Security is not (just) Virtualization Security. In: Proc. CCSW (2009)","DOI":"10.1145\/1655008.1655022"},{"key":"11_CR8","unstructured":"Dean, J., Ghemawat, S.: Mapreduce: Simplied data processing on large clusters. In: Proc. OSDI (2004)"},{"key":"11_CR9","doi-asserted-by":"crossref","unstructured":"Haeberlen, A., Kuznetsov, P., Druschel, P.: PeerReview:Practical Accountability for Distributed Systems. In: Proc. SOSP (2007)","DOI":"10.1145\/1294261.1294279"},{"key":"11_CR10","doi-asserted-by":"crossref","unstructured":"Jensen, M., Schwenk, J., Gruschka, N., Iacono, L.L.: On Technical Security Issues in Cloud Computing. In: Proc. CLOUD (2009)","DOI":"10.1109\/CLOUD.2009.60"}],"container-title":["Lecture Notes in Computer Science","Network and Parallel Computing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-24403-2_11.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,3]],"date-time":"2021-05-03T11:30:04Z","timestamp":1620041404000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-24403-2_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642244025","9783642244032"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-24403-2_11","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2011]]}}}