{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T16:11:04Z","timestamp":1725725464513},"publisher-location":"Berlin, Heidelberg","reference-count":26,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642380266"},{"type":"electronic","value":"9783642380273"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-38027-3_10","type":"book-chapter","created":{"date-parts":[[2013,5,4]],"date-time":"2013-05-04T15:40:44Z","timestamp":1367682044000},"page":"91-102","source":"Crossref","is-referenced-by-count":7,"title":["Implementation of Cloud-RAID: A Secure and Reliable Storage above the Clouds"],"prefix":"10.1007","author":[{"given":"Maxim","family":"Schnjakin","sequence":"first","affiliation":[]},{"given":"Christoph","family":"Meinel","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"10_CR1","doi-asserted-by":"crossref","unstructured":"Abu-Libdeh, H., Princehouse, L., Weatherspoon, H.: Racs: A case for cloud storage diversity. In: SoCC 2010 (June 2010)","DOI":"10.1145\/1807128.1807165"},{"key":"10_CR2","doi-asserted-by":"crossref","unstructured":"Alnemr, R., Bross, J., Meinel, C.: Constructing a context-aware service-oriented reputation model using attention allocation points. In: Proceedings of the IEEE International Conference on Service Computing, SCC 2009 (2009)","DOI":"10.1109\/SCC.2009.55"},{"key":"10_CR3","doi-asserted-by":"crossref","unstructured":"Alnemr, R., Meinel, C.: Getting more from reputation systems: A context-aware reputation framework based on trust centers and agent lists. In: International Multi-Conference on Computing in the Global Information Technology (2008)","DOI":"10.1109\/ICCGI.2008.45"},{"key":"10_CR4","doi-asserted-by":"crossref","unstructured":"Alnemr, R., Schnjakin, M., Meinel, C.: Towards context-aware service-oriented semantic reputation framework. In: International Joint Conference of IEEE TrustCom\/IEEE ICESS\/FCST, pp. 362\u2013372 (2011)","DOI":"10.1109\/TrustCom.2011.47"},{"key":"10_CR5","unstructured":"Amazon. Amazon ec2 service level agreement (2009) (online)"},{"key":"10_CR6","unstructured":"Armbrust, M., Fox, A., Griffith, R., Joseph, A.D., Katz, R., Konwinski, A., Lee, G., Patterson, D., Rabkin, A., Stoica, I., Zaharia, M.: Above the clouds: A berkeley view of cloud computing. Technical Report UCB\/EECS-2009, EECS Department, University of California, Berkeley (2009)"},{"key":"10_CR7","doi-asserted-by":"crossref","unstructured":"Ateniese, G., Burns, R., Curtmola, R., Herring, J., Kissner, L., Peterson, Z., Song, D.: Provable data possession at untrusted stores. Cryptology ePrint Archive, Report 2007\/202 (2007)","DOI":"10.1145\/1315245.1315318"},{"key":"10_CR8","doi-asserted-by":"crossref","unstructured":"Bowers, K.D., Juels, A., Oprea, A.: Hail: A high-availability and integrity layer for cloud storage. In: CCS 2009 (November 2009)","DOI":"10.1145\/1653662.1653686"},{"key":"10_CR9","unstructured":"Burt, J.: Future for cloud computing looks good, report says (2009) (online)"},{"key":"10_CR10","doi-asserted-by":"crossref","unstructured":"Buyya, R., Yeo, C.S., Venugopal, S.: Market-oriented cloud computing: Vision, hype, and reality for delivering it services as computing utilities. In: Proceedings of the 10th IEEE International Conference on High Performance Computing and Communications (August 2008)","DOI":"10.1109\/HPCC.2008.172"},{"key":"10_CR11","unstructured":"Carr, N.: The Big Switch. Norton (2008)"},{"key":"10_CR12","doi-asserted-by":"crossref","unstructured":"Dabek, F., Kaashoek, M.F., Karger, D., Morris, R., Stoica, I.: Wide-area cooperative storage with cfs. In: ACM SOSP (October 2001)","DOI":"10.1145\/502051.502054"},{"key":"10_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"67","DOI":"10.1007\/3-540-44702-4_5","volume-title":"Anonymity 2000","author":"R. Dingledine","year":"2001","unstructured":"Dingledine, R., Freedman, M.J., Molnar, D.: The free haven project: Distributed anonymous storage service. In: Federrath, H. (ed.) Anonymity 2000. LNCS, vol.\u00a02009, pp. 67\u201395. Springer, Heidelberg (2001)"},{"key":"10_CR14","unstructured":"Gantz, J., Reinsel, D.: Extracting value from chaos (2009) (online)"},{"key":"10_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"129","DOI":"10.1007\/3-540-48658-5_15","volume-title":"Advances in Cryptology - CRYPTO \u201994","author":"H. Krawczyk","year":"1994","unstructured":"Krawczyk, H.: LFSR-based hashing and authentication. In: Desmedt, Y.G. (ed.) CRYPTO 1994. LNCS, vol.\u00a0839, pp. 129\u2013139. Springer, Heidelberg (1994)"},{"issue":"3","key":"10_CR16","doi-asserted-by":"publisher","first-page":"382","DOI":"10.1145\/357172.357176","volume":"4","author":"L. Lamport","year":"1982","unstructured":"Lamport, L., Shostak, R., Pease, M.: The byzantine generals problem. ACM Trans. Program. Lang. Syst.\u00a04(3), 382\u2013401 (1982)","journal-title":"ACM Trans. Program. Lang. Syst."},{"key":"10_CR17","unstructured":"Naone, E.: Are we safeguarding social data? (2009) (online)"},{"key":"10_CR18","unstructured":"Plank, J.S., Simmerman, S., Schuman, C.D.: Jerasure: A library in C\/C++ facilitating erasure coding for storage applications - Version 1.2. Technical Report CS-08-627, University of Tennessee (August 2008)"},{"key":"10_CR19","doi-asserted-by":"crossref","unstructured":"Rhea, S., Wells, C., Eaton, P., Geels, D., Zhao, B., Weatherspoon, H., Kubiatowicz, J.: Maintenance free global storage in oceanstore. IEEE Internet Computing (September 2001)","DOI":"10.1109\/4236.957894"},{"key":"10_CR20","unstructured":"Sarno, D.: Microsoft says lost sidekick data will be restored to users. Los Angeles Times (October 2009)"},{"key":"10_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"449","DOI":"10.1007\/978-3-642-24396-7_36","volume-title":"Web Information Systems Engineering \u2013 WISE 2010 Workshops","author":"M. Schnjakin","year":"2011","unstructured":"Schnjakin, M., Alnemr, R., Meinel, C.: A security and high-availability layer for cloud storage. In: Chiu, D.K.W., Bellatreche, L., Sasaki, H., Leung, H.-f., Cheung, S.-C., Hu, H., Shao, J. (eds.) WISE Workshops 2010. LNCS, vol.\u00a06724, pp. 449\u2013462. Springer, Heidelberg (2011)"},{"key":"10_CR22","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1145\/1871929.1871936","volume-title":"Proceedings of the Second International Workshop on Cloud Data Management, CloudDB 2010","author":"M. Schnjakin","year":"2010","unstructured":"Schnjakin, M., Alnemr, R., Meinel, C.: Contract-based cloud architecture. In: Proceedings of the Second International Workshop on Cloud Data Management, CloudDB 2010, pp. 33\u201340. ACM, New York (2010)"},{"key":"10_CR23","doi-asserted-by":"crossref","unstructured":"Schnjakin, M., Korsch, D., Schoenberg, M., Meinel, C.: Implementation of a secure and reliable storage above the untrusted clouds. In: Proceedings of 8th International Conference on Computer Science and Education, ICCSE 2013 (to appear in April 2013)","DOI":"10.1109\/ICCSE.2013.6553936"},{"key":"10_CR24","unstructured":"Schnjakin, M., Meinel, C.: Platform for a secure storage-infrastructure in the cloud. In: Proceedings of the 12th Deutscher IT-Sicherheitskongress, Sicherheit 2011 (2011)"},{"key":"10_CR25","unstructured":"The Amazon S3 Team. Amazon s3 availability event: July 20, 2008 (2008) (online)"},{"key":"10_CR26","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"328","DOI":"10.1007\/3-540-45748-8_31","volume-title":"Peer-to-Peer Systems","author":"H. Weatherspoon","year":"2002","unstructured":"Weatherspoon, H., Kubiatowicz, J.D.: Erasure coding vs. Replication: A quantitative comparison. In: Druschel, P., Kaashoek, M.F., Rowstron, A. (eds.) IPTPS 2002. LNCS, vol.\u00a02429, pp. 328\u2013337. Springer, Heidelberg (2002)"}],"container-title":["Lecture Notes in Computer Science","Grid and Pervasive Computing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-38027-3_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,12]],"date-time":"2019-05-12T21:31:33Z","timestamp":1557696693000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-38027-3_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642380266","9783642380273"],"references-count":26,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-38027-3_10","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2013]]}}}