{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T16:42:41Z","timestamp":1725727361179},"publisher-location":"Berlin, Heidelberg","reference-count":17,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642388644"},{"type":"electronic","value":"9783642388651"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-38865-1_14","type":"book-chapter","created":{"date-parts":[[2013,5,27]],"date-time":"2013-05-27T01:42:02Z","timestamp":1369618922000},"page":"124-135","source":"Crossref","is-referenced-by-count":0,"title":["Quantitative Risk Analysis for Data Storage Systems"],"prefix":"10.1007","author":[{"given":"Tomasz","family":"Bilski","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"14_CR1","unstructured":"ISO\/IEC 27005 Information technology \u2013 Security techniques \u2013 Information security risk management. ISO\/IEC (2011)"},{"key":"14_CR2","unstructured":"ISO\/IEC 17799 Information Technology \u2013 Code of practice for information security management. ISO\/IEC (2005)"},{"key":"14_CR3","unstructured":"NIST Special Publication 800-30 (2011) \u2013 Guide for Conducting Risk Assessments. NIST (2011)"},{"key":"14_CR4","unstructured":"Cottrell, L., Matthews, W., Logg, C.: Tutorial on Internet Monitoring and PingER at SLAC. SLAC (2007), \n                  \n                    http:\/\/www.slac.stanford.edu\/comp\/net\/wanmon\/tutorial.html"},{"key":"14_CR5","doi-asserted-by":"crossref","unstructured":"Yaakobi, E., Grupp, L., Siegel, P.H., Swanson, S., Wolf, J.K.: Characterization and Error-Correcting Codes for TLC Flash Memories. In: International Conference on Computing, Networking & Communications, Maui Hawaii (February 2012), \n                  \n                    http:\/\/cseweb.ucsd.edu\/users\/swanson\/papers\/ICNC2012TLC.pdf","DOI":"10.1109\/ICCNC.2012.6167470"},{"key":"14_CR6","unstructured":"Blu-ray Disc Format A Physical Format Specifications for BD-RE, 3rd edn. Blu-ray Disc Association (October 2010), \n                  \n                    http:\/\/www.blu-raydisc.com\/Assets\/Downloadablefile\/BD-RE-physical-format-specifications-18325.pdf"},{"issue":"2","key":"14_CR7","doi-asserted-by":"publisher","first-page":"1073","DOI":"10.1109\/TMAG.2004.842013","volume":"41","author":"J. Huang","year":"2005","unstructured":"Huang, J., Lo, F.: Effect of reducing track pitch in DVD-ROM. IEEE Transactions on Magnetics\u00a041(2), 1073\u20131075 (2005)","journal-title":"IEEE Transactions on Magnetics"},{"key":"14_CR8","unstructured":"Cannon, D.: Data Deduplication and Tivoli Storage Manager. IBM Corporation 2009 (2009), \n                  \n                    http:\/\/www.ibm.com\/developerworks\/wikis\/download\/attachments\/106987789\/TSMDataDeduplication.pdf?version=1"},{"issue":"2","key":"14_CR9","doi-asserted-by":"publisher","first-page":"265","DOI":"10.1137\/1033051","volume":"33","author":"F.H. Mathis","year":"1991","unstructured":"Mathis, F.H.: A Generalized Birthday Problem. SIAM Review\u00a033(2), 265\u2013270 (1991)","journal-title":"SIAM Review"},{"key":"14_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"165","DOI":"10.1007\/3-540-46035-7_11","volume-title":"Advances in Cryptology - EUROCRYPT 2002","author":"J. Nakajima","year":"2002","unstructured":"Nakajima, J., Matsui, M.: Performance Analysis and Parallel Implementation of Dedicated Hash Functions. In: Knudsen, L.R. (ed.) EUROCRYPT 2002. LNCS, vol.\u00a02332, pp. 165\u2013180. Springer, Heidelberg (2002)"},{"key":"14_CR11","unstructured":"Bilski, T.: Storage media security. In: NATO Regional Conference on Military Communications and Information Systems 2001. Partnership for CIS Interoperability, Wojskowy Instytut Lacznosci, Zegrze (October 2001)"},{"key":"14_CR12","unstructured":"Schroeder, B., Gibson, G.: Disk failures in the real world: What does an MTTF of 1,000,000 hours mean to you? In: Proceedings of the Fifth Usenix Conference on File and Storage Technologies FAST (February 2007)"},{"key":"14_CR13","doi-asserted-by":"crossref","unstructured":"Sun, F., Zhang, S.: Does hard-disk drive failure rate enter steady-state after one year? In: Proceedings of the Annual Reliability and Maintainability Symposium. IEEE (January 2007)","DOI":"10.1109\/RAMS.2007.328138"},{"key":"14_CR14","unstructured":"Shah, S., Elerath, J.G.: Disk drive vintage and its effect on reliability. In: Proceedings of the Annual Reliability and Maintainability Symposium, pp. 163\u2013167 (January 2004)"},{"key":"14_CR15","doi-asserted-by":"crossref","unstructured":"Elerath, J.G., Pecht, M.: Enhanced reliability modeling of RAID storage systems. In: 37th Annual IEEE\/IFIP International Conference on Dependable Systems and Networks, Edinburgh, UK (June 2007)","DOI":"10.1109\/DSN.2007.41"},{"key":"14_CR16","series-title":"CCIS","doi-asserted-by":"publisher","first-page":"163","DOI":"10.1007\/978-3-642-13861-4_16","volume-title":"Computer Networks","author":"T. Bilski","year":"2010","unstructured":"Bilski, T.: QoS Predictability of Internet Services. In: Kwiecie\u0144, A., Gaj, P., Stera, P. (eds.) CN 2010. CCIS, vol.\u00a079, pp. 163\u2013172. Springer, Heidelberg (2010)"},{"key":"14_CR17","doi-asserted-by":"crossref","unstructured":"McCumber, J.: Assessing and Managing Security Risk in IT Systems. A Structured Methodology. Auerbach Publications (2004)","DOI":"10.1201\/9780203490426"}],"container-title":["Communications in Computer and Information Science","Computer Networks"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-38865-1_14","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,13]],"date-time":"2019-05-13T07:29:13Z","timestamp":1557732553000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-38865-1_14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642388644","9783642388651"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-38865-1_14","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2013]]}}}