{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,4]],"date-time":"2022-04-04T19:28:03Z","timestamp":1649100483915},"reference-count":15,"publisher":"Springer Science and Business Media LLC","issue":"7","license":[{"start":{"date-parts":[[2012,6,15]],"date-time":"2012-06-15T00:00:00Z","timestamp":1339718400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Datenschutz Datensich"],"published-print":{"date-parts":[[2012,7]]},"DOI":"10.1007\/s11623-012-0169-4","type":"journal-article","created":{"date-parts":[[2012,9,26]],"date-time":"2012-09-26T05:04:15Z","timestamp":1348635855000},"page":"510-514","source":"Crossref","is-referenced-by-count":0,"title":["Vollst\u00e4ndigkeitsnachweis f\u00fcr Daten im Cloud Computing"],"prefix":"10.1007","volume":"36","author":[{"given":"Daniel","family":"Slamanig","sequence":"first","affiliation":[]},{"given":"Christian","family":"Stingl","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2012,6,15]]},"reference":[{"key":"169_CR1","unstructured":"A. Ferdowsi. S3 data corruption? http:\/\/developer.amazonwebservices.com\/connect\/thread.jspa?threadID=22709&start=0&tstart=0 , 2008."},{"key":"169_CR2","unstructured":"Evidence Record Syntax, RFC 4998"},{"key":"169_CR3","unstructured":"Extensible Markup Language Evidence Record Syntax, RFC 6283"},{"key":"169_CR4","unstructured":"R. Brandner, U. Pordesch, A. Ro\u00dfnagel, J. Schachermayer: Langzeitsicherung digitaler Signaturen. DuD 2\/2002, S. 97\u2013103."},{"key":"169_CR5","doi-asserted-by":"crossref","unstructured":"S. Fischer-Dieskau, U. Korte, D. H\u00fchnlein: Die Technische Richtlinie zur vertrauensw\u00fcrdigen elektronischen Langzeitspeicherung (TR-VELS). DuD 11\/2009, S. 673\u2013677.","DOI":"10.1007\/s11623-009-0178-0"},{"key":"169_CR6","doi-asserted-by":"crossref","unstructured":"R. Merkle: Protocols for Public Key Cryptosystems, IEEE Symposium on Security and Privacy 1980.","DOI":"10.1109\/SP.1980.10006"},{"key":"169_CR7","doi-asserted-by":"crossref","unstructured":"G. Ateniese, R.D. Pietro, L.V. Mancini, G. Tsudik: Scalable and Efficient Provable Data Possession. SecureComm 2008.","DOI":"10.1145\/1460877.1460889"},{"key":"169_CR8","doi-asserted-by":"crossref","unstructured":"A. Juels, B. S. Kaliski Jr.: PORs: Proofs of Retrievability for Large Files. ACM CCS 2007, ACM.","DOI":"10.1145\/1315245.1315317"},{"key":"169_CR9","doi-asserted-by":"crossref","unstructured":"H. Shacham, B. Waters: Compact Proofs of Retrievability. ASIACRYPT 2008, Springer.","DOI":"10.1007\/978-3-540-89255-7_7"},{"key":"169_CR10","doi-asserted-by":"crossref","unstructured":"K. D. Bowers, A. Juels, A. Oprea: Proofs of retrievability: theory and implementation. CCSW 2009, ACM.","DOI":"10.1145\/1655008.1655015"},{"key":"169_CR11","doi-asserted-by":"crossref","unstructured":"G. Ateniese, et al.: Provable data possession at untrusted stores. ACM CCS 2007, ACM.","DOI":"10.1145\/1315245.1315318"},{"key":"169_CR12","doi-asserted-by":"crossref","unstructured":"R. Curtmola, O. Khan, R.C. Burns: Robust remote data checking. StorageSS 2008, ACM.","DOI":"10.1145\/1456469.1456481"},{"issue":"1","key":"169_CR13","doi-asserted-by":"publisher","first-page":"12","DOI":"10.1145\/1952982.1952994","volume":"14","author":"G. Ateniese","year":"2011","unstructured":"G. Ateniese, et al.: Remote data checking using provable data possession. ACM Trans. Inf. Syst. Secur. 14(1): 12 (2011).","journal-title":"ACM Trans. Inf. Syst. Secur."},{"key":"169_CR14","doi-asserted-by":"crossref","unstructured":"K.D. Bowers, A. Juels, A. Oprea: HAIL: a high-availability and integrity layer for cloud storage. CCS 2009, ACM.","DOI":"10.1145\/1653662.1653686"},{"key":"169_CR15","unstructured":"R.A. Popa, J.R. Lorch, D. Molnar, H.J. Wang, L. Zhuang: Enabling security in cloud storage SLAs with CloudProof. USENIXATC\u201911."}],"container-title":["Datenschutz und Datensicherheit - DuD"],"original-title":[],"language":"de","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-012-0169-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11623-012-0169-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-012-0169-4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-012-0169-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,7,4]],"date-time":"2019-07-04T06:16:44Z","timestamp":1562221004000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11623-012-0169-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,6,15]]},"references-count":15,"journal-issue":{"issue":"7","published-print":{"date-parts":[[2012,7]]}},"alternative-id":["169"],"URL":"https:\/\/doi.org\/10.1007\/s11623-012-0169-4","relation":{},"ISSN":["1614-0702","1862-2607"],"issn-type":[{"value":"1614-0702","type":"print"},{"value":"1862-2607","type":"electronic"}],"subject":[],"published":{"date-parts":[[2012,6,15]]}}}