{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,29]],"date-time":"2025-04-29T23:10:02Z","timestamp":1745968202400,"version":"3.40.4"},"reference-count":26,"publisher":"Tech Science Press","issue":"1","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Intelligent Automation &amp; Soft Computing"],"published-print":{"date-parts":[[2011,1]]},"DOI":"10.1080\/10798587.2011.10643129","type":"journal-article","created":{"date-parts":[[2013,3,2]],"date-time":"2013-03-02T07:57:43Z","timestamp":1362211063000},"page":"1-11","source":"Crossref","is-referenced-by-count":2,"title":["Employing Object-Based Storage Devices to Embed File Access Control in Storage"],"prefix":"10.32604","volume":"17","author":[{"given":"Youhui","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Hongyi","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Dongsheng","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Weimin","family":"Zheng","sequence":"additional","affiliation":[]}],"member":"17807","reference":[{"doi-asserted-by":"crossref","unstructured":"G.A. Gibson,\u201cA Case for Network Attached Secure Disks.\u201d Technical Report CMU\u2013CS96\u2013142, Carnegie Mellon University, 1996.","key":"CIT0001","DOI":"10.21236\/ADA316798"},{"unstructured":"E. Shriver, \u201cA Formalization of the Attribute Mapping Problem.\u201d HP Labs Technical Reports, HPL\u20131999\u2013127.","key":"CIT0002"},{"unstructured":"Y. Lu, D. Du, and T. Ruwart, \u201cQoS Provisioning Framework for an OSD-Based Storage System.\u201d In Proceedings of 22nd IEEE\/13th NASA Goddard Conference on Mass Storage Systems and Technologies (MSST\u2019OS). California USA. pp. 28\u201335, 2005.","key":"CIT0005"},{"doi-asserted-by":"crossref","unstructured":"A.G. Pennington, J.D. Stunk, J.L. Griffm, C.A.N. Soules, G.R. Goodson, and G.R. Ganger. \u201cStorage based intrusion detection: Watching storage activity for suspicious behavior.\u201d In Proceedings of the 12th USENIX Security Symposium. Washington DC, USA. 2003.","key":"CIT0007","DOI":"10.21236\/ADA461142"},{"unstructured":"Wiki, http:\/\/en.wikipedia.org\/wiki\/Wiki.","key":"CIT0008"},{"unstructured":"Intel Corporation. \u201cIntel iSCSI Reference Implementation.\u201d Available at http:\/\/www.intel.com\/technology\/computing\/storage\/iscsi\/index.htm.","key":"CIT0009"},{"unstructured":"\u201cStorage Networking Solutions -Europe. Object Storage Architecture: Defming a new generation of storage systems built on distributed, intelligent storage devices.\u201d Technical Report, Available at www.snseurope.com\/features-full.php?id=2193. 2004.","key":"CIT0010"},{"unstructured":"J. Satran, \u201cObject-based Storage Device Commands\u201d. Availablt at http:\/\/www.tl0.org\/ftp\/t10\/drafts\/osd\/osd-r10.pdf, 2004.","key":"CIT0011"},{"doi-asserted-by":"crossref","unstructured":"C. Warrender, S. Forrest, and B. Pearlmutter, \u201cDetecting Intrusions Using System Calls: Alternative Data Models.\u201d In IEEE Symposium on Security and Privacy. California, USA. pp. 133\u2013145, 1999.","key":"CIT0013","DOI":"10.1109\/SECPRI.1999.766910"},{"unstructured":"J. Balthrop, F. Esponda, et al. \u201cCoverage and Generalization in an Artificial Immune System.\u201d In Proceedings of the Genetic and Evolutionary Computation Conference (GECCO 2002), Morgan Kauftnann. New York. pp. 3\u201310, 2002.","key":"CIT0014"},{"unstructured":"B. Cheswick and S. Bellovin, \u201cFirewalls and Internet Security: Repelling the Wily Hacker.\u201d Addison-Wesley Professional Press, 1994.","key":"CIT0015"},{"unstructured":"BroadWeb. http:\/\/www.broadweb.com\/.","key":"CIT0016"},{"doi-asserted-by":"crossref","unstructured":"M. Banikazemi, D. Poff, and B. Abali, \u201cStorage-based Intrusion Detection for Storage Area Networks (SANS)\u201d. In Proceedings of MSST 2005. California, USA. 2005.","key":"CIT0017","DOI":"10.1109\/MSST.2005.33"},{"unstructured":"G. John, P. Adam, S. Bucy, D. Choundappan, N. Muralidharan, and R. Ganger, R. \u201cOn the feasibility of intrusion detection inside workstation disks.\u201d CMU-PDL\u201303\u2013106. 2003.","key":"CIT0018"},{"unstructured":"M. Sivathanu and V. Prabhakaran, \u201cSemantically-Smart Disk Systems.\u201d In Proceedings of the Second USENIX Conference on File and Storage Technologies (FAST\u201903). San Francisco, CA. 2003.","key":"CIT0019"},{"doi-asserted-by":"crossref","unstructured":"Y. Zhang, and D. Wang, \u201cResearch on object-storage-based intrusion detection.\u201d In Proceedings of 12th International Conference on Parallel and Distributed Systems. Minneapolis, USA. 2006.","key":"CIT0020","DOI":"10.1109\/ICPADS.2006.92"},{"unstructured":"MediaWiki. http:\/\/www.mediawiki.org\/\/.","key":"CIT0021"},{"unstructured":"E.I. Organick, \u201cThe Multics System: An Examination of Its Structure.\u201d MIT Press, Cambridge, MA, USA, 1972.","key":"CIT0023"},{"unstructured":"H. Strack, \u201cExtended Access Control in UNIX System V\u2014ACLs and Context.\u201d In Workshop Proceedings on UNIX Security II, Portland, OR, USA, pp. 87\u2013101, 1990.","key":"CIT0025"},{"unstructured":"G. Fernandez and L. Allen, \u201cExtending the UNIX Protection Model with Access Control Lists.\u201d In Proceedings of USENIX, San Francisco, CA, USA, pp. 119\u2013132, 1988.","key":"CIT0026"},{"unstructured":"A. Berman, V. Bourassa, and E. Selberg, \u201cTRON: Process-specific file protection for the UNIX operating system.\u201d In Proceedings of the USENIX Winter 1995 Technical Conference, Louisiana, USA. pp. 165\u2013175, 1995.","key":"CIT0027"},{"doi-asserted-by":"crossref","unstructured":"S. Shigeta, T. Tanimori, K Shimizu, and H. Ashihara, \u201cA fine-grained protection mechanism in object-based operating systems.\u201d In Proceedings of the 5th International Workshop on Object Orientation in Operating Systems (IWOOOS\u201996). Washington, USA. 1996.","key":"CIT0028","DOI":"10.1109\/IWOOOS.1996.557911"},{"doi-asserted-by":"crossref","unstructured":"G.H. Kim and E.H. Spafford, \u201cThe design and implementation of Tripwire: A file system integrity checker.\u201d In Proceedings of the 2nd ACM Conference on Computer and Communications Security, Virginia USA. pp. 18\u201329, 1994.","key":"CIT0029","DOI":"10.1145\/191177.191183"},{"doi-asserted-by":"crossref","unstructured":"M. Factor, D. Nagle, D. Naor, E. Riedel, and J. Satran, \u201cThe OSD security protocol.\u201d In Proceedings of the 3rd International IEEE Security in Storage Workshop. California USA, 2005.","key":"CIT0030","DOI":"10.1109\/SISW.2005.12"},{"doi-asserted-by":"crossref","unstructured":"A.W. Leung and E.L. Miller, \u201cScalable security for large, high performance storage systems.\u201d In StorageSS\u201906: Proceedings of the second ACM workshop on Storage security and survivability, New York, NY, USA. ACM Press, pp. 290, 2006.","key":"CIT0031","DOI":"10.1145\/1179559.1179565"},{"doi-asserted-by":"crossref","unstructured":"M. Factor, D. Naor, E. Rom, J. Satran, and S. Tal, \u201cCapability based Secure Access Control to Networked Storage Devices.\u201d In Proceedings of the 24th IEEE Conference on Mass Storage Systems and Technologies, California, USA. 2007.","key":"CIT0032","DOI":"10.1109\/MSST.2007.4367968"}],"container-title":["Intelligent Automation &amp; Soft Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/autosoftjournal.net\/viewPaper.php?paper=10643129","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,29]],"date-time":"2025-04-29T22:50:18Z","timestamp":1745967018000},"score":1,"resource":{"primary":{"URL":"http:\/\/autosoftjournal.net\/paperShow.php?paper=10643129"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,1]]},"references-count":26,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2011,1]]}},"alternative-id":["10.1080\/10798587.2011.10643129"],"URL":"https:\/\/doi.org\/10.1080\/10798587.2011.10643129","relation":{},"ISSN":["1079-8587","2326-005X"],"issn-type":[{"type":"print","value":"1079-8587"},{"type":"electronic","value":"2326-005X"}],"subject":[],"published":{"date-parts":[[2011,1]]}}}