{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,31]],"date-time":"2025-08-31T10:01:41Z","timestamp":1756634501031,"version":"3.28.0"},"reference-count":38,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,12]]},"DOI":"10.1109\/bigdata.2018.8622116","type":"proceedings-article","created":{"date-parts":[[2019,1,24]],"date-time":"2019-01-24T22:07:18Z","timestamp":1548367638000},"page":"4227-4236","source":"Crossref","is-referenced-by-count":14,"title":["A Low-Overhead Integrity Verification for Big Data Transfers"],"prefix":"10.1109","author":[{"given":"Engin","family":"Arslan","sequence":"first","affiliation":[]},{"given":"Ahmed","family":"Alhussen","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref38","first-page":"12","article-title":"Cross-geography scientific data transfer trends and user behavior patterns","volume":"18","author":"liu","year":"2018","journal-title":"27th ACM Symposium on High-Performance Parallel and Distributed Computing ser HPDC '18"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/2465848.2465855"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/PDSW-DISCS.2016.014"},{"key":"ref31","article-title":"A white paper on the benefits of chipkill-correct ECC for PC server main memory","volume":"11","author":"dell","year":"1997","journal-title":"IBM Microelectronics Division"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2015.57"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1145\/2807591.2807628"},{"key":"ref36","doi-asserted-by":"crossref","first-page":"89","DOI":"10.1016\/j.jpdc.2018.05.003","article-title":"Big data transfer optimization through adaptive parameter tuning","volume":"120","author":"arslan","year":"2018","journal-title":"Journal of Parallel and Distributed Computing"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2018.2790948"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2004.1281599"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/CCGrid.2014.114"},{"year":"0","key":"ref11","article-title":"Dark Energy Survey"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.newast.2015.06.003"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/347057.347561"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2018.05.051"},{"year":"0","key":"ref15","article-title":"Globus"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/BigData.2016.7840953"},{"year":"0","key":"ref17","article-title":"TCP Congestion Control"},{"key":"ref18","doi-asserted-by":"crossref","first-page":"598","DOI":"10.1145\/1315245.1315318","article-title":"Provable data possession at untrusted stores","author":"ateniese","year":"2007","journal-title":"Proceedings of the 14th ACM Conference on Computer and Communications Security ACM"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2012.66"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1147\/rd.282.0124"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1006\/jmbi.1990.9999"},{"key":"ref27","first-page":"1","article-title":"The Case of the Fake Picasso: Preventing History Forgery with Secure Provenance","volume":"9","author":"hasan","year":"2009","journal-title":"FAST"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1175\/1520-0442(1998)011<1131:TNCFAR>2.0.CO;2"},{"year":"0","key":"ref6","article-title":"A Toroidal LHC ApparatuS Project (ATLAS)"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA.2005.29"},{"year":"0","key":"ref5","article-title":"The US Compact Muon Solenoid Project"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/SC.2016.24"},{"key":"ref7","first-page":"725","article-title":"Dynamic Protocol Tuning Algorithms for High Performance Data Transfers","author":"arslan","year":"2013","journal-title":"Proceedings of Euro-Par&#x2019;13 ser Euro-Par&#x2019;13 Springer-Verlag"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.hazards.2004.02.001"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TCC.2015.2415804"},{"article-title":"The Future of Data Center Wide-Area Networking","year":"0","author":"research","key":"ref1"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2014.08.007"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2014.12.004"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/1047915.1047917"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/MSST.2013.6558423"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/2560011"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2017.2776221"},{"key":"ref25","first-page":"29","article-title":"End-to-end data integrity for file systems: A ZFS case study","author":"zhang","year":"2010","journal-title":"FAST"}],"event":{"name":"2018 IEEE International Conference on Big Data (Big Data)","start":{"date-parts":[[2018,12,10]]},"location":"Seattle, WA, USA","end":{"date-parts":[[2018,12,13]]}},"container-title":["2018 IEEE International Conference on Big Data (Big Data)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8610059\/8621858\/08622116.pdf?arnumber=8622116","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,26]],"date-time":"2022-01-26T18:51:58Z","timestamp":1643223118000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8622116\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,12]]},"references-count":38,"URL":"https:\/\/doi.org\/10.1109\/bigdata.2018.8622116","relation":{},"subject":[],"published":{"date-parts":[[2018,12]]}}}