{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T18:47:14Z","timestamp":1725562034241},"reference-count":19,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008,7]]},"DOI":"10.1109\/cit.2008.4594711","type":"proceedings-article","created":{"date-parts":[[2008,8,13]],"date-time":"2008-08-13T18:40:13Z","timestamp":1218652813000},"page":"414-419","source":"Crossref","is-referenced-by-count":0,"title":["Data privacy and integrity appropriate for disk protection"],"prefix":"10.1109","author":[{"family":"Fangyong Hou","sequence":"first","affiliation":[]},{"family":"Dawu Gu","sequence":"additional","affiliation":[]},{"family":"Nong Xiao","sequence":"additional","affiliation":[]},{"family":"Yuhua Tang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"HP Labs Tools and traces","year":"0","key":"19"},{"journal-title":"Flash quality","year":"0","key":"17"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1145\/35037.35059"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/MASCOTS.2007.57"},{"year":"0","key":"16"},{"year":"0","key":"13"},{"journal-title":"Hybrid HDD","year":"0","key":"14"},{"year":"0","key":"11"},{"year":"0","key":"12"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA.2003.1183547"},{"key":"2","first-page":"122","article-title":"protocols for public key cryptography","author":"merkle","year":"1980","journal-title":"IEEE Symposium on Security and Privacy"},{"article-title":"hardware mechanisms for memory integrity checking","year":"2003","author":"suh","key":"1"},{"year":"0","key":"10"},{"journal-title":"Fast and secure distributed read-only file system","year":"2000","author":"fu","key":"7"},{"year":"0","key":"6"},{"journal-title":"Tripwire","year":"0","key":"5"},{"article-title":"cryptfs: a stackable vnode level encryption file system","year":"1998","author":"zadok","key":"4"},{"key":"9","first-page":"79","article-title":"unifying file system protection","author":"stein","year":"2001","journal-title":"2001 USENIX Annual Technical Conference"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/HOTOS.2001.990070"}],"event":{"name":"2008 8th IEEE International Conference on Computer and Information Technology (CIT)","start":{"date-parts":[[2008,7,8]]},"location":"Sydney, Australia","end":{"date-parts":[[2008,7,11]]}},"container-title":["2008 8th IEEE International Conference on Computer and Information Technology"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4586225\/4594630\/04594711.pdf?arnumber=4594711","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,16]],"date-time":"2017-03-16T11:40:47Z","timestamp":1489664447000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/4594711\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,7]]},"references-count":19,"URL":"https:\/\/doi.org\/10.1109\/cit.2008.4594711","relation":{},"subject":[],"published":{"date-parts":[[2008,7]]}}}