{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,11]],"date-time":"2026-02-11T18:00:12Z","timestamp":1770832812193,"version":"3.50.1"},"reference-count":24,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,10]]},"DOI":"10.1109\/cns.2016.7860544","type":"proceedings-article","created":{"date-parts":[[2017,2,23]],"date-time":"2017-02-23T19:32:43Z","timestamp":1487878363000},"page":"525-533","source":"Crossref","is-referenced-by-count":7,"title":["EncFS goes multi-user: Adding access control to an encrypted file system"],"prefix":"10.1109","author":[{"given":"Dominik","family":"Leibenger","sequence":"first","affiliation":[]},{"given":"Jonas","family":"Fortmann","sequence":"additional","affiliation":[]},{"given":"Christoph","family":"Sorge","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","article-title":"encfs\/DESIGN.md","author":"gough","year":"2015"},{"key":"ref11","article-title":"EncFS Security Audit","author":"hornby","year":"2014","journal-title":"Tech Rep"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/11761679_23"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.17487\/rfc2104"},{"key":"ref14","year":"0"},{"key":"ref15","article-title":"Encfs presentation","author":"gough","year":"2005","journal-title":"Libre Software Meeting"},{"key":"ref16","article-title":"inotify - monitoring filesystem events","year":"0"},{"key":"ref17","article-title":"SiRiUS: Securing remote untrusted storage","author":"goh","year":"2003","journal-title":"Proc NDSS"},{"key":"ref18","first-page":"29","article-title":"Plutus: Scalable secure file sharing on untrusted storage","author":"kallahalla","year":"2003","journal-title":"Proc USENIX FAST"},{"key":"ref19","article-title":"Key regression: Enabling efficient key distribution for secure distributed storage","author":"fu","year":"2006","journal-title":"Proc NDSS"},{"key":"ref4","year":"0"},{"key":"ref3","year":"0"},{"key":"ref6","article-title":"The rsync algorithm","author":"tridgell","year":"1996"},{"key":"ref5","year":"0"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.17487\/rfc2898"},{"key":"ref7","year":"0"},{"key":"ref2","year":"0"},{"key":"ref1","year":"0"},{"key":"ref9","author":"gough","year":"2014","journal-title":"Linux Man Page"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/1456469.1456474"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/CSFW.2006.20"},{"key":"ref21","first-page":"189","article-title":"Cryptree: A folder tree structure for cryptographic file systems","author":"grolimund","year":"2006","journal-title":"IEEE Symposium on Reliable Distributed Systems (SRDS)"},{"key":"ref24","article-title":"sec-cs: Getting the most out of untrusted cloud storage","author":"leibenger","year":"2016"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2007.11"}],"event":{"name":"2016 IEEE Conference on Communications and Network Security (CNS)","location":"Philadelphia, PA, USA","start":{"date-parts":[[2016,10,17]]},"end":{"date-parts":[[2016,10,19]]}},"container-title":["2016 IEEE Conference on Communications and Network Security (CNS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7854080\/7860451\/07860544.pdf?arnumber=7860544","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,10,2]],"date-time":"2017-10-02T23:41:28Z","timestamp":1506987688000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7860544\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,10]]},"references-count":24,"URL":"https:\/\/doi.org\/10.1109\/cns.2016.7860544","relation":{},"subject":[],"published":{"date-parts":[[2016,10]]}}}