{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T14:21:53Z","timestamp":1730211713704,"version":"3.28.0"},"reference-count":23,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,9,2]],"date-time":"2024-09-02T00:00:00Z","timestamp":1725235200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,9,2]],"date-time":"2024-09-02T00:00:00Z","timestamp":1725235200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,9,2]]},"DOI":"10.1109\/csr61664.2024.10679459","type":"proceedings-article","created":{"date-parts":[[2024,9,24]],"date-time":"2024-09-24T17:21:51Z","timestamp":1727198511000},"page":"228-234","source":"Crossref","is-referenced-by-count":0,"title":["ROT: Retention and Operation Limitation Using TEE"],"prefix":"10.1109","author":[{"given":"Sumit Kumar","family":"Paul","sequence":"first","affiliation":[{"name":"University Of Ottawa,Electrical and Computer Engineering,Ottawa,Canada"}]},{"given":"D.A.","family":"Knox","sequence":"additional","affiliation":[{"name":"School of Engineering Design and Teaching Innovation (and School of Electrical Engineering and Computer Science), University Of Ottawa,Ottawa,Canada"}]}],"member":"263","reference":[{"volume-title":"ROT: Retention and Operation limitation using TEE","year":"2024","author":"Paul","key":"ref1"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.1986.25"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-19571-6_16"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ICNP.2011.6089048"},{"key":"ref5","first-page":"10","article-title":"Vanish: Increasing Data Privacy with Self-Destructing Data","volume-title":"USENIX security symposium","volume":"316","author":"Geambasu"},{"article-title":"Comet: An Active Distributed Key-Value Store","volume-title":"9th USENIX Symposium on Operating Systems Design and Implementation (OSDI10)","author":"Geambasu","key":"ref6"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2015.23113"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/2799647"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.10"},{"key":"ref10","first-page":"1","article-title":"Pesos: Policy enhanced secure object store","volume-title":"Thirteenth EuroSys Conference","author":"Krahn"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2020-0049"},{"article-title":"ROTE: Rollback Protection for Trusted Execution","volume-title":"Proceedings of the 26th Conference on USENIX Security Symposium (SEC 17)","author":"Matetic","key":"ref12"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/3485832.3485919"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/globecom54140.2023.10437471"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-56620-7_10"},{"volume-title":"Innovative Technology for CPU Based Attestation and Sealing","year":"2013","author":"Anati","key":"ref16"},{"volume-title":"INFURA JSON-RPC methods","year":"2024","key":"ref17"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/tetc.2023.3261360"},{"volume-title":"CiFEr - Functional Encryption library","key":"ref19"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/3627106.3627145"},{"article-title":"Uncovering the Apps That Actually Respect Your Privacy","volume-title":"Surfshark","year":"2024","key":"ref21"},{"volume-title":"Integrating Intel SGX Remote Attestation with Transport Layer Security","author":"Knauth","key":"ref22"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/sp.2014.41"}],"event":{"name":"2024 IEEE International Conference on Cyber Security and Resilience (CSR)","start":{"date-parts":[[2024,9,2]]},"location":"London, United Kingdom","end":{"date-parts":[[2024,9,4]]}},"container-title":["2024 IEEE International Conference on Cyber Security and Resilience (CSR)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10679369\/10679342\/10679459.pdf?arnumber=10679459","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,25]],"date-time":"2024-09-25T05:23:34Z","timestamp":1727241814000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10679459\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,9,2]]},"references-count":23,"URL":"https:\/\/doi.org\/10.1109\/csr61664.2024.10679459","relation":{},"subject":[],"published":{"date-parts":[[2024,9,2]]}}}