{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T05:07:27Z","timestamp":1725512847172},"reference-count":22,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012,6]]},"DOI":"10.1109\/dsnw.2012.6264692","type":"proceedings-article","created":{"date-parts":[[2012,8,17]],"date-time":"2012-08-17T15:49:12Z","timestamp":1345218552000},"page":"1-6","source":"Crossref","is-referenced-by-count":3,"title":["Utilizing linear subspaces to improve cloud security"],"prefix":"10.1109","author":[{"given":"David","family":"Zage","sequence":"first","affiliation":[]},{"given":"James","family":"Obert","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1145\/1866835.1866841"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1145\/1866835.1866842"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653686"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOMW.2011.5928888"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1145\/1807128.1807162"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1145\/1966445.1966449"},{"year":"2002","author":"galassi","key":"13"},{"journal-title":"RFC 1950 ZLIB Compressed Data Format Specification","year":"0","key":"14"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1007\/BF02163027"},{"key":"12","article-title":"On the complexity of matrix multiplication","author":"stothers","year":"2010","journal-title":"Ph D Dissertation"},{"key":"21","article-title":"Provable data possession at untrusted stores","author":"ateniese","year":"2007","journal-title":"Proc of CCS"},{"key":"3","article-title":"Self hosting vs. Cloud hosting: Accounting for the security impact of hosting in the cloud","author":"molnar","year":"2010","journal-title":"Proc of WEIS"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1145\/2046660.2046666"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/CLOUD.2010.23"},{"key":"1","article-title":"A roadmap for cybersecurity research","author":"maughan","year":"2009","journal-title":"Department of Homeland Security Science and Technology Directorate Tech Rep"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1977.1055714"},{"journal-title":"Introduction to Linear Algebra","year":"2003","author":"strang","key":"7"},{"key":"6","article-title":"Chaffing and winnowing: Confidentiality without encryption","author":"rivest","year":"1998","journal-title":"MIT Lab for Computer Science Tech Rep"},{"key":"5","article-title":"New IDC IT cloud services survey: Top benefits and challenges","author":"gens","year":"2009","journal-title":"IDC EXchange Tech Rep"},{"journal-title":"Federal Computer Week Tech Rep","article-title":"Cloud computing snapshot","year":"2010","key":"4"},{"journal-title":"Invertibility of Symmetric Random Matrices","year":"2011","author":"vershynin","key":"9"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1016\/j.jfa.2009.04.016"}],"event":{"name":"2012 IEEE\/IFIP 42nd International Conference on Dependable Systems and Networks Workshops (DSN-W)","start":{"date-parts":[[2012,6,25]]},"location":"Boston, MA, USA","end":{"date-parts":[[2012,6,28]]}},"container-title":["IEEE\/IFIP International Conference on Dependable Systems and Networks Workshops (DSN 2012)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6255871\/6264647\/06264692.pdf?arnumber=6264692","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,21]],"date-time":"2017-03-21T21:57:15Z","timestamp":1490133435000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6264692\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,6]]},"references-count":22,"URL":"https:\/\/doi.org\/10.1109\/dsnw.2012.6264692","relation":{},"subject":[],"published":{"date-parts":[[2012,6]]}}}