{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T11:20:05Z","timestamp":1725448805074},"reference-count":13,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,12]]},"DOI":"10.1109\/isias.2015.7492747","type":"proceedings-article","created":{"date-parts":[[2016,6,16]],"date-time":"2016-06-16T20:14:55Z","timestamp":1466108095000},"page":"67-72","source":"Crossref","is-referenced-by-count":0,"title":["Digital safe: Secure synchronization of shared files"],"prefix":"10.1109","author":[{"given":"Mayssa","family":"Jemel","sequence":"first","affiliation":[]},{"given":"Mounira","family":"Msahli","sequence":"additional","affiliation":[]},{"given":"Ahmed","family":"Serhrouchni","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Afnor groups","year":"0","key":"ref10"},{"key":"ref11","article-title":"Security assurance of local data stored by htm15 web application","author":"jemel","year":"2014","journal-title":"International Conference on Information Security and Assurance"},{"key":"ref12","article-title":"Content protection and secure synchronization of htm15 local storage data","author":"jemel","year":"2014","journal-title":"IEEE Consumer communications and Networking Conference (CCNC"},{"journal-title":"Advanced crypto software collection Ciphertext-policy attribute-based encryption","year":"2011","key":"ref13"},{"key":"ref4","article-title":"Sirius: Securing remote untrusted storage","author":"goh","year":"2003","journal-title":"Proc Network and Distributed Systems Security Symp (NDSS)"},{"key":"ref3","article-title":"Plutus: Scalable secure file sharing on untrusted storage","author":"kallahalla","year":"2003","journal-title":"Proc USENIX Conf File and Storage Technologies"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ICPPW.2011.51"},{"key":"ref5","article-title":"Improved proxy re-encryption schemes with applications to secure distributed storage","author":"ateniese","year":"2005","journal-title":"Proc Network and Distributed Systems Security Symp (NDSS)"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2007.11"},{"key":"ref7","article-title":"Identity-based cyrptosystems and signature schemes","author":"adi","year":"1984","journal-title":"Advances in Cryptology-CRYPTO"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.4108\/icst.collaboratecom.2013.254190"},{"journal-title":"The Internet of Things How the next Evolution of the Internet Is Changing Everything","year":"0","author":"evans","key":"ref1"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/1180405.1180418"}],"event":{"name":"2015 11th International Conference on Information Assurance and Security (IAS)","start":{"date-parts":[[2015,12,14]]},"location":"Marrakech, Morocco","end":{"date-parts":[[2015,12,16]]}},"container-title":["2015 11th International Conference on Information Assurance and Security (IAS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7484378\/7492733\/07492747.pdf?arnumber=7492747","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,17]],"date-time":"2017-03-17T17:17:44Z","timestamp":1489771064000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7492747\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,12]]},"references-count":13,"URL":"https:\/\/doi.org\/10.1109\/isias.2015.7492747","relation":{},"subject":[],"published":{"date-parts":[[2015,12]]}}}