{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T09:17:25Z","timestamp":1730279845422,"version":"3.28.0"},"reference-count":19,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2003]]},"DOI":"10.1109\/iwias.2003.1192462","type":"proceedings-article","created":{"date-parts":[[2004,1,24]],"date-time":"2004-01-24T04:33:03Z","timestamp":1074918783000},"page":"95-105","source":"Crossref","is-referenced-by-count":14,"title":["Protecting the integrity of an entire file system"],"prefix":"10.1109","author":[{"given":"F.","family":"Tomonori","sequence":"first","affiliation":[]},{"given":"O.","family":"Masanori","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","first-page":"369","article-title":"A digital signature based on a conventional encryption function","author":"merkle","year":"1987","journal-title":"Advance in Cryptology &#x2013; Crypto '87"},{"journal-title":"The tux2 failsafe filesystem for linux","year":"0","author":"phillips","key":"ref11"},{"key":"ref12","article-title":"Venti: a new approach to archival storage","author":"quinlan","year":"2002","journal-title":"Conference on File and Storage Tech-nologies"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/121132.121137"},{"key":"ref14","first-page":"119","article-title":"Design and implementation of the sun network filesystem","author":"sandberg","year":"1985","journal-title":"the Summer 1986 USENIX"},{"journal-title":"Ips internet draft - iscsi","year":"2002","author":"satran","key":"ref15"},{"key":"ref16","article-title":"Journaling versus soft updates: Asynchronous meta-data protection in file systems. In","author":"seltzer","year":"2000","journal-title":"USENIX Annual Technical Conference"},{"key":"ref17","first-page":"79","article-title":"Unifying file system protection","author":"stein","year":"2001","journal-title":"2001 USENIX Annual Technical Con-ference"},{"article-title":"State of American and Technology. Secure hash standard","year":"1993","author":"united","key":"ref18"},{"key":"ref19","article-title":"Cryptfs: A stack-able vnode level encryption file system","author":"zadok","year":"1998","journal-title":"Technical Report"},{"article-title":"Group sharing and random access in cryptographic storage file system","year":"1998","author":"fu","key":"ref4"},{"key":"ref3","article-title":"Fast and secure distributed read-only file system","author":"fu","year":"2000","journal-title":"4th USENIX Symposium on Operationg System Design and Implementation"},{"key":"ref6","article-title":"How to build a trusted database system on untrusted storage","author":"maheshwari","year":"2000","journal-title":"Symposium on Operating System Design and Implementation"},{"key":"ref5","article-title":"File system design for an nfs file server appliance","author":"hitz","year":"1994","journal-title":"the USENIX Winter 1994 Technical Conference"},{"key":"ref8","article-title":"Running &#x201C;fsck&#x201D; in the background","author":"mckusick","year":"2002","journal-title":"Proc USENIX BSDCon'2002"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/HOTOS.2001.990070"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/168588.168590"},{"key":"ref1","article-title":"Keying hash functions for message authentication","volume":"1109","author":"bellare","year":"1996","journal-title":"Advances in Cryptology-proceedings of Crypto 96"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/989.990"}],"event":{"name":"Proceedings First IEEE International Workshop on Information Assurance. IWIA 2003","start":{"date-parts":[[2003,3,24]]},"location":"Darmstadt, Germany","end":{"date-parts":[[2003,3,24]]}},"container-title":["First IEEE International Workshop on Information Assurance, 2003. IWIAS 2003. Proceedings."],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/8484\/26740\/01192462.pdf?arnumber=1192462","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,13]],"date-time":"2017-03-13T21:33:49Z","timestamp":1489440829000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1192462\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2003]]},"references-count":19,"URL":"https:\/\/doi.org\/10.1109\/iwias.2003.1192462","relation":{},"subject":[],"published":{"date-parts":[[2003]]}}}