{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,19]],"date-time":"2026-02-19T08:18:56Z","timestamp":1771489136216,"version":"3.50.1"},"reference-count":18,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,6]]},"DOI":"10.1109\/iwqos.2013.6550281","type":"proceedings-article","created":{"date-parts":[[2013,7,9]],"date-time":"2013-07-09T15:43:03Z","timestamp":1373384583000},"page":"1-6","source":"Crossref","is-referenced-by-count":6,"title":["Achieving secure and efficient data collaboration in cloud computing"],"prefix":"10.1109","author":[{"family":"Xin Dong","sequence":"first","affiliation":[]},{"family":"Jiadi Yu","sequence":"additional","affiliation":[]},{"family":"Yuan Luo","sequence":"additional","affiliation":[]},{"family":"Yingying Chen","sequence":"additional","affiliation":[]},{"family":"Guangtao Xue","sequence":"additional","affiliation":[]},{"family":"Minglu Li","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"17","first-page":"29","article-title":"Plutus: Scalable secure file sharing on untrusted storage","author":"kallahalla","year":"2003","journal-title":"Proceedings of the 2nd USENIX Conference on File and Storage Technologies"},{"key":"18","article-title":"Sirius: Securing remote untrusted storage","author":"goh","year":"2003","journal-title":"NDSS"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-00457-5_26"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1145\/1060289.1060291"},{"key":"13","first-page":"149","article-title":"Hierarchical id-based cryptography","author":"gentry","year":"2002","journal-title":"Advances in Cryptology?ASIACRYPT 2002"},{"key":"14","first-page":"562","article-title":"Hierarchical identity based encryption with constant size ciphertext","author":"boneh","year":"2005","journal-title":"Advances in Cryptology-EUROCRYPT 2005"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45325-3_32"},{"key":"12","first-page":"466","article-title":"Toward hierarchical identity-based encryption","author":"horwitz","year":"2002","journal-title":"Advances in Cryptology?EUROCRYPT"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1145\/1180405.1180418"},{"key":"2","author":"arrington","year":"2006","journal-title":"Gmail Disaster Reports of Mass Email Deletions"},{"key":"1","article-title":"Above the clouds: A berkeley view of cloud computing","volume":"28","author":"fox","year":"2009","journal-title":"University of California"},{"key":"10","doi-asserted-by":"crossref","first-page":"213","DOI":"10.1007\/3-540-44647-8_13","article-title":"Identity-Based Encryption from the Weil Pairing","author":"boneh","year":"2001","journal-title":"Lecture Notes in Computer Science"},{"key":"7","article-title":"Auditing to keep online storage services honest","author":"shah","year":"2007","journal-title":"Proceedings of the 11th USENIX Workshop on Hot Topics in Operating Systems"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1145\/1655008.1655016"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2010.5462174"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1145\/1866307.1866414"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-39568-7_5"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1145\/1315245.1315318"}],"event":{"name":"2013 IEEE\/ACM 21st International Symposium on Quality of Service (IWQoS)","location":"Montreal, QC","start":{"date-parts":[[2013,6,3]]},"end":{"date-parts":[[2013,6,4]]}},"container-title":["2013 IEEE\/ACM 21st International Symposium on Quality of Service (IWQoS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6547087\/6550252\/06550281.pdf?arnumber=6550281","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,10,14]],"date-time":"2020-10-14T15:53:13Z","timestamp":1602690793000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/6550281"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,6]]},"references-count":18,"URL":"https:\/\/doi.org\/10.1109\/iwqos.2013.6550281","relation":{},"subject":[],"published":{"date-parts":[[2013,6]]}}}