{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T03:10:39Z","timestamp":1761621039635},"reference-count":31,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010,5]]},"DOI":"10.1109\/msst.2010.5496979","type":"proceedings-article","created":{"date-parts":[[2010,7,6]],"date-time":"2010-07-06T18:06:33Z","timestamp":1278439593000},"page":"1-6","source":"Crossref","is-referenced-by-count":1,"title":["Disk-enabled authenticated encryption"],"prefix":"10.1109","author":[{"given":"Kevin","family":"Butler","sequence":"first","affiliation":[]},{"given":"Stephen","family":"McLaughlin","sequence":"additional","affiliation":[]},{"given":"Patrick","family":"McDaniel","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref31","article-title":"SNARE: A Strong Security System for Network-Attached Storage","author":"zhu","year":"2003","journal-title":"Proc 22nd IEEE Symp Reliable Distributed Systems (SRDS '03)"},{"key":"ref30","first-page":"175","article-title":"Auto-pilot: A platform for system software benchmarking","author":"wright","year":"2005","journal-title":"USENIX Annual Technical Conference Freenix track"},{"key":"ref10","first-page":"75","article-title":"Timing-accurate storage emulation","author":"griffin","year":"2002","journal-title":"Proceedings of the 1st USENIX Conference on File and Storage Technologies (FAST'02)"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/1508244.1508271"},{"journal-title":"IEEE IEEE P1619 1\/20 Draft Standard for Authenticated Encryption with Length Expansion for Storage Devices","year":"2007","key":"ref12"},{"key":"ref13","article-title":"Plutus: Scalable Secure File Sharing on Untrusted Storage","author":"kallahalla","year":"2003","journal-title":"Proc 2nd Usenix Conf File and Storage Tech (FAST 03)"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/j.sysarc.2007.01.010"},{"key":"ref15","article-title":"PostMark, A New Filesystem Benchmark","author":"katcher","year":"1997","journal-title":"Technical Report TR3022 Network Appliance"},{"key":"ref16","first-page":"366","article-title":"A Space-Efficient Flash Translation Layer for Compactflash Systems","author":"kim","year":"2002","journal-title":"IEEE Trans Consumer Elec"},{"key":"ref17","article-title":"Secure Untrusted Data Repository (SUNDR)","author":"li","year":"2004","journal-title":"Proceedings of the 6th USENIX Symposium on Operating Systems Design and Implementation (OSDI 2004)"},{"key":"ref18","article-title":"Strong Security for Network-Attached Storage","author":"miller","year":"2002","journal-title":"Proceedings of the 1st USENIX Conference on File and Storage Technologies (FAST'02)"},{"key":"ref19","article-title":"Computers stolen from welfare office","author":"murphy","year":"2007","journal-title":"Harrisburg Patriot News"},{"key":"ref28","article-title":"Providing Tunable Consistency for a Parallel File Store","author":"vilayannur","year":"2003","journal-title":"Proceedings of the 4th conference on USENIX Conference on File and Storage Technologies (FAST)"},{"key":"ref4","article-title":"High-Performance Disk Integrity through Block Chaining","author":"butler","year":"2007","journal-title":"Technical Report NAS-TR-0072&#x2013;2007 Penn State NSRC"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/1367829.1367831"},{"key":"ref3","article-title":"The DiskSim Simulation Environment Version 3.0 Reference Manual","author":"bucy","year":"2003","journal-title":"Tech Report CMU-CS-92&#x2013;102"},{"article-title":"Recommendation for Block Cipher Modes of Operation: The Galois\/Counter Mode (GCM) for Confidentiality and Authentication & GMAC, Nov. 2007","year":"0","author":"dworkin","key":"ref6"},{"key":"ref29","article-title":"Ceph: A Scalable, High-Performance Distributed File System","author":"weil","year":"2006","journal-title":"Proceedings of the 7th USENIX Symposium on Operating Systems Design and Implementation (OSDI'06)"},{"article-title":"Recommendation for Block Cipher Modes of Operation: The CCM Mode for Authentication and Confidentiality, July 2007","year":"0","author":"dworkin","key":"ref5"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/291069.291029"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/1089733.1089735"},{"journal-title":"Bitmicro","year":"0","key":"ref2"},{"key":"ref9","article-title":"SiRiUS: Securing Remote Untrusted Storage","author":"goh","year":"2003","journal-title":"Proceedings of the 10th ISOC Symposium on Network and Distributed Systems (NDSS' 03)"},{"key":"ref1","article-title":"Block-Level Security for Network-Attached Disks","author":"aguilera","year":"2003","journal-title":"Proc 2nd Usenix Conf File and Storage Tech (FAST 03)"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1147\/rd.395.0531"},{"key":"ref22","article-title":"Efficient AES Implementations on ASICs and FPGAs","author":"pramstaller","year":"2004","journal-title":"AES Conference Proceedings"},{"key":"ref21","article-title":"Space-Efficient Block Storage Integrity","author":"oprea","year":"2005","journal-title":"Proceedings of the 12th ISOC Symposium on Network and Distributed Systems Security (NDSS'05)"},{"key":"ref24","article-title":"Security Considerations When Designing a Distributed File System Using Object Storage Devices","author":"reed","year":"2002","journal-title":"Proceedings of the 1st IEEE Security in Storage Workshop (SISW'02)"},{"key":"ref23","article-title":"Venti: A New Approach to Archival Storage","author":"quinlan","year":"2002","journal-title":"Proceedings of the 1st USENIX Conference on File and Storage Technologies (FAST'02)"},{"key":"ref26","article-title":"Track-aligned extents: Matching access patterns to disk drive characteristics","author":"schindler","year":"2002","journal-title":"Proceedings of the 1st USENIX Conference on File and Storage Technologies (FAST'02)"},{"journal-title":"Sandisk","year":"0","key":"ref25"}],"event":{"name":"2010 IEEE 26th Symposium on Mass Storage Systems and Technologies (MSST)","start":{"date-parts":[[2010,5,3]]},"location":"Incline Village, NV, USA","end":{"date-parts":[[2010,5,7]]}},"container-title":["2010 IEEE 26th Symposium on Mass Storage Systems and Technologies (MSST)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5488875\/5496967\/05496979.pdf?arnumber=5496979","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,18]],"date-time":"2017-03-18T23:02:19Z","timestamp":1489878139000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5496979\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,5]]},"references-count":31,"URL":"https:\/\/doi.org\/10.1109\/msst.2010.5496979","relation":{},"subject":[],"published":{"date-parts":[[2010,5]]}}}