{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T11:29:32Z","timestamp":1730287772394,"version":"3.28.0"},"reference-count":28,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,12]]},"DOI":"10.1109\/pccc.2017.8280476","type":"proceedings-article","created":{"date-parts":[[2018,2,5]],"date-time":"2018-02-05T22:31:28Z","timestamp":1517869888000},"page":"1-9","source":"Crossref","is-referenced-by-count":5,"title":["Efficient tamper-evident logging of distributed systems via concurrent authenticated tree"],"prefix":"10.1109","author":[{"given":"Fangxiao","family":"Ning","sequence":"first","affiliation":[]},{"given":"Yu","family":"Wen","sequence":"additional","affiliation":[]},{"given":"Gang","family":"Shi","sequence":"additional","affiliation":[]},{"given":"Dan","family":"Meng","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","first-page":"1","article-title":"Chukwa: A system for reliable large-scale log collection","author":"rabkin","year":"2010","journal-title":"Proceedings of the 24th International Conference on Large Installation System Administration LISA'10"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/1502777.1502779"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ACSAC.2009.28"},{"key":"ref13","first-page":"317","article-title":"Efficient data structures for tamper-evident logging","author":"crosby","year":"2009","journal-title":"Proceedings of the 18th Conference on USENIX Security Symposium"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/3035918.3064030"},{"key":"ref15","first-page":"143","article-title":"Chameleon signatures","author":"krawczyk","year":"2000","journal-title":"Proc Symp Network and Distributed System Security"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-25937-4_24"},{"journal-title":"Handbook of Applied Cryptography","year":"1996","author":"menezes","key":"ref17"},{"journal-title":"C++ Concurrency in Action Practical Multithreading","year":"2012","author":"williams","key":"ref18"},{"key":"ref19","article-title":"Forward integrity for secure audit logs","author":"bellare","year":"1997","journal-title":"Technical report Computer Science and Engineering Department University of California at San Diego Tech Rep"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-24177-7_31"},{"key":"ref4","first-page":"33","article-title":"Building linkedin's real-time activity data pipeline","volume":"35","author":"goodhope","year":"2012","journal-title":"IEEE Data Eng Bull"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.17487\/rfc6962"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2012.26"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/s11280-011-0138-0"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/2382553.2382555"},{"key":"ref8","first-page":"1","article-title":"Kafka: A distributed messaging system for log processing","author":"kreps","year":"2011","journal-title":"Proceedings of the NetDB"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.14778\/2367502.2367516"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/1629575.1629587"},{"journal-title":"Apache","article-title":"Apache flume","year":"2012","key":"ref9"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/1996092.1996094"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-36563-X_1"},{"key":"ref22","first-page":"203","article-title":"Logcrypt: Forward security and public verification for secure audit logs","volume":"54","author":"holt","year":"2006","journal-title":"Proceedings of the 2006 Australasian workshops on Grid computing and e-research"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/317087.317089"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-32946-3_12"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/2240276.2240280"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48184-2_32"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/3052973.3053034"}],"event":{"name":"2017 IEEE 36th International Performance Computing and Communications Conference (IPCCC)","start":{"date-parts":[[2017,12,10]]},"location":"San Diego, CA","end":{"date-parts":[[2017,12,12]]}},"container-title":["2017 IEEE 36th International Performance Computing and Communications Conference (IPCCC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8269763\/8280427\/08280476.pdf?arnumber=8280476","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,3,19]],"date-time":"2018-03-19T21:52:14Z","timestamp":1521496334000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/8280476\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,12]]},"references-count":28,"URL":"https:\/\/doi.org\/10.1109\/pccc.2017.8280476","relation":{},"subject":[],"published":{"date-parts":[[2017,12]]}}}