{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T12:46:18Z","timestamp":1730292378325,"version":"3.28.0"},"reference-count":29,"publisher":"IEEE Comput. Soc","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1109\/reldis.2003.1238075","type":"proceedings-article","created":{"date-parts":[[2004,3,1]],"date-time":"2004-03-01T21:26:50Z","timestamp":1078176410000},"page":"250-259","source":"Crossref","is-referenced-by-count":1,"title":["SNARE: a strong security scheme for network-attached storage"],"prefix":"10.1109","author":[{"family":"Yingwu Zhu","sequence":"first","affiliation":[]},{"family":"Yiming Hu","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","first-page":"1","article-title":"Strong secutity for network-attached storage","author":"miller","year":"2002","journal-title":"Proceedings of the 1st ACM Conference on File and Storage Technologies(FAST)"},{"doi-asserted-by":"publisher","key":"17","DOI":"10.1145\/319151.319160"},{"doi-asserted-by":"publisher","key":"18","DOI":"10.1109\/HOTOS.2001.990070"},{"doi-asserted-by":"publisher","key":"15","DOI":"10.1145\/378993.379239"},{"key":"16","first-page":"168","article-title":"Architectural support for copy and tamper resistant software","author":"lie","year":"2000","journal-title":"Proceedings of the ninth international conference on Architectural support for programming languages and operating systems - ASP"},{"doi-asserted-by":"publisher","key":"13","DOI":"10.1145\/35037.35059"},{"key":"14","article-title":"Keyed-hashing for message authentication","volume":"2104","author":"krawczyk","year":"1997","journal-title":"Request for Comments (RFC)"},{"doi-asserted-by":"publisher","key":"11","DOI":"10.1145\/291069.291029"},{"year":"1999","author":"gobioff","journal-title":"Security for a High Performance Commodity Storage Subsystem","key":"12"},{"key":"21","first-page":"15","article-title":"A frame-work for evaluating storage sysytem security","author":"riedel","year":"2002","journal-title":"Proceedings of the 1st ACM Conference on File and Storage Technologies(FAST)"},{"doi-asserted-by":"publisher","key":"20","DOI":"10.1109\/40.820053"},{"year":"1996","author":"schneier","journal-title":"Applied Cryptography","key":"22"},{"key":"23","article-title":"Nfs version 4 protocol","volume":"3010","author":"shepler","year":"2001","journal-title":"Request for Comments (RFC)"},{"doi-asserted-by":"publisher","key":"24","DOI":"10.1145\/227695.227698"},{"key":"25","first-page":"191","article-title":"Kerberos: An authentication service for open network systems","author":"steiner","year":"1988","journal-title":"Proceedings of the Winter 1988 USENIX Technical Conference"},{"doi-asserted-by":"publisher","key":"26","DOI":"10.1109\/FITS.2003.1264933"},{"doi-asserted-by":"publisher","key":"27","DOI":"10.1145\/174613.174614"},{"doi-asserted-by":"publisher","key":"28","DOI":"10.1109\/2.863969"},{"key":"29","article-title":"Cryptfs: A stackable vnode level encryption file system","volume":"cucs 21 98","author":"zadok","year":"1998","journal-title":"Technical Report"},{"doi-asserted-by":"publisher","key":"3","DOI":"10.1145\/168588.168590"},{"key":"2","article-title":"The rc5, rc5-cbc, rc5-cbc-pad, and rc5-cts algorithms","volume":"2040","author":"baldwin","year":"1996","journal-title":"Request for Comments (RFC)"},{"doi-asserted-by":"publisher","key":"10","DOI":"10.1145\/353360.353362"},{"doi-asserted-by":"publisher","key":"1","DOI":"10.1145\/225535.225537"},{"key":"7","first-page":"361","article-title":"Design for a decentralized security system for network-attached storage","author":"freeman","year":"2000","journal-title":"Proceedings of the 17th IEEE Symposium on Mass Storage Systems and Technologies"},{"doi-asserted-by":"publisher","key":"6","DOI":"10.1145\/365230.365252"},{"key":"5","first-page":"199","article-title":"The design and implementation of a transparent cryptographic file system for unix","author":"cattaneo","year":"2001","journal-title":"Proceedings of the FREENIX Track 2001 USENIX Annual Technical Conference"},{"key":"4","first-page":"27","article-title":"Key management in an encrypting file system","author":"blaze","year":"1994","journal-title":"Proceedings of the USENIX Summer 1994 Technical Conference"},{"doi-asserted-by":"publisher","key":"9","DOI":"10.1145\/505452.505453"},{"year":"1999","author":"fu","journal-title":"Group Sharing and Random Access in CryptoGraphic Storage File Systems","key":"8"}],"event":{"acronym":"RELDIS-03","name":"22nd International Symposium on Reliable Distributed Systems","location":"Florence, Italy"},"container-title":["22nd International Symposium on Reliable Distributed Systems, 2003. Proceedings."],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/8774\/27777\/01238075.pdf?arnumber=1238075","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,13]],"date-time":"2017-03-13T13:46:55Z","timestamp":1489412815000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1238075\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"references-count":29,"URL":"https:\/\/doi.org\/10.1109\/reldis.2003.1238075","relation":{},"subject":[]}}