{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,3]],"date-time":"2025-09-03T11:11:54Z","timestamp":1756897914800},"reference-count":55,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"1","license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Parallel Distrib. Syst."],"published-print":{"date-parts":[[2016,1,1]]},"DOI":"10.1109\/tpds.2015.2388447","type":"journal-article","created":{"date-parts":[[2015,1,7]],"date-time":"2015-01-07T19:34:31Z","timestamp":1420659271000},"page":"92-105","source":"Crossref","is-referenced-by-count":5,"title":["Authenticated Key Exchange Protocols for Parallel Network File Systems"],"prefix":"10.1109","volume":"27","author":[{"given":"Hoon Wei","family":"Lim","sequence":"first","affiliation":[]},{"given":"Guomin","family":"Yang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"crossref","DOI":"10.1201\/9781439821916","author":"menezes","year":"1996","journal-title":"Handbook of Applied Cryptography"},{"key":"ref38","article-title":"Simple authentication and security layer (SASL)","author":"melnikov","year":"2006","journal-title":"Proc Internet Engineering Task Force (IETF)"},{"key":"ref33","article-title":"Generic security service application program interface version 2, update 1","author":"linn","year":"2000","journal-title":"Proc Internet Engineering Task Force (IETF)"},{"key":"ref32","article-title":"The Kerberos version 5 GSS-API mechanism","author":"linn","year":"1996","journal-title":"Proc Internet Engineering Task Force (IETF)"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-16441-5_7"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/1362622.1362644"},{"key":"ref37","article-title":"The NIST definition of cloud computing","author":"mell","year":"2011","journal-title":"National Institute of Standards and Technology (NIST)"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1145\/319151.319160"},{"key":"ref35","year":"0"},{"key":"ref34","year":"0"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1197\/jamia.M2662"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/378993.379239"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/1179559.1179565"},{"key":"ref2","year":"0"},{"key":"ref1","first-page":"59","article-title":"Ursa minor: Versatile cluster-based storage","author":"abd-el-malek","year":"0","journal-title":"Proc 4th Usenix Conf File Storage Technol"},{"key":"ref20","year":"0"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/291006.291029"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/945449.945450"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/35037.35059"},{"key":"ref23","year":"0"},{"key":"ref26","year":"0"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.1304"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1007\/s00354-009-0089-5"},{"key":"ref51","article-title":"RPC: Remote procedure call protocol specification version 2","author":"thurlow","year":"2009","journal-title":"Proc Internet Engineering Task Force (IETF)"},{"key":"ref55","first-page":"250","article-title":"SNARE: A strong security scheme for network-attached storage","author":"zhu","year":"0","journal-title":"Proc 22nd IEEE Symp Reliable Distributed Systems"},{"key":"ref54","first-page":"59","article-title":"LegionFS: A secure and scalable file system supporting cross-domain high-performance applications","author":"white","year":"0","journal-title":"Proc ACM\/IEEE Conf Supercomput"},{"key":"ref53","first-page":"17","article-title":"Scalable performance of the Panasas parallel file system","author":"welch","year":"0","journal-title":"Proc 6th USENIX Conf File Storage Technol"},{"key":"ref52","first-page":"307","article-title":"Ceph: A scalable, high-performance distributed file system","author":"weil","year":"0","journal-title":"Proc Symp Oper Syst Design Implement"},{"key":"ref10","first-page":"453","article-title":"Analysis of key-exchange protocols and their use for building secure channels","author":"canetti","year":"0","journal-title":"Proc Int Conf Theory Appl Cryptographic Techn Adv Cryptology"},{"key":"ref11","year":"0"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1145\/1103780.1103791"},{"key":"ref12","year":"0"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/1327452.1327492"},{"key":"ref14","article-title":"LIPKEY&#x2014;A low infrastructure public key mechanism using SPKM","author":"eisler","year":"2000","journal-title":"Proc Internet Engineering Task Force (IETF)"},{"key":"ref15","article-title":"XDR: External data representation standard","author":"eisler","year":"2006","journal-title":"Proc Internet Engineering Task Force (IETF)"},{"key":"ref16","article-title":"RPCSEC_GSS version 2","author":"eisler","year":"2009","journal-title":"Proc Internet Engineering Task Force (IETF)"},{"key":"ref17","article-title":"RPCSEC_GSS protocol specification","author":"eisler","year":"1997","journal-title":"Proc Internet Engineering Task Force (IETF)"},{"key":"ref18","article-title":"Kerberos version 5 generic security service application program interface (GSS-API) channel binding hash agility","author":"emery","year":"2012","journal-title":"Proc Internet Engineering Task Force (IETF)"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/SISW.2005.12"},{"key":"ref4","first-page":"159","article-title":"Block-level security for network-attached disks","author":"aguilera","year":"0","journal-title":"Proc of the 2nd Conf on File and Storage Technology"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/1060289.1060291"},{"key":"ref6","year":"0"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/1721654.1721672"},{"key":"ref8","first-page":"258","article-title":"Collusion resistant broadcast encryption with short ciphertexts and private keys","author":"boneh","year":"0","journal-title":"Proc 25th Annu Int Conf Adv Cryptol"},{"key":"ref7","first-page":"139","article-title":"Authenticated key exchange secure against dictionary attacks","author":"bellare","year":"0","journal-title":"Proc 19th Int Conf Theory and Appl Cryptographic Tech"},{"key":"ref49","year":"0"},{"key":"ref9","article-title":"NFS version 3 protocol specification","author":"callaghan","year":"1995","journal-title":"Proc Internet Engineering Task Force (IETF)"},{"key":"ref46","article-title":"Network file system (NFS) version 4 minor version 1 protocol","author":"shepler","year":"2010","journal-title":"Proc Internet Engineering Task Force (IETF)"},{"key":"ref45","article-title":"Network file system (NFS) version 4 protocol","author":"shepler","year":"2003","journal-title":"Proc Internet Engineering Task Force (IETF)"},{"key":"ref48","first-page":"231","article-title":"GPFS: A shared-disk file system for large computing clusters","author":"schmuck","year":"0","journal-title":"Proc 1st USENIX Conf File Storage Technol"},{"key":"ref47","first-page":"119","article-title":"Design and implementation of the Sun network filesystem","author":"sandberg","year":"0","journal-title":"Proc Summer USENIX Conf"},{"key":"ref42","year":"0"},{"key":"ref41","year":"0"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1016\/j.jbi.2009.08.014"},{"key":"ref43","year":"0"}],"container-title":["IEEE Transactions on Parallel and Distributed Systems"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/71\/7350313\/7004049.pdf?arnumber=7004049","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,12]],"date-time":"2022-01-12T15:57:34Z","timestamp":1642003054000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7004049\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,1,1]]},"references-count":55,"journal-issue":{"issue":"1"},"URL":"https:\/\/doi.org\/10.1109\/tpds.2015.2388447","relation":{},"ISSN":["1045-9219"],"issn-type":[{"value":"1045-9219","type":"print"}],"subject":[],"published":{"date-parts":[[2016,1,1]]}}}