{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:41:30Z","timestamp":1750308090040,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":20,"publisher":"ACM","license":[{"start":{"date-parts":[[2005,11,11]],"date-time":"2005-11-11T00:00:00Z","timestamp":1131667200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2005,11,11]]},"DOI":"10.1145\/1103780.1103791","type":"proceedings-article","created":{"date-parts":[[2006,2,6]],"date-time":"2006-02-06T15:52:40Z","timestamp":1139241160000},"page":"64-73","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":12,"title":["Secure capabilities for a petabyte-scale object-based distributed file system"],"prefix":"10.1145","author":[{"given":"Christopher","family":"Olson","sequence":"first","affiliation":[{"name":"University of California, Santa Cruz"}]},{"given":"Ethan L.","family":"Miller","sequence":"additional","affiliation":[{"name":"University of California, Santa Cruz"}]}],"member":"320","published-online":{"date-parts":[[2005,11,11]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.5555\/1090694.1090712"},{"key":"e_1_3_2_1_2_1","first-page":"10","volume-title":"IEEE Security in Storage Workshop","author":"Azagury A.","year":"2002","unstructured":"A. Azagury , R. Canetti , M. Factor , S. Halevi , E. Henis , D. Naor , N. Rinetzky , O. Rodeh , and J. Satran . A two layered approach for securing an object store network . In IEEE Security in Storage Workshop , pages 10 -- 23 , 2002 . A. Azagury, R. Canetti, M. Factor, S. Halevi, E. Henis, D. Naor, N. Rinetzky, O. Rodeh, and J. Satran. A two layered approach for securing an object store network. In IEEE Security in Storage Workshop, pages 10--23, 2002."},{"key":"e_1_3_2_1_3_1","first-page":"181","volume-title":"Proceedings of the 4th Symposium on Operating Systems Design and Implementation (OSDI)","author":"Fu K.","year":"2000","unstructured":"K. Fu , M. F. Kaashoek , and D. Mazi\u00e8res . Fast and secure distributed read-only file system . In Proceedings of the 4th Symposium on Operating Systems Design and Implementation (OSDI) , pages 181 -- 196 , San Diego, CA , Oct. 2000 . K. Fu, M. F. Kaashoek, and D. Mazi\u00e8res. Fast and secure distributed read-only file system. In Proceedings of the 4th Symposium on Operating Systems Design and Implementation (OSDI), pages 181--196, San Diego, CA, Oct. 2000."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/291069.291029"},{"key":"e_1_3_2_1_7_1","first-page":"131","volume-title":"Proceedings of the 2003 Network and Distributed System Security Symposium","author":"Goh E.-J.","year":"2003","unstructured":"E.-J. Goh , H. Shacham , N. Modadugu , and D. Boneh . SiRiUS: Securing remote untrusted storage . In Proceedings of the 2003 Network and Distributed System Security Symposium , pages 131 -- 145 . Internet Society , Feb. 2003 . E.-J. Goh, H. Shacham, N. Modadugu, and D. Boneh. SiRiUS: Securing remote untrusted storage. In Proceedings of the 2003 Network and Distributed System Security Symposium, pages 131--145. Internet Society, Feb. 2003."},{"key":"e_1_3_2_1_8_1","volume-title":"Proceedings of the 18th International Parallel & Distributed Processing Symposium (IPDPS 2004","author":"Honicky R. J.","year":"2004","unstructured":"R. J. Honicky and E. L. Miller . Replication under scalable hashing: A family of algorithms for scalable decentralized data distribution . In Proceedings of the 18th International Parallel & Distributed Processing Symposium (IPDPS 2004 ), Santa Fe, NM , Apr. 2004 . R. J. Honicky and E. L. Miller. Replication under scalable hashing: A family of algorithms for scalable decentralized data distribution. In Proceedings of the 18th International Parallel & Distributed Processing Symposium (IPDPS 2004), Santa Fe, NM, Apr. 2004."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/35037.35059"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.5555\/1090694.1090698"},{"key":"e_1_3_2_1_11_1","volume-title":"Proceedings of the 6th Symposium on Operating Systems Design and Implementation (OSDI)","author":"Li J.","year":"2004","unstructured":"J. Li , M. Krohn , D. Mazi\u00e8res , and D. Shasha . Secure untrusted data repository (SUNDR) . In Proceedings of the 6th Symposium on Operating Systems Design and Implementation (OSDI) , San Francisco, CA , Dec. 2004 . J. Li, M. Krohn, D. Mazi\u00e8res, and D. Shasha. Secure untrusted data repository (SUNDR). In Proceedings of the 6th Symposium on Operating Systems Design and Implementation (OSDI), San Francisco, CA, Dec. 2004."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/319151.319160"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/989.990"},{"key":"e_1_3_2_1_14_1","first-page":"1","volume-title":"Proceedings of the 2002 Conference on File and Storage Technologies (FAST)","author":"Miller E. L.","year":"2002","unstructured":"E. L. Miller , D. D. E. Long , W. E. Freeman , and B. C. Reed . Strong security for network-attached storage . In Proceedings of the 2002 Conference on File and Storage Technologies (FAST) , pages 1 -- 13 , Monterey, CA , Jan. 2002 . E. L. Miller, D. D. E. Long, W. E. Freeman, and B. C. Reed. Strong security for network-attached storage. In Proceedings of the 2002 Conference on File and Storage Technologies (FAST), pages 1--13, Monterey, CA, Jan. 2002."},{"key":"e_1_3_2_1_15_1","volume-title":"Proceedings of the","author":"Neumann B. C.","year":"1988","unstructured":"B. C. Neumann , J. G. Steiner , and J. I. Schiller . Kerberos: An authentication service for open network systems . In Proceedings of the Winter 1988 USENIX Technical Conference, pages 191--201, Dallas, TX , 1988. B. C. Neumann, J. G. Steiner, and J. I. Schiller. Kerberos: An authentication service for open network systems. In Proceedings of the Winter 1988 USENIX Technical Conference, pages 191--201, Dallas, TX, 1988."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSST.2005.11"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/40.820053"},{"key":"e_1_3_2_1_18_1","first-page":"221","volume-title":"Proceedings of the Tenth USENIX Security Symposium","author":"Regan J. T.","year":"2001","unstructured":"J. T. Regan and C. D. Jensen . Capability file names: Separating authorisation from user management in an internet file system . In Proceedings of the Tenth USENIX Security Symposium , pages 221 -- 234 . USENIX, Aug. 2001 . J. T. Regan and C. D. Jensen. Capability file names: Separating authorisation from user management in an internet file system. In Proceedings of the Tenth USENIX Security Symposium, pages 221--234. USENIX, Aug. 2001."},{"key":"e_1_3_2_1_19_1","volume-title":"Proceedings of the","author":"Sandberg R.","year":"1985","unstructured":"R. Sandberg , D. Goldberg , S. Kleiman , D. Walsh , and B. Lyon . Design and implementation of the Sun network file system . In Proceedings of the Summer 1985 USENIX Technical Conference, pages 119--130 , 1985. R. Sandberg, D. Goldberg, S. Kleiman, D. Walsh, and B. Lyon. Design and implementation of the Sun network file system. In Proceedings of the Summer 1985 USENIX Technical Conference, pages 119--130, 1985."},{"key":"e_1_3_2_1_20_1","first-page":"283","volume-title":"Proceedings of the 21st IEEE \/ 12th NASA Goddard Conference on Mass Storage Systems and Technologies","author":"Wang F.","year":"2004","unstructured":"F. Wang , S. A. Brandt , E. L. Miller , and D. D. E. Long . OBFS : A file system for object-based storage devices . In Proceedings of the 21st IEEE \/ 12th NASA Goddard Conference on Mass Storage Systems and Technologies , pages 283 -- 300 , College Park, MD , Apr. 2004 . F. Wang, S. A. Brandt, E. L. Miller, and D. D. E. Long. OBFS: A file system for object-based storage devices. In Proceedings of the 21st IEEE \/ 12th NASA Goddard Conference on Mass Storage Systems and Technologies, pages 283--300, College Park, MD, Apr. 2004."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/SC.2004.22"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.5555\/824467.825001"}],"event":{"name":"CCS05: 12th ACM Conference on Computer and Communications Security 2005","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control","ACM Association for Computing Machinery"],"location":"Fairfax VA USA","acronym":"CCS05"},"container-title":["Proceedings of the 2005 ACM workshop on Storage security and survivability"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1103780.1103791","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1103780.1103791","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T16:07:52Z","timestamp":1750262872000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1103780.1103791"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005,11,11]]},"references-count":20,"alternative-id":["10.1145\/1103780.1103791","10.1145\/1103780"],"URL":"https:\/\/doi.org\/10.1145\/1103780.1103791","relation":{},"subject":[],"published":{"date-parts":[[2005,11,11]]},"assertion":[{"value":"2005-11-11","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}