{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,4]],"date-time":"2025-12-04T09:45:32Z","timestamp":1764841532295,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":22,"publisher":"ACM","license":[{"start":{"date-parts":[[2005,11,11]],"date-time":"2005-11-11T00:00:00Z","timestamp":1131667200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2005,11,11]]},"DOI":"10.1145\/1103780.1103793","type":"proceedings-article","created":{"date-parts":[[2006,2,6]],"date-time":"2006-02-06T15:52:40Z","timestamp":1139241160000},"page":"84-93","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":35,"title":["An approach for fault tolerant and secure data storage in collaborative work environments"],"prefix":"10.1145","author":[{"given":"Arun","family":"Subbiah","sequence":"first","affiliation":[{"name":"Georgia Institute of Technology, Atlanta, GA"}]},{"given":"Douglas M.","family":"Blough","sequence":"additional","affiliation":[{"name":"Georgia Institute of Technology, Atlanta, GA"}]}],"member":"320","published-online":{"date-parts":[[2005,11,11]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"The miracl software library. http:\/\/indigo.ie\/~mscott\/.  The miracl software library. http:\/\/indigo.ie\/~mscott\/."},{"key":"e_1_3_2_1_2_1","volume-title":"Proceedings of the 1st International Conference on Theory and Application of Cryptography (Pragocrypt)","author":"Anderson R. J.","year":"1996","unstructured":"R. J. Anderson . The eternity service . In Proceedings of the 1st International Conference on Theory and Application of Cryptography (Pragocrypt) , 1996 . R. J. Anderson. The eternity service. In Proceedings of the 1st International Conference on Theory and Application of Cryptography (Pragocrypt), 1996."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/MARK.1979.8817296"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/313238.313249"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.1985.64"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/RISP.1991.130780"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.1987.4"},{"key":"e_1_3_2_1_8_1","volume-title":"Crypto","author":"Herlihy M.","year":"1987","unstructured":"M. Herlihy and J. D. Tygar . How to make replicated data secure . In Crypto , 1987 . M. Herlihy and J. D. Tygar. How to make replicated data secure. In Crypto, 1987."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.5555\/646760.706016"},{"key":"e_1_3_2_1_10_1","volume-title":"Proceedings of the IEEE Global Communication Conference","author":"Ito M.","year":"1987","unstructured":"M. Ito , A. Saito , and T. Nishizeki . Secret sharing scheme realizing general access structure . In Proceedings of the IEEE Global Communication Conference , 1987 . M. Ito, A. Saito, and T. Nishizeki. Secret sharing scheme realizing general access structure. In Proceedings of the IEEE Global Communication Conference, 1987."},{"key":"e_1_3_2_1_11_1","volume-title":"Proceedings of the 14th IFIP International Information Security Conference","author":"Iyengar A.","year":"1998","unstructured":"A. Iyengar , R. Cahn , C. Jutla , and J. Garay . Design and implementation of a secure distributed data repository . In Proceedings of the 14th IFIP International Information Security Conference , 1998 . A. Iyengar, R. Cahn, C. Jutla, and J. Garay. Design and implementation of a secure distributed data repository. In Proceedings of the 14th IFIP International Information Security Conference, 1998."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/RELDIS.2005.7"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/378993.379239"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2003.1233705"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2004.3"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/71.722223"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/62044.62050"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/359168.359176"},{"key":"e_1_3_2_1_19_1","volume-title":"Proceedings of the 4th Symposium on Operating Systems Design and Implementation","author":"Strunk J. D.","year":"2000","unstructured":"J. D. Strunk , G. R. Goodson , M. L. Scheinholtz , C. A. N. Soules , and G. R. Ganger . Self-securing storage: Protecting data in compromised systems . In Proceedings of the 4th Symposium on Operating Systems Design and Implementation , 2000 . J. D. Strunk, G. R. Goodson, M. L. Scheinholtz, C. A. N. Soules, and G. R. Ganger. Self-securing storage: Protecting data in compromised systems. In Proceedings of the 4th Symposium on Operating Systems Design and Implementation, 2000."},{"key":"e_1_3_2_1_20_1","volume-title":"Proceedings of the 9th Usenix Security Symposium","author":"Waldman M.","year":"2000","unstructured":"M. Waldman , A. D. Rubin , and L. F. Cranor . Publius: A robust, tamper-evident, censorship-resistant web publishing system . In Proceedings of the 9th Usenix Security Symposium , 2000 . M. Waldman, A. D. Rubin, and L. F. Cranor. Publius: A robust, tamper-evident, censorship-resistant web publishing system. In Proceedings of the 9th Usenix Security Symposium, 2000."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.5555\/977400.978008"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/2.863969"}],"event":{"name":"CCS05: 12th ACM Conference on Computer and Communications Security 2005","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control","ACM Association for Computing Machinery"],"location":"Fairfax VA USA","acronym":"CCS05"},"container-title":["Proceedings of the 2005 ACM workshop on Storage security and survivability"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1103780.1103793","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1103780.1103793","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T16:07:52Z","timestamp":1750262872000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1103780.1103793"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005,11,11]]},"references-count":22,"alternative-id":["10.1145\/1103780.1103793","10.1145\/1103780"],"URL":"https:\/\/doi.org\/10.1145\/1103780.1103793","relation":{},"subject":[],"published":{"date-parts":[[2005,11,11]]},"assertion":[{"value":"2005-11-11","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}