{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,25]],"date-time":"2026-01-25T15:44:34Z","timestamp":1769355874818,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":29,"publisher":"ACM","license":[{"start":{"date-parts":[[2005,11,11]],"date-time":"2005-11-11T00:00:00Z","timestamp":1131667200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2005,11,11]]},"DOI":"10.1145\/1103780.1103797","type":"proceedings-article","created":{"date-parts":[[2006,2,6]],"date-time":"2006-02-06T15:52:40Z","timestamp":1139241160000},"page":"108-114","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":8,"title":["Hydra"],"prefix":"10.1145","author":[{"given":"Lihao","family":"Xu","sequence":"first","affiliation":[{"name":"Wayne State University"}]}],"member":"320","published-online":{"date-parts":[[2005,11,11]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/40.342018"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/225535.225537"},{"key":"e_1_3_2_1_3_1","volume-title":"Proc. of the","author":"Bhide A.","year":"1991","unstructured":"A. Bhide , E. Elnozahy and S. Morgan , \" A Highly Available Network File Server \", Proc. of the Winter 1991 USENIX Technical Conf. , 199-205, Jan. 1991. A. Bhide, E. Elnozahy and S. Morgan, \"A Highly Available Network File Server\", Proc. of the Winter 1991 USENIX Technical Conf., 199-205, Jan. 1991."},{"key":"e_1_3_2_1_4_1","volume-title":"Proc. AFIPS 1979 Nat. Computer Conf., 313--317","author":"Blakley G. R.","year":"1979","unstructured":"G. R. Blakley , \"Safeguarding cryptographic keys\" , Proc. AFIPS 1979 Nat. Computer Conf., 313--317 , June 1979 . G. R. Blakley, \"Safeguarding cryptographic keys\", Proc. AFIPS 1979 Nat. Computer Conf., 313--317, June 1979."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/12.364531"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/71.910866"},{"key":"e_1_3_2_1_7_1","volume-title":"Operating Systems Review","author":"Castro M.","year":"1999","unstructured":"M. Castro and B. Liskov , \" Practical Byzantine Fault Tolerance \", Operating Systems Review , ACM Press , NY , 173--186, 1999 . M. Castro and B. Liskov, \"Practical Byzantine Fault Tolerance\", Operating Systems Review, ACM Press, NY, 173--186, 1999."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/176979.176981"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/353360.353362"},{"key":"e_1_3_2_1_10_1","volume-title":"The Scotch Parallel Storage Systems,\" Proceedings of the IEEE CompCon Conference","author":"Gibson A.","year":"1995","unstructured":"A. Gibson , D. Stodolsky , F.W. Chang , W.V. Courtright II, C.G. Demetriou , E. Ginting , M. Holland , Q. Ma , L. Neal , R.H. Patterson , J. Su , R. Youssef and J. Zelenka , \" The Scotch Parallel Storage Systems,\" Proceedings of the IEEE CompCon Conference , 1995 . A. Gibson, D. Stodolsky, F.W. Chang, W.V. Courtright II, C.G. Demetriou, E. Ginting, M. Holland, Q. Ma, L. Neal, R.H. Patterson, J. Su, R. Youssef and J. Zelenka, \"The Scotch Parallel Storage Systems,\" Proceedings of the IEEE CompCon Conference, 1995."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.5555\/582987.785953"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/210126.210131"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/191177.191183"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/378993.379239"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/237090.237157"},{"key":"e_1_3_2_1_16_1","volume-title":"The Theory of Error Correcting Codes","author":"MacWilliams F. J.","year":"1977","unstructured":"F. J. MacWilliams and N. J. A. Sloane , The Theory of Error Correcting Codes , Amsterdam : North-Holland , 1977 . F. J. MacWilliams and N. J. A. Sloane, The Theory of Error Correcting Codes, Amsterdam: North-Holland, 1977."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/358746.358762"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/2.16"},{"key":"e_1_3_2_1_19_1","volume-title":"Conference on File and Storage Technologies, work in progress report","author":"Plank J. S.","year":"2002","unstructured":"J. S. Plank , M. and T. Moore , \" Logistical Networking Research and the Network Storage Stack,\" USENIX FAST 2002 , Conference on File and Storage Technologies, work in progress report , January , 2002 . J. S. Plank, M. and T. Moore, \"Logistical Networking Research and the Network Storage Stack,\" USENIX FAST 2002, Conference on File and Storage Technologies, work in progress report, January, 2002."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/62044.62050"},{"issue":"10","key":"e_1_3_2_1_21_1","first-page":"300","article-title":"Polynomial Codes over Certain Finite Fields","volume":"8","author":"Reed I. S.","year":"1960","unstructured":"I. S. Reed and G. Solomon , \" Polynomial Codes over Certain Finite Fields \", J. SIAM , 8 ( 10 ), 300 -- 304 , 1960 . I. S. Reed and G. Solomon, \"Polynomial Codes over Certain Finite Fields\", J. SIAM, 8(10), 300--304, 1960.","journal-title":"J. SIAM"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/2.53351"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/12.54838"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/359168.359176"},{"key":"e_1_3_2_1_25_1","volume-title":"Feb.","author":"Microsystems SUN","year":"1994","unstructured":"SUN Microsystems , Inc . NFS: Network File System version 3 Protocol Specification , Feb. 1994 . SUN Microsystems, Inc. NFS: Network File System version 3 Protocol Specification, Feb. 1994."},{"key":"e_1_3_2_1_26_1","volume-title":"Proc. 9th USENIX Security Symposium","author":"Waldman M.","year":"2000","unstructured":"M. Waldman , A. D. Rubin and L. F. Cranor , \" Publius: A robust, tamper-evident, censorship-resistant, web publishing system \", Proc. 9th USENIX Security Symposium , 59-72, Aug. 2000 . Online at: http:\/\/www.cs.nyu.edu\/~waldman\/publius\/publius.pdf M. Waldman, A. D. Rubin and L. F. Cranor, \"Publius: A robust, tamper-evident, censorship-resistant, web publishing system\", Proc. 9th USENIX Security Symposium, 59-72, Aug. 2000. Online at: http:\/\/www.cs.nyu.edu\/~waldman\/publius\/publius.pdf"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/2.863969"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/18.746809"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/18.782102"}],"event":{"name":"CCS05: 12th ACM Conference on Computer and Communications Security 2005","location":"Fairfax VA USA","acronym":"CCS05","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control","ACM Association for Computing Machinery"]},"container-title":["Proceedings of the 2005 ACM workshop on Storage security and survivability"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1103780.1103797","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1103780.1103797","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T16:07:52Z","timestamp":1750262872000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1103780.1103797"}},"subtitle":["a platform for survivable and secure data storage systems"],"short-title":[],"issued":{"date-parts":[[2005,11,11]]},"references-count":29,"alternative-id":["10.1145\/1103780.1103797","10.1145\/1103780"],"URL":"https:\/\/doi.org\/10.1145\/1103780.1103797","relation":{},"subject":[],"published":{"date-parts":[[2005,11,11]]},"assertion":[{"value":"2005-11-11","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}