{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,9]],"date-time":"2026-04-09T14:27:48Z","timestamp":1775744868871,"version":"3.50.1"},"reference-count":40,"publisher":"Association for Computing Machinery (ACM)","issue":"1","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Inf. Syst. Secur."],"published-print":{"date-parts":[[2006,2]]},"abstract":"<jats:p>\n            In 1998, Blaze, Bleumer, and Strauss (BBS) proposed an application called\n            <jats:italic>atomic proxy re-encryption<\/jats:italic>\n            , in which a semitrusted proxy converts a ciphertext for Alice into a ciphertext for Bob\n            <jats:italic>without<\/jats:italic>\n            seeing the underlying plaintext. We predict that fast and secure re-encryption will become increasingly popular as a method for managing encrypted file systems. Although efficiently computable, the wide-spread adoption of BBS re-encryption has been hindered by considerable security risks. Following recent work of Dodis and Ivan, we present new re-encryption schemes that realize a stronger notion of security and demonstrate the usefulness of proxy re-encryption as a method of adding access control to a secure file system. Performance measurements of our experimental file system demonstrate that proxy re-encryption can work effectively in practice.\n          <\/jats:p>","DOI":"10.1145\/1127345.1127346","type":"journal-article","created":{"date-parts":[[2006,5,8]],"date-time":"2006-05-08T16:09:20Z","timestamp":1147104560000},"page":"1-30","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":916,"title":["Improved proxy re-encryption schemes with applications to secure distributed storage"],"prefix":"10.1145","volume":"9","author":[{"given":"Giuseppe","family":"Ateniese","sequence":"first","affiliation":[{"name":"The Johns Hopkins University, Baltimore, MD"}]},{"given":"Kevin","family":"Fu","sequence":"additional","affiliation":[{"name":"University of Massachusetts, Amherst, MA"}]},{"given":"Matthew","family":"Green","sequence":"additional","affiliation":[{"name":"The Johns Hopkins University, Baltimore, MD"}]},{"given":"Susan","family":"Hohenberger","sequence":"additional","affiliation":[{"name":"Massachusetts Institute of Technology, Cambridge, MA"}]}],"member":"320","published-online":{"date-parts":[[2006,2]]},"reference":[{"key":"e_1_2_1_1_1","volume-title":"United States Congress. 1996","year":"1996","unstructured":"104th United States Congress. 1996 . Health Insurance Portability and Accountability Act of 1996 (HIPPA). http:\/\/aspe.hhs.gov\/admnsimp\/pl104191.htm; Last access: August 16, 2004.]] 104th United States Congress. 1996. Health Insurance Portability and Accountability Act of 1996 (HIPPA). http:\/\/aspe.hhs.gov\/admnsimp\/pl104191.htm; Last access: August 16, 2004.]]"},{"key":"e_1_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/844128.844130"},{"key":"e_1_2_1_3_1","doi-asserted-by":"crossref","unstructured":"An J. H. Dodis Y. and \n      Rabin T\n  . \n  2002\n  . On the security of joint signature and encryption. \n  In Proceedings of Eurocrypt\n   '02. Vol. \n  2332\n   of \n  LNCS\n  . 83--107.]]   An J. H. Dodis Y. and Rabin T. 2002. On the security of joint signature and encryption. In Proceedings of Eurocrypt '02. Vol. 2332 of LNCS. 83--107.]]","DOI":"10.1007\/3-540-46035-7_6"},{"key":"e_1_2_1_4_1","volume-title":"Proceedings of the 12th Annual Network and Distributed System Security Symposium. Internet Society, 29--44","author":"Ateniese G.","unstructured":"Ateniese , G. , Fu , K. , Green , M. , and Hohenberger , S . 2005. Improved proxy re-encryption schemes with applications to secure distributed storage . In Proceedings of the 12th Annual Network and Distributed System Security Symposium. Internet Society, 29--44 .]] Ateniese, G., Fu, K., Green, M., and Hohenberger, S. 2005. Improved proxy re-encryption schemes with applications to secure distributed storage. In Proceedings of the 12th Annual Network and Distributed System Security Symposium. Internet Society, 29--44.]]"},{"key":"e_1_2_1_5_1","doi-asserted-by":"crossref","unstructured":"Baek J. Steinfeld R. and \n      Zheng Y\n  . \n  2002\n  . Formal proofs for the security of signcryption. \n  In Proceedings of Public Key Cryptography\n   '02. Vol. \n  2274\n   of \n  LNCS\n  . 80--98.]]   Baek J. Steinfeld R. and Zheng Y. 2002. Formal proofs for the security of signcryption. In Proceedings of Public Key Cryptography '02. Vol. 2274 of LNCS. 80--98.]]","DOI":"10.1007\/3-540-45664-3_6"},{"key":"e_1_2_1_6_1","volume-title":"ACM Conference on Computer and Communications Security. 9--16","author":"Blaze M.","year":"1993","unstructured":"Blaze , M. 1993 . A cryptographic file system for UNIX . In ACM Conference on Computer and Communications Security. 9--16 .]] 10.1145\/168588.168590 Blaze, M. 1993. A cryptographic file system for UNIX. In ACM Conference on Computer and Communications Security. 9--16.]] 10.1145\/168588.168590"},{"key":"e_1_2_1_7_1","volume-title":"Proceedings of Eurocrypt '98","volume":"1403","author":"Blaze M.","unstructured":"Blaze , M. , Bleumer , G. , and Strauss , M . 1998. Divertible protocols and atomic proxy cryptography . In Proceedings of Eurocrypt '98 . Vol. 1403 . 127--144.]] Blaze, M., Bleumer, G., and Strauss, M. 1998. Divertible protocols and atomic proxy cryptography. In Proceedings of Eurocrypt '98. Vol. 1403. 127--144.]]"},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1137\/S0097539701398521"},{"key":"e_1_2_1_9_1","volume-title":"Proceedings of Asiacrypt '01","volume":"2248","author":"Boneh D.","unstructured":"Boneh , D. , Shacham , H. , and Lynn , B . 2001. Short signatures from the Weil pairing . In Proceedings of Asiacrypt '01 . Vol. 2248 . 514--532.]] Boneh, D., Shacham, H., and Lynn, B. 2001. Short signatures from the Weil pairing. In Proceedings of Asiacrypt '01. Vol. 2248. 514--532.]]"},{"key":"e_1_2_1_10_1","doi-asserted-by":"crossref","unstructured":"Boneh D. Gentry C. Lynn B. and \n      Shacham H\n  . \n  2003\n  . Aggregate and verifiably encrypted signatures. \n  In Proceedings of Eurocrypt\n   '03. Vol. \n  2656\n   of \n  LNCS\n  . 416--432.]]  Boneh D. Gentry C. Lynn B. and Shacham H. 2003. Aggregate and verifiably encrypted signatures. In Proceedings of Eurocrypt '03. Vol. 2656 of LNCS. 416--432.]]","DOI":"10.1007\/3-540-39200-9_26"},{"key":"e_1_2_1_11_1","doi-asserted-by":"crossref","unstructured":"Bresson E. Catalano D. and \n      Pointcheval D\n  . \n  2003\n  . A simple public-key cryptosystem. \n  In Proceedings of Asiacrypt\n   '03. Vol. \n  2894\n   of \n  LNCS\n  . 37--54.]]  Bresson E. Catalano D. and Pointcheval D. 2003. A simple public-key cryptosystem. In Proceedings of Asiacrypt '03. Vol. 2894 of LNCS. 37--54.]]","DOI":"10.1007\/978-3-540-40061-5_3"},{"key":"e_1_2_1_12_1","volume-title":"Archive: Report 2002\/117.]]","author":"Cheon J. H.","year":"2001","unstructured":"Cheon , J. H. and Lee , D. H . 2001 . Diffie-Hellman problems and bilinear maps. Cryptology ePrint Archive: Report 2002\/117.]] Cheon, J. H. and Lee, D. H. 2001. Diffie-Hellman problems and bilinear maps. Cryptology ePrint Archive: Report 2002\/117.]]"},{"key":"e_1_2_1_13_1","doi-asserted-by":"crossref","unstructured":"Cramer R.\n     and \n      Shoup V\n  . \n  2002\n  . Universal hash proofs and a paradigm for adaptive chosen ciphertext secure public-key encryption. \n  In Proceedings of Eurocrypt\n   '02. Vol. \n  2332\n   of \n  LNCS\n  . 45--64.]]   Cramer R. and Shoup V. 2002. Universal hash proofs and a paradigm for adaptive chosen ciphertext secure public-key encryption. In Proceedings of Eurocrypt '02. Vol. 2332 of LNCS. 45--64.]]","DOI":"10.1007\/3-540-46035-7_4"},{"key":"e_1_2_1_14_1","doi-asserted-by":"crossref","unstructured":"Dodis Y. Franklin M. K. Katz J. Miyaji A. and \n      Yung M\n  . \n  2003\n  . Intrusion-resilient public-key encryption. \n  In Proceedings of CT-RSA\n   '03. Vol. \n  2612\n   of \n  LNCS\n  . 19--32.]]  Dodis Y. Franklin M. K. Katz J. Miyaji A. and Yung M. 2003. Intrusion-resilient public-key encryption. In Proceedings of CT-RSA '03. Vol. 2612 of LNCS. 19--32.]]","DOI":"10.1007\/3-540-36563-X_2"},{"key":"e_1_2_1_15_1","doi-asserted-by":"crossref","unstructured":"Dodis Y. Franklin M. K. Katz J. Miyaji A. and \n      Yung M\n  . \n  2004\n  . A generic construction for intrusion-resilient public-key encryption. \n  In Proceedings of CT-RSA\n   '04. Vol. \n  2964\n   of \n  LNCS\n  . 81--98.]]  Dodis Y. Franklin M. K. Katz J. Miyaji A. and Yung M. 2004. A generic construction for intrusion-resilient public-key encryption. In Proceedings of CT-RSA '04. Vol. 2964 of LNCS. 81--98.]]","DOI":"10.1007\/978-3-540-24660-2_7"},{"key":"e_1_2_1_16_1","volume-title":"Proceedings of the Tenth Network and Distributed System Security Symposium.]]","author":"Dodis Y.","unstructured":"Dodis , Y. and Ivan , A . 2003. Proxy cryptography revisited . In Proceedings of the Tenth Network and Distributed System Security Symposium.]] Dodis, Y. and Ivan, A. 2003. Proxy cryptography revisited. In Proceedings of the Tenth Network and Distributed System Security Symposium.]]"},{"key":"e_1_2_1_17_1","doi-asserted-by":"crossref","unstructured":"Dodis Y.\n     and \n      Yampolskiy A\n  . \n  2005\n  . A verifiable random function with short proofs an keys. \n  In Public Key Cryptography\n  . Vol. \n  3386\n   of \n  LNCS\n  . 416--431.]] 10.1007\/978-3-540-30580-4_28   Dodis Y. and Yampolskiy A. 2005. A verifiable random function with short proofs an keys. In Public Key Cryptography. Vol. 3386 of LNCS. 416--431.]] 10.1007\/978-3-540-30580-4_28","DOI":"10.1007\/978-3-540-30580-4_28"},{"key":"e_1_2_1_18_1","doi-asserted-by":"crossref","unstructured":"Dodis Y. Katz J. Xu S. and \n      Yung M\n  . \n  2002\n  . Key-insulated public key cryptosystems. \n  In Proceedings of Eurocrypt\n   '02. Vol. \n  2332\n   of \n  LNCS\n  . 65--82.]]   Dodis Y. Katz J. Xu S. and Yung M. 2002. Key-insulated public key cryptosystems. In Proceedings of Eurocrypt '02. Vol. 2332 of LNCS. 65--82.]]","DOI":"10.1007\/3-540-46035-7_5"},{"key":"e_1_2_1_19_1","volume-title":"Proceedings of Crypto '84","author":"Elgamal T.","year":"1984","unstructured":"Elgamal , T. 1984 . A public key cryptosystem and a signature scheme based on discrete logarithms . In Proceedings of Crypto '84 . 10--18.]] Elgamal, T. 1984. A public key cryptosystem and a signature scheme based on discrete logarithms. In Proceedings of Crypto '84. 10--18.]]"},{"key":"e_1_2_1_20_1","doi-asserted-by":"crossref","unstructured":"Fiat A.\n     and \n      Shamir A\n  . \n  1986\n  . How to prove yourself: Practical solutions to identification and signature problems. \n  In Proceedings of Crypto\n   '86. Vol. \n  263\n   of \n  LNCS\n  . 186--194.]]   Fiat A. and Shamir A. 1986. How to prove yourself: Practical solutions to identification and signature problems. In Proceedings of Crypto '86. Vol. 263 of LNCS. 186--194.]]","DOI":"10.1007\/3-540-47721-7_12"},{"key":"e_1_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/505452.505453"},{"key":"e_1_2_1_24_1","doi-asserted-by":"crossref","unstructured":"Fujisaki E.\n     and \n      Okamoto T\n  . \n  1999\n  . Secure integration of asymmetric and symmetric encryption schemes. \n  In Proceedings of Crypto\n   '99. Vol. \n  1666\n   of \n  LNCS\n  . 537--554.]]   Fujisaki E. and Okamoto T. 1999. Secure integration of asymmetric and symmetric encryption schemes. In Proceedings of Crypto '99. Vol. 1666 of LNCS. 537--554.]]","DOI":"10.1007\/3-540-48405-1_34"},{"key":"e_1_2_1_25_1","doi-asserted-by":"crossref","unstructured":"Galbraith S. D. Harrison K. and \n      Soldera D\n  . \n  2002\n  . Implementing the Tate pairing. In Proceedings of the \n  Algorithmic Number Theory Symposium\n  . Vol. \n  2369\n   of \n  LNCS\n  . 324--337.]]   Galbraith S. D. Harrison K. and Soldera D. 2002. Implementing the Tate pairing. In Proceedings of the Algorithmic Number Theory Symposium. Vol. 2369 of LNCS. 324--337.]]","DOI":"10.1007\/3-540-45455-1_26"},{"key":"e_1_2_1_26_1","volume-title":"Proceedings of the Tenth Network and Distributed System Security Symposium. 131--145","author":"Goh E.-J.","unstructured":"Goh , E.-J. , Shacham , H. , Modadugu , N. , and Boneh , D . 2003. SiRiUS: Securing remote untrusted storage . In Proceedings of the Tenth Network and Distributed System Security Symposium. 131--145 .]] Goh, E.-J., Shacham, H., Modadugu, N., and Boneh, D. 2003. SiRiUS: Securing remote untrusted storage. In Proceedings of the Tenth Network and Distributed System Security Symposium. 131--145.]]"},{"key":"e_1_2_1_27_1","doi-asserted-by":"crossref","first-page":"270","DOI":"10.1016\/0022-0000(84)90070-9","article-title":"Probabilistic encryption","volume":"28","author":"Goldwasser S.","year":"1984","unstructured":"Goldwasser , S. and Micali , S. 1984 . Probabilistic encryption . Journal of Computer and System Sciences 28 , 2, 270 -- 299 .]] Goldwasser, S. and Micali, S. 1984. Probabilistic encryption. Journal of Computer and System Sciences 28, 2, 270--299.]]","journal-title":"Journal of Computer and System Sciences"},{"key":"e_1_2_1_28_1","doi-asserted-by":"crossref","unstructured":"Golle P. Jakobsson M. Juels A. and \n      Syverson P. F\n  . \n  2004\n  . Universal re-encryption for mixnets. \n  In Proceedings of CT-RSA\n   '04. Vol. \n  2964\n   of \n  LNCS\n  . 163--178.]]  Golle P. Jakobsson M. Juels A. and Syverson P. F. 2004. Universal re-encryption for mixnets. In Proceedings of CT-RSA '04. Vol. 2964 of LNCS. 163--178.]]","DOI":"10.1007\/978-3-540-24660-2_14"},{"key":"e_1_2_1_29_1","volume-title":"Proceedings of 8th ACM Symposium on Access Control Models and Technologies (SACMAT","author":"Harrington A.","year":"2003","unstructured":"Harrington , A. and Jensen , C . 2003. Cryptographic access control in a distributed file system . In Proceedings of 8th ACM Symposium on Access Control Models and Technologies (SACMAT 2003 ). ACM, Villa Gallia, Como, Italy.]] 10.1145\/775412.775432 Harrington, A. and Jensen, C. 2003. Cryptographic access control in a distributed file system. In Proceedings of 8th ACM Symposium on Access Control Models and Technologies (SACMAT 2003). ACM, Villa Gallia, Como, Italy.]] 10.1145\/775412.775432"},{"key":"e_1_2_1_30_1","volume-title":"Proceedings of Public Key Cryptography. 112--121","author":"Jakobsson M.","year":"1999","unstructured":"Jakobsson , M. 1999 . On quorum controlled asymmetric proxy re-encryption . In Proceedings of Public Key Cryptography. 112--121 .]] Jakobsson, M. 1999. On quorum controlled asymmetric proxy re-encryption. In Proceedings of Public Key Cryptography. 112--121.]]"},{"key":"e_1_2_1_31_1","series-title":"Lecture Notes in Computer Science.","volume-title":"Proceedings of ANTS-IV conference","author":"Joux A.","unstructured":"Joux , A. 2000. A one-round protocol for tripartite Diffie-Hellman . In Proceedings of ANTS-IV conference , Lecture Notes in Computer Science. Vol. 1838 . 385--394.]] Joux, A. 2000. A one-round protocol for tripartite Diffie-Hellman. In Proceedings of ANTS-IV conference, Lecture Notes in Computer Science. Vol. 1838. 385--394.]]"},{"key":"e_1_2_1_32_1","volume-title":"Proceedings of the Second USENIX Conference on File and Storage Technologies.]]","author":"Kallahalla M.","unstructured":"Kallahalla , M. , Riedel , E. , Swaminathan , R. , Wang , Q. , and Fu , K . 2003. Plutus: scalable secure file sharing on untrusted storage . In Proceedings of the Second USENIX Conference on File and Storage Technologies.]] Kallahalla, M., Riedel, E., Swaminathan, R., Wang, Q., and Fu, K. 2003. Plutus: scalable secure file sharing on untrusted storage. In Proceedings of the Second USENIX Conference on File and Storage Technologies.]]"},{"key":"e_1_2_1_33_1","volume-title":"Proceedings of the 6th Symposium on Operating Systems Design and Implementation","author":"Li J.","unstructured":"Li , J. , Krohn , M. N. , Mazi\u00e8res , D. , and Shasha , D . 2004. Secure untrusted data repository (SUNDR) . In Proceedings of the 6th Symposium on Operating Systems Design and Implementation . San Francisco, CA, 91--106.]] Li, J., Krohn, M. N., Mazi\u00e8res, D., and Shasha, D. 2004. Secure untrusted data repository (SUNDR). In Proceedings of the 6th Symposium on Operating Systems Design and Implementation. San Francisco, CA, 91--106.]]"},{"key":"e_1_2_1_34_1","article-title":"Proxy cryptosystems: Delegation of the power to decrypt ciphertexts. IEICE","author":"Mambo M.","year":"1997","unstructured":"Mambo , M. and Okamoto , E. 1997 . Proxy cryptosystems: Delegation of the power to decrypt ciphertexts. IEICE Trans. Fund. Electronics Communications and Computer Science E80-A\/1, 54--63.]] Mambo, M. and Okamoto, E. 1997. Proxy cryptosystems: Delegation of the power to decrypt ciphertexts. IEICE Trans. Fund. Electronics Communications and Computer Science E80-A\/1, 54--63.]]","journal-title":"Trans. Fund. Electronics Communications and Computer Science E80-A\/1, 54--63.]]"},{"key":"e_1_2_1_35_1","volume-title":"Proceedings of the 10th USENIX Security Symposium.]]","author":"Perlman R.","unstructured":"Perlman , R. and Kaufman , C . 2001. PDM: A new strong password-based protocol . In Proceedings of the 10th USENIX Security Symposium.]] Perlman, R. and Kaufman, C. 2001. PDM: A new strong password-based protocol. In Proceedings of the 10th USENIX Security Symposium.]]"},{"key":"e_1_2_1_36_1","volume-title":"Swallow: A distributed data storage system for a local network. In Local Networks for Computer Communications","author":"Reed D.","year":"1981","unstructured":"Reed , D. and Svobodova , L . 1981 . Swallow: A distributed data storage system for a local network. In Local Networks for Computer Communications , A. West and P. Janson, Eds. North-Holland, Amsterdam , 355--373.]] Reed, D. and Svobodova, L. 1981. Swallow: A distributed data storage system for a local network. In Local Networks for Computer Communications, A. West and P. Janson, Eds. North-Holland, Amsterdam, 355--373.]]"},{"key":"e_1_2_1_37_1","volume-title":"Proceedings of the 13th ACM Symposium on Operating Systems Principles (SOSP)","author":"Rosenblum M.","unstructured":"Rosenblum , M. and Ousterhout , J . 1991. The design and implementation of a log-structured file system . In Proceedings of the 13th ACM Symposium on Operating Systems Principles (SOSP) . Pacific Grove, CA. 1--15.]] 10.1145\/121132.121137 Rosenblum, M. and Ousterhout, J. 1991. The design and implementation of a log-structured file system. In Proceedings of the 13th ACM Symposium on Operating Systems Principles (SOSP). Pacific Grove, CA. 1--15.]] 10.1145\/121132.121137"},{"key":"e_1_2_1_38_1","first-page":"161","article-title":"Efficient signature generation by smart cards","volume":"4","author":"Schnorr C.-P.","year":"1991","unstructured":"Schnorr , C.-P. 1991 . Efficient signature generation by smart cards . Journal of Cryptography 4 , 161 -- 174 .]] Schnorr, C.-P. 1991. Efficient signature generation by smart cards. Journal of Cryptography 4, 161--174.]]","journal-title":"Journal of Cryptography"},{"key":"e_1_2_1_39_1","unstructured":"Scott M. 2005. MIRACL library. Indigo Software. http:\/\/indigo.ie\/~mscott\/#download.]]  Scott M. 2005. MIRACL library. Indigo Software. http:\/\/indigo.ie\/~mscott\/#download.]]"},{"key":"e_1_2_1_40_1","series-title":"LNCS","volume-title":"Proceedings of Eurocrypt '97.","author":"Shoup V.","unstructured":"Shoup , V. 1997. Lower bounds of discrete logarithms and related problems . In Proceedings of Eurocrypt '97. Vol. 1233 of LNCS . 256--266.]] Shoup, V. 1997. Lower bounds of discrete logarithms and related problems. In Proceedings of Eurocrypt '97. Vol. 1233 of LNCS. 256--266.]]"},{"key":"e_1_2_1_41_1","series-title":"LNCS","volume-title":"Proceedings of ISW '97.","author":"Zheng Y.","unstructured":"Zheng , Y. 1997. Signcryption and its applications in efficient public key solutions . In Proceedings of ISW '97. Vol. 1396 of LNCS . 291--312.]] Zheng, Y. 1997. Signcryption and its applications in efficient public key solutions. In Proceedings of ISW '97. Vol. 1396 of LNCS. 291--312.]]"},{"key":"e_1_2_1_42_1","volume-title":"Tech. Rep. 2004--1924, Cornell Computer Science Department","author":"Zhou L.","year":"2004","unstructured":"Zhou , L. , Marsh , M. A. , Schneider , F. B. , and Redz , A . 2004 . Distributed blinding for ElGamal re-encryption. Tech. Rep. 2004--1924, Cornell Computer Science Department , Ithaca, NY .]] Zhou, L., Marsh, M. A., Schneider, F. B., and Redz, A. 2004. Distributed blinding for ElGamal re-encryption. Tech. Rep. 2004--1924, Cornell Computer Science Department, Ithaca, NY.]]"}],"container-title":["ACM Transactions on Information and System Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1127345.1127346","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,12,28]],"date-time":"2022-12-28T19:38:21Z","timestamp":1672256301000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1127345.1127346"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006,2]]},"references-count":40,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2006,2]]}},"alternative-id":["10.1145\/1127345.1127346"],"URL":"https:\/\/doi.org\/10.1145\/1127345.1127346","relation":{},"ISSN":["1094-9224","1557-7406"],"issn-type":[{"value":"1094-9224","type":"print"},{"value":"1557-7406","type":"electronic"}],"subject":[],"published":{"date-parts":[[2006,2]]},"assertion":[{"value":"2006-02-01","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}