{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T12:09:27Z","timestamp":1763467767098},"publisher-location":"New York, NY, USA","reference-count":27,"publisher":"ACM","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2006,10,30]]},"DOI":"10.1145\/1179559.1179571","type":"proceedings-article","created":{"date-parts":[[2007,1,17]],"date-time":"2007-01-17T01:15:56Z","timestamp":1168996556000},"page":"61-66","update-policy":"http:\/\/dx.doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":29,"title":["Secure deletion myths, issues, and solutions"],"prefix":"10.1145","author":[{"given":"Nikolai","family":"Joukov","sequence":"first","affiliation":[{"name":"Stony Brook University"}]},{"given":"Harry","family":"Papaxenopoulos","sequence":"additional","affiliation":[{"name":"Stony Brook University"}]},{"given":"Erez","family":"Zadok","sequence":"additional","affiliation":[{"name":"Stony Brook University"}]}],"member":"320","published-online":{"date-parts":[[2006,10,30]]},"reference":[{"key":"e_1_3_2_1_1_1","first-page":"153","volume-title":"Proceedings of the 10th Usenix Security Symposium","author":"Bauer S.","year":"2001","unstructured":"S. Bauer and N.B. Priyantha . Secure Data Deletion for Linux File Systems . In Proceedings of the 10th Usenix Security Symposium , pages 153 -- 164 , Washington, DC , August 2001 . USENIX Association. S. Bauer and N.B. Priyantha. Secure Data Deletion for Linux File Systems. In Proceedings of the 10th Usenix Security Symposium, pages 153--164, Washington, DC, August 2001. USENIX Association."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/1145287.1145303"},{"key":"e_1_3_2_1_3_1","first-page":"91","volume-title":"Proceedings of the Sixth USENIX UNIX Security Symposium","author":"Boneh D.","year":"1996","unstructured":"D. Boneh and R. Lipton . A Revocable Backup System . In Proceedings of the Sixth USENIX UNIX Security Symposium , pages 91 -- 96 , San Jose, CA , July 1996 . USENIX Association. D. Boneh and R. Lipton. A Revocable Backup System. In Proceedings of the Sixth USENIX UNIX Security Symposium, pages 91--96, San Jose, CA, July 1996. USENIX Association."},{"key":"e_1_3_2_1_4_1","volume-title":"Proceedings of the Linux Symposium","author":"Cao M.","year":"2005","unstructured":"M. Cao , T.Y. Tso , B. Pulavarty , S. Bhattacharya , A. Dilger , and A. Tomas . State of the art: Where we are with the ext3 filesystem . In Proceedings of the Linux Symposium , Ottawa, ON, Canada , July 2005 . M. Cao, T.Y. Tso, B. Pulavarty, S. Bhattacharya, A. Dilger, and A. Tomas. State of the art: Where we are with the ext3 filesystem. In Proceedings of the Linux Symposium, Ottawa, ON, Canada, July 2005."},{"key":"e_1_3_2_1_5_1","first-page":"321","volume-title":"Proceedings of the 13th USENIX Security Conference","author":"Chow J.","year":"2004","unstructured":"J. Chow , B. Pfaff , T. Garfinkel , K. Christopher , and M. Rosenblum . Understanding Data Lifetime via Whole System Simulation . In Proceedings of the 13th USENIX Security Conference , pages 321 -- 336 , San Diego, CA , August 2004 . USENIX Association. J. Chow, B. Pfaff, T. Garfinkel, K. Christopher, and M. Rosenblum. Understanding Data Lifetime via Whole System Simulation. In Proceedings of the 13th USENIX Security Conference, pages 321--336, San Diego, CA, August 2004. USENIX Association."},{"key":"e_1_3_2_1_6_1","volume-title":"November","author":"Fitzgerald T.J.","year":"2005","unstructured":"T.J. Fitzgerald . Deleted but Not Gone. New York Times , November 2005 . T.J. Fitzgerald. Deleted but Not Gone. New York Times, November 2005."},{"key":"e_1_3_2_1_7_1","unstructured":"Free Downloads Center. Linux Disk DoD. www.freedownloadscenter.com\/Best\/linux-disk-dod.html.  Free Downloads Center. Linux Disk DoD. www.freedownloadscenter.com\/Best\/linux-disk-dod.html."},{"key":"e_1_3_2_1_8_1","volume-title":"Guide to Selecting Information Security Products","author":"Grance T.","year":"2003","unstructured":"T. Grance , M. Stevens , and M. Myers . Guide to Selecting Information Security Products , chapter 5.9: Media Sanitizing. National Institute of Standards and Technology (NIST) , October 2003 . T. Grance, M. Stevens, and M. Myers. Guide to Selecting Information Security Products, chapter 5.9: Media Sanitizing. National Institute of Standards and Technology (NIST), October 2003."},{"key":"e_1_3_2_1_9_1","first-page":"77","volume-title":"Proceedings of the Sixth USENIX UNIX Security Symposium","author":"Gutmann P.","year":"1996","unstructured":"P. Gutmann . Secure Deletion of Data from Magnetic and Solid-State Memory . In Proceedings of the Sixth USENIX UNIX Security Symposium , pages 77 -- 90 , San Jose, CA , July 1996 . USENIX Association. P. Gutmann. Secure Deletion of Data from Magnetic and Solid-State Memory. In Proceedings of the Sixth USENIX UNIX Security Symposium, pages 77--90, San Jose, CA, July 1996. USENIX Association."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1103780.1103795"},{"key":"e_1_3_2_1_11_1","volume-title":"CMRR Protocols for Disk Drive Secure Erase. Technical report","author":"Hughes G.","year":"2004","unstructured":"G. Hughes . CMRR Protocols for Disk Drive Secure Erase. Technical report , Center for Magnetic Recording Research , University of California, San Diego, October 2004 . http:\/\/cmrr.ucsd.edu\/Hughes\/CmrrSecureEraseProtocols.pdf. G. Hughes. CMRR Protocols for Disk Drive Secure Erase. Technical report, Center for Magnetic Recording Research, University of California, San Diego, October 2004. http:\/\/cmrr.ucsd.edu\/Hughes\/CmrrSecureEraseProtocols.pdf."},{"key":"e_1_3_2_1_12_1","unstructured":"N. Joukov. Patch: Secure Deletion Functionality in Ext3. http:\/\/lwn.net\/Articles\/171924\/ February 2006.  N. Joukov. Patch: Secure Deletion Functionality in Ext3. http:\/\/lwn.net\/Articles\/171924\/ February 2006."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/SISW.2005.1"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1063\/1.372854"},{"key":"e_1_3_2_1_16_1","first-page":"115","volume-title":"Proceedings of the Third USENIX Conference on File and Storage Technologies (FAST 2004","author":"Muniswamy-Reddy K.","year":"2004","unstructured":"K. Muniswamy-Reddy , C.P. Wright , A. Himmer , and E. Zadok . A Versatile and User-Oriented Versioning File System . In Proceedings of the Third USENIX Conference on File and Storage Technologies (FAST 2004 ), pages 115 -- 128 , San Francisco, CA, March\/ April 2004 . USENIX Association. K. Muniswamy-Reddy, C.P. Wright, A. Himmer, and E. Zadok. A Versatile and User-Oriented Versioning File System. In Proceedings of the Third USENIX Conference on File and Storage Technologies (FAST 2004), pages 115--128, San Francisco, CA, March\/April 2004. USENIX Association."},{"key":"e_1_3_2_1_17_1","volume-title":"July","author":"Pendry J.S.","year":"2003","unstructured":"J.S. Pendry , N. Williams , and E. Zadok . Amutils User Manual, 6.1b3 edition , July 2003 . www.am-utils.org. J.S. Pendry, N. Williams, and E. Zadok. Amutils User Manual, 6.1b3 edition, July 2003. www.am-utils.org."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/SISW.2005.5"},{"key":"e_1_3_2_1_19_1","first-page":"143","volume-title":"Proceedings of the Fourth USENIX Conference on File and Storage Technologies (FAST '05)","author":"Peterson Z.N.J.","year":"2005","unstructured":"Z.N.J. Peterson , R. Burns , A. Stubblefield J. Herring , and A.D. Rubin . Secure Deletion for a Versioning File System . In Proceedings of the Fourth USENIX Conference on File and Storage Technologies (FAST '05) , pages 143 -- 154 , San Francisco, CA , December 2005 . USENIX Association. Z.N.J. Peterson, R. Burns, A. Stubblefield J. Herring, and A.D. Rubin. Secure Deletion for a Versioning File System. In Proceedings of the Fourth USENIX Conference on File and Storage Technologies (FAST '05), pages 143--154, San Francisco, CA, December 2005. USENIX Association."},{"key":"e_1_3_2_1_20_1","volume-title":"Free Software Foundation","author":"Plumb C.","year":"2004","unstructured":"C. Plumb . shred(1) - delete a file securely, first overwriting it to hide its contents . Free Software Foundation , August 2004 . C. Plumb. shred(1) - delete a file securely, first overwriting it to hide its contents. Free Software Foundation, August 2004."},{"key":"e_1_3_2_1_21_1","volume-title":"Summer","author":"Rosenbaum J.","year":"2000","unstructured":"J. Rosenbaum . In Defence of the DELETE Key . The Green Bag, 3(4) , Summer 2000 . www.greenbag.org\/rosenbaum deletekey.pdf. J. Rosenbaum. In Defence of the DELETE Key. The Green Bag, 3(4), Summer 2000. www.greenbag.org\/rosenbaum deletekey.pdf."},{"key":"e_1_3_2_1_22_1","volume-title":"Government Printing Office","author":"Sarbanes P.","year":"2002","unstructured":"P. Sarbanes and M.G. Oxley . Sarbanes-Oxley Act of 2002. U.S . Government Printing Office , July 2002 . P. Sarbanes and M.G. Oxley. Sarbanes-Oxley Act of 2002. U.S. Government Printing Office, July 2002."},{"key":"e_1_3_2_1_23_1","volume-title":"Government Printing Office","author":"Service Defense Security","year":"1995","unstructured":"Defense Security Service . National Industrial Security Program Operating Manual (NISPOM), chapter 8: Automated Information System Security. U.S . Government Printing Office , January 1995 . Defense Security Service. National Industrial Security Program Operating Manual (NISPOM), chapter 8: Automated Information System Security. U.S. Government Printing Office, January 1995."},{"key":"e_1_3_2_1_24_1","volume-title":"Inc.","author":"Sobey C.H.","year":"2004","unstructured":"C.H. Sobey . Recovering Unrecoverable Data: The Need for Drive-Independent Data Recovery. Technical report, Action Front Data Recovery Labs , Inc. , April 2004 . C.H. Sobey. Recovering Unrecoverable Data: The Need for Drive-Independent Data Recovery. Technical report, Action Front Data Recovery Labs, Inc., April 2004."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.5555\/998686.1007018"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/1149976.1149979"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.5555\/1267724.1267729"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/1066157.1066203"}],"event":{"name":"CCS06: 13th ACM Conference on Computer and Communications Security 2006","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control","ACM Association for Computing Machinery"],"location":"Alexandria Virginia USA","acronym":"CCS06"},"container-title":["Proceedings of the second ACM workshop on Storage security and survivability"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1179559.1179571","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,7]],"date-time":"2023-01-07T14:01:27Z","timestamp":1673100087000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1179559.1179571"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006,10,30]]},"references-count":27,"alternative-id":["10.1145\/1179559.1179571","10.1145\/1179559"],"URL":"https:\/\/doi.org\/10.1145\/1179559.1179571","relation":{},"subject":[],"published":{"date-parts":[[2006,10,30]]},"assertion":[{"value":"2006-10-30","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}