{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:38:33Z","timestamp":1750307913633,"version":"3.41.0"},"reference-count":9,"publisher":"Association for Computing Machinery (ACM)","issue":"1","license":[{"start":{"date-parts":[[2007,1,1]],"date-time":"2007-01-01T00:00:00Z","timestamp":1167609600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["SIGOPS Oper. Syst. Rev."],"published-print":{"date-parts":[[2007,1]]},"abstract":"<jats:p>\n            Users are increasingly demanding two contradictory system properties - the ability to absolutely, positively erase information so that it cannot be recovered, and the ability to recover information that was inadvertently or intentionally altered or deleted. Storage system designers now need to resolve the tension between\n            <jats:italic>complete delete<\/jats:italic>\n            and\n            <jats:italic>time machine computing<\/jats:italic>\n            .\n          <\/jats:p>","DOI":"10.1145\/1228291.1228302","type":"journal-article","created":{"date-parts":[[2007,4,5]],"date-time":"2007-04-05T19:52:18Z","timestamp":1175802738000},"page":"42-44","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Complete delete vs. time machine computing"],"prefix":"10.1145","volume":"41","author":[{"given":"Simson L.","family":"Garfinkel","sequence":"first","affiliation":[{"name":"Harvard University"}]}],"member":"320","published-online":{"date-parts":[[2007,1]]},"reference":[{"journal-title":"Department of Computer Science, Princeton University, Princeton, NJ.","article-title":"A Revocable Backup System","author":"Boneh D.","key":"e_1_2_1_1_1"},{"key":"e_1_2_1_2_1","unstructured":"Decru Inc. \"Decru Ships Decru DataFort T520 Security Appliances to Secure Data for Tape Backup \" Decru Press Release December 8 2003.  Decru Inc. \"Decru Ships Decru DataFort T520 Security Appliances to Secure Data for Tape Backup \" Decru Press Release December 8 2003."},{"key":"e_1_2_1_3_1","unstructured":"Garfinkel S. \"Design Principles and Patterns for Computer Systems That Are Simultaneously Secure and Usable \" PhD Thesis Massachusetts Institute of Technology June 2005.   Garfinkel S. \"Design Principles and Patterns for Computer Systems That Are Simultaneously Secure and Usable \" PhD Thesis Massachusetts Institute of Technology June 2005."},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSECP.2003.1176992"},{"key":"e_1_2_1_5_1","first-page":"960","article-title":"Method and System for Placing A Purchase Order Via a Communications Network","volume":"5","author":"Hartman P.","year":"1997","journal-title":"US Patent"},{"key":"e_1_2_1_6_1","doi-asserted-by":"crossref","unstructured":"Kissel R. Scholl M. Skolochenko S. and Li X. \"Guidelines for Media Sanitization \" NIST Special Publication 800--88 September 2006.   Kissel R. Scholl M. Skolochenko S. and Li X. \"Guidelines for Media Sanitization \" NIST Special Publication 800--88 September 2006.","DOI":"10.6028\/NIST.SP.800-88"},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/2163.358092"},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/320719.322582"},{"key":"e_1_2_1_9_1","unstructured":"Seagate \"DriveTrust --- FAQs \" October 31 2006.  Seagate \"DriveTrust --- FAQs \" October 31 2006."}],"container-title":["ACM SIGOPS Operating Systems Review"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1228291.1228302","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1228291.1228302","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T14:47:55Z","timestamp":1750258075000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1228291.1228302"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007,1]]},"references-count":9,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2007,1]]}},"alternative-id":["10.1145\/1228291.1228302"],"URL":"https:\/\/doi.org\/10.1145\/1228291.1228302","relation":{},"ISSN":["0163-5980"],"issn-type":[{"type":"print","value":"0163-5980"}],"subject":[],"published":{"date-parts":[[2007,1]]},"assertion":[{"value":"2007-01-01","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}