{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:33:34Z","timestamp":1750307614914,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":44,"publisher":"ACM","license":[{"start":{"date-parts":[[2008,10,31]],"date-time":"2008-10-31T00:00:00Z","timestamp":1225411200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2008,10,31]]},"DOI":"10.1145\/1456469.1456476","type":"proceedings-article","created":{"date-parts":[[2008,11,6]],"date-time":"2008-11-06T13:49:50Z","timestamp":1225979390000},"page":"27-36","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":7,"title":["Improving secure long-term archival of digitally signed documents"],"prefix":"10.1145","author":[{"given":"Carmela","family":"Troncoso","sequence":"first","affiliation":[{"name":"K.U. Leuven, ESAT\/COSIC-IBBT, Leuven-Heverlee, Belgium"}]},{"given":"Danny","family":"De Cock","sequence":"additional","affiliation":[{"name":"K.U. Leuven, ESAT-IBBT, Leuven-Heverlee, Belgium"}]},{"given":"Bart","family":"Preneel","sequence":"additional","affiliation":[{"name":"K.U. Leuven, ESAT-IBBT, Leuven-Heverlee, Belgium"}]}],"member":"320","published-online":{"date-parts":[[2008,10,31]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Internet Engineering Task Force","author":"Adams C.","year":"2001","unstructured":"C. Adams , P. Cain , D. Pinkas , and R. Zuccherato . Internet X.509 public key infrastructure Time-Stamp protocol (TSP). RFC 3161 , Internet Engineering Task Force , August 2001 . C. Adams, P. Cain, D. Pinkas, and R. Zuccherato. Internet X.509 public key infrastructure Time-Stamp protocol (TSP). RFC 3161, Internet Engineering Task Force, August 2001."},{"key":"e_1_3_2_1_2_1","first-page":"242","volume-title":"Proceedings of Pragocrypt '96","author":"Anderson R.","year":"1996","unstructured":"R. Anderson . The eternity service. In J. Pribyl, editor , Proceedings of Pragocrypt '96 , pages 242 -- 252 , Prague , 1996 . Czech Technical University Publishing House. R. Anderson. The eternity service. In J. Pribyl, editor, Proceedings of Pragocrypt '96, pages 242--252, Prague, 1996. Czech Technical University Publishing House."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/1315245.1315318"},{"key":"e_1_3_2_1_4_1","volume-title":"Proceedings of the IEEE\/IFIP International Conference on Dependable Systems and Networks, 1st Workshop on Hot Topics in System Dependability (HotDep--05)","author":"Baker M.","year":"2005","unstructured":"M. Baker , K. Leaton , and S. Martin . Why traditional storage systems don't help us save stuff forever . In Proceedings of the IEEE\/IFIP International Conference on Dependable Systems and Networks, 1st Workshop on Hot Topics in System Dependability (HotDep--05) , Yokohama, Japan , June 2005 . IEEE Computer Society Press. M. Baker, K. Leaton, and S. Martin. Why traditional storage systems don't help us save stuff forever. In Proceedings of the IEEE\/IFIP International Conference on Dependable Systems and Networks, 1st Workshop on Hot Topics in System Dependability (HotDep--05), Yokohama, Japan, June 2005. IEEE Computer Society Press."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1218063.1217957"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDS.2007.26"},{"key":"e_1_3_2_1_7_1","first-page":"291","volume-title":"IASTED International Conference on Communications, Internet, and Information Technology","author":"Jerman Blazic A.","year":"2004","unstructured":"A. Jerman Blazic and B. Dzonova-Jerman-Blazic . Implementing trustworthy internet based long term electronic preservation service - the eKeeper project. In M. H. Hamza, editor , IASTED International Conference on Communications, Internet, and Information Technology , pages 291 -- 296 , 2004 . A. Jerman Blazic and B. Dzonova-Jerman-Blazic. Implementing trustworthy internet based long term electronic preservation service - the eKeeper project. In M. H. Hamza, editor, IASTED International Conference on Communications, Internet, and Information Technology, pages 291--296, 2004."},{"key":"e_1_3_2_1_8_1","first-page":"240","volume-title":"Provision of long-term archiving service for digitally signed documents using an archive interaction protocol","author":"Jerman Blazic A.","year":"2005","unstructured":"A. Jerman Blazic and P. Sylvester . Provision of long-term archiving service for digitally signed documents using an archive interaction protocol . In D. W. Chadwick and G. Zhao, editors, EuroPKI , pages 240 -- 254 , 2005 . A. Jerman Blazic and P. Sylvester. Provision of long-term archiving service for digitally signed documents using an archive interaction protocol. In D. W. Chadwick and G. Zhao, editors, EuroPKI, pages 240--254, 2005."},{"key":"e_1_3_2_1_9_1","volume-title":"Internet Engineering Task Force","author":"Brandner R.","year":"2007","unstructured":"R. Brandner , U. Pordesch , and T. Gondrom . RFC 4998: Evidence record syntax (ERS). RFC 4998 , Internet Engineering Task Force , August 2007 . R. Brandner, U. Pordesch, and T. Gondrom. RFC 4998: Evidence record syntax (ERS). RFC 4998, Internet Engineering Task Force, August 2007."},{"key":"e_1_3_2_1_10_1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"18","DOI":"10.1007\/978-3-540-30073-1_2","volume-title":"Secure Data Management","author":"Brinkman R.","year":"2004","unstructured":"R. Brinkman , J. Doumen , and W. Jonker . Using secret sharing for searching in encrypted data . In W. Jonker and M. Petkovic, editors, Secure Data Management , volume 3178 of Lecture Notes in Computer Science , pages 18 -- 27 . Springer , 2004 . R. Brinkman, J. Doumen, and W. Jonker. Using secret sharing for searching in encrypted data. In W. Jonker and M. Petkovic, editors, Secure Data Management, volume 3178 of Lecture Notes in Computer Science, pages 18--27. Springer, 2004."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"crossref","unstructured":"J.\n      Camenisch\n     and \n      A.\n      Lysyanskaya\n  . \n  An efficient system for non-transferable anonymous credentials with optional anonymity revocation\n  . In B. Pfitzmann editor EUROCRYPT '01: Proceedings of the International Conference on the Theory and Application of Cryptographic Techniques volume \n  2045\n   of \n  Lecture Notes in Computer Science pages \n  93\n  --\n  118 London UK 2001\n  . \n  Springer\n  .   J. Camenisch and A. Lysyanskaya. An efficient system for non-transferable anonymous credentials with optional anonymity revocation. In B. Pfitzmann editor EUROCRYPT '01: Proceedings of the International Conference on the Theory and Application of Cryptographic Techniques volume 2045 of Lecture Notes in Computer Science pages 93--118 London UK 2001. Springer.","DOI":"10.1007\/3-540-44987-6_7"},{"key":"e_1_3_2_1_12_1","unstructured":"C. Casten. The power of XAM. SNIA Data Management Forum.  C. Casten. The power of XAM. SNIA Data Management Forum."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/4372.4373"},{"key":"e_1_3_2_1_14_1","volume-title":"Proceedings of the 3rd Annual PKI R& D Workshop. NIST","author":"Chokhani S.","year":"2004","unstructured":"S. Chokhani and C. Wallace . Trusted archiving . In Proceedings of the 3rd Annual PKI R& D Workshop. NIST , April 2004 . S. Chokhani and C. Wallace. Trusted archiving. In Proceedings of the 3rd Annual PKI R& D Workshop. NIST, April 2004."},{"key":"e_1_3_2_1_15_1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"148","DOI":"10.1007\/978-3-540-77366-5_15","volume-title":"Proceedings of Financial Cryptography (FC2007)","author":"Danezis G.","year":"2007","unstructured":"G. Danezis and C. Diaz . Space-efficient private search . In R. Dhamija and S. Dietrich, editors, Proceedings of Financial Cryptography (FC2007) , volume 4886 of Lecture Notes in Computer Science , pages 148 -- 162 , Tobago, 2007 . Springer-Verlag . G. Danezis and C. Diaz. Space-efficient private search. In R. Dhamija and S. Dietrich, editors, Proceedings of Financial Cryptography (FC2007), volume 4886 of Lecture Notes in Computer Science, pages 148--162, Tobago, 2007. Springer-Verlag."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/1228291.1228298"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.5555\/1306871.1306893"},{"key":"e_1_3_2_1_18_1","volume-title":"Demonstrating data possession and uncheatable data transfer. Technical report","author":"Filho D. G.","year":"2006","unstructured":"D. G. Filho and P. Barreto . Demonstrating data possession and uncheatable data transfer. Technical report , 2006 . http:\/\/eprint.iacr.org\/. D. G. Filho and P. Barreto. Demonstrating data possession and uncheatable data transfer. Technical report, 2006. http:\/\/eprint.iacr.org\/."},{"key":"e_1_3_2_1_19_1","unstructured":"International Comitee for Information Technology. ANSI\/INCITS 400--2004 SCSI Object--based Storage Device Commands (OSD) 2004.  International Comitee for Information Technology. ANSI\/INCITS 400--2004 SCSI Object--based Storage Device Commands (OSD) 2004."},{"key":"e_1_3_2_1_20_1","volume-title":"ISO standard 14721:2003 space data and information transfer systems-a reference model for an open archival information system (OAIS)","author":"International Organization for Standarization.","year":"2003","unstructured":"International Organization for Standarization. ISO standard 14721:2003 space data and information transfer systems-a reference model for an open archival information system (OAIS) , 2003 . International Organization for Standarization. ISO standard 14721:2003 space data and information transfer systems-a reference model for an open archival information system (OAIS), 2003."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/DISCEX.2001.932171"},{"key":"e_1_3_2_1_22_1","first-page":"159","volume-title":"IS&T Archiving Conference (Archiving","author":"Haber S.","year":"2006","unstructured":"S. Haber and P. Kamat . A content integrity service for long-term digital archives . In IS&T Archiving Conference (Archiving 2006 ), volume 3 , pages 159 -- 164 . The Society for Imaging Science and Technology , May 2006. S. Haber and P. Kamat. A content integrity service for long-term digital archives. In IS&T Archiving Conference (Archiving 2006), volume 3, pages 159--164. The Society for Imaging Science and Technology, May 2006."},{"key":"e_1_3_2_1_23_1","volume-title":"Internet Engineering Task Force","author":"Housley R.","year":"2002","unstructured":"R. Housley , W. Polk , W. Ford , and D. Solo . Internet X.509 public key infrastructure certificate and certificate revocation list (CRL) profile. RFC 3280 , Internet Engineering Task Force , April 2002 . R. Housley, W. Polk, W. Ford, and D. Solo. Internet X.509 public key infrastructure certificate and certificate revocation list (CRL) profile. RFC 3280, Internet Engineering Task Force, April 2002."},{"key":"e_1_3_2_1_24_1","volume-title":"ETSI TS 101 903 - XML advanced electronic signatures (XAdES)","author":"European Telecommunication Standard Institute","year":"2002","unstructured":"European Telecommunication Standard Institute . ETSI TS 101 903 - XML advanced electronic signatures (XAdES) , 2002 . European Telecommunication Standard Institute. ETSI TS 101 903 - XML advanced electronic signatures (XAdES), 2002."},{"key":"e_1_3_2_1_25_1","volume-title":"ITU-T rec. X.509|ISO\/IEC 9594--8: The directory: Authentication framework","author":"ITU.","year":"2000","unstructured":"ITU. ITU-T rec. X.509|ISO\/IEC 9594--8: The directory: Authentication framework , 2000 . ITU. ITU-T rec. X.509|ISO\/IEC 9594--8: The directory: Authentication framework, 2000."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/1315245.1315317"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF02252872"},{"key":"e_1_3_2_1_28_1","first-page":"129","volume-title":"Proceedings of the 2007 USENIX Annual Technical Conference","author":"Kotla R.","year":"2007","unstructured":"R. Kotla , M. Dahlin , and L. Alvisi . SafeStore: A durable and practical storage system . In Proceedings of the 2007 USENIX Annual Technical Conference , pages 129 -- 142 . USENIX, June 2007 . R. Kotla, M. Dahlin, and L. Alvisi. SafeStore: A durable and practical storage system. In Proceedings of the 2007 USENIX Annual Technical Conference, pages 129--142. USENIX, June 2007."},{"key":"e_1_3_2_1_29_1","volume-title":"June","author":"Laboratories RSA","year":"2002","unstructured":"RSA Laboratories . PKCS#1v2.1 : RSA cryptography standard , June 2002 . RSA Laboratories. PKCS#1v2.1: RSA cryptography standard, June 2002."},{"key":"e_1_3_2_1_30_1","volume-title":"Information Warfare","author":"Lenstra A.","year":"2006","unstructured":"A. Lenstra . Key lengths. Handbook of Information Security, Volume II: Information Warfare ; Social, Legal and International Issues; and Security Foundations, Volume II : Information Warfare ; Social, Legal and International Issues; and Security Foundations : 617--635, 2006 . A. Lenstra. Key lengths. Handbook of Information Security, Volume II: Information Warfare; Social, Legal and International Issues; and Security Foundations, Volume II: Information Warfare; Social, Legal and International Issues; and Security Foundations: 617--635, 2006."},{"key":"e_1_3_2_1_31_1","first-page":"31","volume-title":"FAST","author":"Maniatis P.","year":"2002","unstructured":"P. Maniatis and M. Baker . Enabling the archival storage of signed documents . In FAST , pages 31 -- 45 , 2002 . P. Maniatis and M. Baker. Enabling the archival storage of signed documents. In FAST, pages 31--45, 2002."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.5555\/647253.720277"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/1047915.1047917"},{"key":"e_1_3_2_1_34_1","volume-title":"Computerworld","author":"McAdams J.","year":"2007","unstructured":"J. McAdams . 27 billion gigabytes to be archived by 2010 . Computerworld , December 2007 . J. McAdams. 27 billion gigabytes to be archived by 2010. Computerworld, December 2007."},{"key":"e_1_3_2_1_35_1","first-page":"385","volume-title":"Handbook of Applied Cryptography","author":"Menezes A. J.","year":"1996","unstructured":"A. J. Menezes , P. C. Van Oorschot , and S. A. Vanstone . Handbook of Applied Cryptography , chapter 10 - Identification and Entity Authentication, pages 385 -- 424 . CRC Press, Inc. , Boca Raton, FL, USA , 1996 . A. J. Menezes, P. C. Van Oorschot, and S. A. Vanstone. Handbook of Applied Cryptography, chapter 10 - Identification and Entity Authentication, pages 385--424. CRC Press, Inc., Boca Raton, FL, USA, 1996."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.1998.658762"},{"key":"e_1_3_2_1_37_1","volume-title":"Internet Engineering Task Force","author":"Myers M.","year":"1999","unstructured":"M. Myers , R. Ankney , A. Malpani , S. Galperin , and C. Adams . X. 509 internet public key infrastructure online certificate status protocol - OCSP. RFC 2560 , Internet Engineering Task Force , June 1999 . M. Myers, R. Ankney, A. Malpani, S. Galperin, and C. Adams. X.509 internet public key infrastructure online certificate status protocol - OCSP. RFC 2560, Internet Engineering Task Force, June 1999."},{"key":"e_1_3_2_1_38_1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"393","DOI":"10.1007\/978-3-540-71677-8_26","volume-title":"Public Key Cryptography","author":"Ostrovsky R.","year":"2007","unstructured":"R. Ostrovsky and W. E. Skeith III. A survey of single-database private information retrieval: Techniques and applications . In T. Okamoto and X. Wang, editors, Public Key Cryptography , volume 4450 of Lecture Notes in Computer Science , pages 393 -- 411 . Springer-Verlag , 2007 . R. Ostrovsky and W. E. Skeith III. A survey of single-database private information retrieval: Techniques and applications. In T. Okamoto and X. Wang, editors, Public Key Cryptography, volume 4450 of Lecture Notes in Computer Science, pages 393--411. Springer-Verlag, 2007."},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/359340.359342"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/359168.359176"},{"key":"e_1_3_2_1_41_1","first-page":"143","volume-title":"Proceedings of the 2007 USENIX Annual Technical Conference","author":"Storer M. W.","year":"2007","unstructured":"M. W. Storer , K. M. Greenan , E. L. Miller , and K. Voruganti . POTSHARDS: Secure long-term storage without encryption . In Proceedings of the 2007 USENIX Annual Technical Conference , pages 143 -- 156 . USENIX, June 2007 . M. W. Storer, K. M. Greenan, E. L. Miller, and K. Voruganti. POTSHARDS: Secure long-term storage without encryption. In Proceedings of the 2007 USENIX Annual Technical Conference, pages 143--156. USENIX, June 2007."},{"key":"e_1_3_2_1_42_1","volume-title":"Internet Engineering Task Force","author":"Wallace C.","year":"2007","unstructured":"C. Wallace , R. Brandner , and U. Pordesch . Long-term archive service requirements. RFC 4810 , Internet Engineering Task Force , March 2007 . C. Wallace, R. Brandner, and U. Pordesch. Long-term archive service requirements. RFC 4810, Internet Engineering Task Force, March 2007."},{"key":"e_1_3_2_1_43_1","volume-title":"Scientific American, page 2","author":"Walter C.","year":"2005","unstructured":"C. Walter . Kryder's law. Scientific American, page 2 , 2005 . C. Walter. Kryder's law. Scientific American, page 2, 2005."},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/336597.336659"}],"event":{"name":"CCS08: 15th ACM Conference on Computer and Communications Security 2008","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control","ACM Association for Computing Machinery"],"location":"Alexandria Virginia USA","acronym":"CCS08"},"container-title":["Proceedings of the 4th ACM international workshop on Storage security and survivability"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1456469.1456476","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1456469.1456476","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T12:45:44Z","timestamp":1750250744000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1456469.1456476"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,10,31]]},"references-count":44,"alternative-id":["10.1145\/1456469.1456476","10.1145\/1456469"],"URL":"https:\/\/doi.org\/10.1145\/1456469.1456476","relation":{},"subject":[],"published":{"date-parts":[[2008,10,31]]},"assertion":[{"value":"2008-10-31","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}