{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,9]],"date-time":"2025-09-09T21:15:32Z","timestamp":1757452532490,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":23,"publisher":"ACM","license":[{"start":{"date-parts":[[2009,11,13]],"date-time":"2009-11-13T00:00:00Z","timestamp":1258070400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2009,11,13]]},"DOI":"10.1145\/1655008.1655017","type":"proceedings-article","created":{"date-parts":[[2009,11,17]],"date-time":"2009-11-17T13:30:15Z","timestamp":1258464615000},"page":"67-76","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":33,"title":["On protecting integrity and confidentiality of cryptographic file system for outsourced storage"],"prefix":"10.1145","author":[{"given":"Aaram","family":"Yun","sequence":"first","affiliation":[{"name":"University of Minnesota, Minneapolis, MN, USA"}]},{"given":"Chunhui","family":"Shi","sequence":"additional","affiliation":[{"name":"University of Minnesota, Minneapolis, MN, USA"}]},{"given":"Yongdae","family":"Kim","sequence":"additional","affiliation":[{"name":"University of Minnesota, Minneapolis, MN, USA"}]}],"member":"320","published-online":{"date-parts":[[2009,11,13]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Proceedings of the 5th OSDI","author":"Adya A.","year":"2002","unstructured":"A. Adya , W. J. Bolosky , M. Castro , G. Cermak , R. Chaiken , J. R. Douceur , J. Howell , J. R. Lorch , M. Theimer , R. P. Wattenhofer , FARSITE : Federated, available, and reliable storage for an incompletely trusted environment . Proceedings of the 5th OSDI , 2002 . A. Adya, W. J. Bolosky, M. Castro, G. Cermak, R. Chaiken, J. R. Douceur, J. Howell, J. R. Lorch, M. Theimer, R. P. Wattenhofer, FARSITE: Federated, available, and reliable storage for an incompletely trusted environment. Proceedings of the 5th OSDI, 2002."},{"key":"e_1_3_2_1_2_1","unstructured":"Amazon.com Inc. Amazon Simple Storage Service (Amazon S3) http:\/\/aws.amazon.com\/s3\/  Amazon.com Inc. Amazon Simple Storage Service (Amazon S3) http:\/\/aws.amazon.com\/s3\/"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/11502760_3"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/11426639_10"},{"key":"e_1_3_2_1_5_1","unstructured":"D. J. Bernstein and T. Lange (eds.) eBACS: ECRYPT Benchmarking of Cryptographic Systems. http:\/\/bench.cr.yp.to  D. J. Bernstein and T. Lange (eds.) eBACS: ECRYPT Benchmarking of Cryptographic Systems. http:\/\/bench.cr.yp.to"},{"key":"e_1_3_2_1_6_1","unstructured":"Russell Coker Bonnie++ File System Benchmark http:\/\/www.coker.com.au\/bonnie++\/  Russell Coker Bonnie++ File System Benchmark http:\/\/www.coker.com.au\/bonnie++\/"},{"key":"e_1_3_2_1_7_1","first-page":"79","volume-title":"Advances in Cryptology|CRYPTO 82 (New York","author":"Brassard G.","year":"1983","unstructured":"G. Brassard , On computationally secure authentication tags requiring short secret shared keys , In Advances in Cryptology|CRYPTO 82 (New York , 1983 ), R. L. Rivest, A. Sherman, and D. Chaum, Eds., Plenum Press , pp. 79 -- 86 . G. Brassard, On computationally secure authentication tags requiring short secret shared keys, In Advances in Cryptology|CRYPTO 82 (New York, 1983), R. L. Rivest, A. Sherman, and D. Chaum, Eds., Plenum Press, pp. 79--86."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/800105.803400"},{"key":"e_1_3_2_1_9_1","unstructured":"CoreFS available at http:\/\/sourceforge.net\/projects\/corefs.  CoreFS available at http:\/\/sourceforge.net\/projects\/corefs."},{"key":"e_1_3_2_1_10_1","volume-title":"Master's thesis","author":"Fu K.","year":"1999","unstructured":"K. Fu , Group sharing and random access in cryptographic storage file systems , Master's thesis , Massachusetts Institute of Technology , 1999 . K. Fu, Group sharing and random access in cryptographic storage file systems, Master's thesis, Massachusetts Institute of Technology, 1999."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/505452.505453"},{"key":"e_1_3_2_1_12_1","unstructured":"FUSE available at http:\/\/fuse.sourceforge.net\/.  FUSE available at http:\/\/fuse.sourceforge.net\/."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/11555827_26"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.5555\/1090694.1090698"},{"key":"e_1_3_2_1_15_1","unstructured":"T. Krovetz Fast cryptography. Webpage: http:\/\/fastcrypto.org\/  T. Krovetz Fast cryptography. Webpage: http:\/\/fastcrypto.org\/"},{"key":"e_1_3_2_1_16_1","first-page":"121","volume-title":"OSDI","author":"Li J.","year":"2004","unstructured":"J. Li , M. N. Krohn , D. Mazi\u00e8res , and D. Shasha , Secure untrusted data repository (SUNDR) , in OSDI , 2004 , pp. 121 -- 136 . J. Li, M. N. Krohn, D. Mazi\u00e8res, and D. Shasha, Secure untrusted data repository (SUNDR), in OSDI, 2004, pp. 121--136."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/319151.319160"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/571825.571840"},{"key":"e_1_3_2_1_19_1","first-page":"183","volume-title":"Proceedings of the 16th USENIX Security Symposium","author":"Oprea A.","year":"2007","unstructured":"A. Oprea and M. K. Reiter , Integrity checking in cryptographic file systems with constant trusted storage , in Proceedings of the 16th USENIX Security Symposium , 2007 , pp. 183 -- 198 . A. Oprea and M. K. Reiter, Integrity checking in cryptographic file systems with constant trusted storage, in Proceedings of the 16th USENIX Security Symposium, 2007, pp. 183--198."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.5555\/1306871.1306910"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/1080695.1069972"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.5555\/646761.706150"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.1979.26"}],"event":{"name":"CCS '09: 16th ACM Conference on Computer and Communications Security 2009","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Chicago Illinois USA","acronym":"CCS '09"},"container-title":["Proceedings of the 2009 ACM workshop on Cloud computing security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1655008.1655017","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1655008.1655017","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T12:45:31Z","timestamp":1750250731000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1655008.1655017"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,11,13]]},"references-count":23,"alternative-id":["10.1145\/1655008.1655017","10.1145\/1655008"],"URL":"https:\/\/doi.org\/10.1145\/1655008.1655017","relation":{},"subject":[],"published":{"date-parts":[[2009,11,13]]},"assertion":[{"value":"2009-11-13","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}