{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:32:33Z","timestamp":1750307553306,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":22,"publisher":"ACM","license":[{"start":{"date-parts":[[2010,3,22]],"date-time":"2010-03-22T00:00:00Z","timestamp":1269216000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000143","name":"Division of Computing and Communication Foundations","doi-asserted-by":"publisher","award":["CNS-0716532IIS-0803280CCF-0938071"],"award-info":[{"award-number":["CNS-0716532IIS-0803280CCF-0938071"]}],"id":[{"id":"10.13039\/100000143","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000145","name":"Division of Information and Intelligent Systems","doi-asserted-by":"publisher","award":["CNS-0716532IIS-0803280CCF-0938071"],"award-info":[{"award-number":["CNS-0716532IIS-0803280CCF-0938071"]}],"id":[{"id":"10.13039\/100000145","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000144","name":"Division of Computer and Network Systems","doi-asserted-by":"publisher","award":["CNS-0716532IIS-0803280CCF-0938071"],"award-info":[{"award-number":["CNS-0716532IIS-0803280CCF-0938071"]}],"id":[{"id":"10.13039\/100000144","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2010,3,22]]},"DOI":"10.1145\/1739041.1739115","type":"proceedings-article","created":{"date-parts":[[2010,3,16]],"date-time":"2010-03-16T19:27:05Z","timestamp":1268767625000},"page":"621-632","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["Trustworthy vacuuming and litigation holds in long-term high-integrity records retention"],"prefix":"10.1145","author":[{"given":"Ragib","family":"Hasan","sequence":"first","affiliation":[{"name":"University of Illinois at Urbana-Champaign, Urbana, Illinois"}]},{"given":"Marianne","family":"Winslett","sequence":"additional","affiliation":[{"name":"University of Illinois at Urbana-Champaign, Urbana, Illinois"}]}],"member":"320","published-online":{"date-parts":[[2010,3,22]]},"reference":[{"key":"e_1_3_2_1_1_1","first-page":"309","volume":"217","year":"2003","unstructured":"Zubulake v . UBS Warburg LLC. 217 F. R. D. 309 , 322 (S. D. N. Y. 2003 ), 2003. Zubulake v. UBS Warburg LLC. 217 F. R. D. 309, 322 (S. D. N. Y. 2003), 2003.","journal-title":"UBS Warburg LLC."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/1458082.1458197"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.bushor.2008.10.006"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/362686.362692"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.5555\/1788857.1788880"},{"key":"e_1_3_2_1_6_1","volume-title":"Federal rules of civil procedure. Online at http:\/\/www.law.cornell.edu\/rules\/frcp\/","author":"Congress U. S.","year":"2006","unstructured":"U. S. Congress . Federal rules of civil procedure. Online at http:\/\/www.law.cornell.edu\/rules\/frcp\/ , 2006 . U. S. Congress. Federal rules of civil procedure. Online at http:\/\/www.law.cornell.edu\/rules\/frcp\/, 2006."},{"key":"e_1_3_2_1_7_1","volume-title":"Gramm-Leach-Bliley Financial Services Modernization Act. Public. Law No. 106--102, 113 Stat. 1338","author":"Congress of the United States.","year":"1999","unstructured":"Congress of the United States. Gramm-Leach-Bliley Financial Services Modernization Act. Public. Law No. 106--102, 113 Stat. 1338 , 1999 . Congress of the United States. Gramm-Leach-Bliley Financial Services Modernization Act. Public. Law No. 106--102, 113 Stat. 1338, 1999."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/357775.357777"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/564691.564717"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.5555\/876875.879015"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.14778\/1454159.1454207"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2009.125"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.5555\/2074944.2074951"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2009.69"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2002.803864"},{"key":"e_1_3_2_1_16_1","first-page":"2","volume-title":"The CPA Journal","author":"Ruhnka J.","year":"2007","unstructured":"J. Ruhnka and J. W. Bagby . Litigation support and risk management for pretrial discovery of electronically stored information . The CPA Journal , pages 2 -- 6 , May 2007 . J. Ruhnka and J. W. Bagby. Litigation support and risk management for pretrial discovery of electronically stored information. The CPA Journal, pages 2--6, May 2007."},{"key":"e_1_3_2_1_17_1","volume-title":"Proc. of VLDB","author":"Sion R.","year":"2005","unstructured":"R. Sion . Query execution assurance for outsourced databases . In Proc. of VLDB , 2005 . R. Sion. Query execution assurance for outsourced databases. In Proc. of VLDB, 2005."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0169-023X(02)00060-5"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.5555\/1316689.1316734"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/1247480.1247492"},{"key":"e_1_3_2_1_21_1","volume-title":"The Public Company Accounting Reform and Investor Protection Act","author":"Public Law No U.S.","year":"2002","unstructured":"U.S. Public Law No . 107--204, 116 Stat. 745. The Public Company Accounting Reform and Investor Protection Act , 2002 . U.S. Public Law No. 107--204, 116 Stat. 745. The Public Company Accounting Reform and Investor Protection Act, 2002."},{"key":"e_1_3_2_1_22_1","volume-title":"Proc. of VLDB","author":"Xie M.","year":"2007","unstructured":"M. Xie , H. Wang , J. Yin , and X. Meng . Integrity auditing of outsourced data . In Proc. of VLDB , 2007 . M. Xie, H. Wang, J. Yin, and X. Meng. Integrity auditing of outsourced data. In Proc. of VLDB, 2007."}],"event":{"name":"EDBT\/ICDT '10: EDBT\/ICDT '10 joint conference","acronym":"EDBT\/ICDT '10","location":"Lausanne Switzerland"},"container-title":["Proceedings of the 13th International Conference on Extending Database Technology"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1739041.1739115","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1739041.1739115","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T12:23:41Z","timestamp":1750249421000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1739041.1739115"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,3,22]]},"references-count":22,"alternative-id":["10.1145\/1739041.1739115","10.1145\/1739041"],"URL":"https:\/\/doi.org\/10.1145\/1739041.1739115","relation":{},"subject":[],"published":{"date-parts":[[2010,3,22]]},"assertion":[{"value":"2010-03-22","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}