{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,27]],"date-time":"2025-11-27T10:36:45Z","timestamp":1764239805382,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":37,"publisher":"ACM","license":[{"start":{"date-parts":[[2013,11,8]],"date-time":"2013-11-08T00:00:00Z","timestamp":1383868800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2013,11,8]]},"DOI":"10.1145\/2517488.2517494","type":"proceedings-article","created":{"date-parts":[[2013,11,12]],"date-time":"2013-11-12T15:29:36Z","timestamp":1384270176000},"page":"35-46","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":11,"title":["Authenticated storage using small trusted hardware"],"prefix":"10.1145","author":[{"given":"Hsin-Jung","family":"Yang","sequence":"first","affiliation":[{"name":"Massachusetts Institute of Technology, Cambridge, Massachusetts, USA"}]},{"given":"Victor","family":"Costan","sequence":"additional","affiliation":[{"name":"Massachusetts Institute of Technology, Cambridge, Massachusetts, USA"}]},{"given":"Nickolai","family":"Zeldovich","sequence":"additional","affiliation":[{"name":"Massachusetts Institute of Technology, Cambridge, Massachusetts, USA"}]},{"given":"Srinivas","family":"Devadas","sequence":"additional","affiliation":[{"name":"Massachusetts Institute of Technology, Cambridge, Massachusetts, USA"}]}],"member":"320","published-online":{"date-parts":[[2013,11,8]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Amazon. Amazon simple storage service. http:\/\/aws.amazon.com\/s3\/.  Amazon. Amazon simple storage service. http:\/\/aws.amazon.com\/s3\/."},{"key":"e_1_3_2_1_2_1","unstructured":"Apple. iCloud. http:\/\/www.apple.com\/icloud\/.  Apple. iCloud. http:\/\/www.apple.com\/icloud\/."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.5555\/1788634.1788637"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.5555\/1946370.1946371"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-01957-9_24"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2009.5270299"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1281100.1281121"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1294261.1294280"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/HST.2011.5954986"},{"key":"e_1_3_2_1_10_1","unstructured":"Dropbox. Dropbox. https:\/\/www.dropbox.com\/.  Dropbox. Dropbox. https:\/\/www.dropbox.com\/."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-74735-2_20"},{"key":"e_1_3_2_1_12_1","volume-title":"Proceedings of the OSDI","author":"Feldman A.","year":"2010","unstructured":"A. Feldman , W. Zeller , M. Freedman , and E. Felten . SPORC: Group collaboration using untrusted cloud resources . In Proceedings of the OSDI , 2010 . A. Feldman, W. Zeller, M. Freedman, and E. Felten. SPORC: Group collaboration using untrusted cloud resources. In Proceedings of the OSDI, 2010."},{"key":"e_1_3_2_1_13_1","volume-title":"Proceedings of 9th International Symposium on High Performance Computer Architecture","author":"Gassend B.","year":"2003","unstructured":"B. Gassend , E. Suh , D. Clarke , M. van Dijk , and S. Devadas . Caches and Merkle trees for efficient memory authentication . In Proceedings of 9th International Symposium on High Performance Computer Architecture , 2003 . B. Gassend, E. Suh, D. Clarke, M. van Dijk, and S. Devadas. Caches and Merkle trees for efficient memory authentication. In Proceedings of 9th International Symposium on High Performance Computer Architecture, 2003."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/1165389.945450"},{"key":"e_1_3_2_1_15_1","volume-title":"Proceedings of NDSS","author":"Goh E.","year":"2003","unstructured":"E. Goh , H. Shacham , N. Modadugu , and D. Boneh . SiRiUS: Securing remote untrusted storage . In Proceedings of NDSS , 2003 . E. Goh, H. Shacham, N. Modadugu, and D. Boneh. SiRiUS: Securing remote untrusted storage. In Proceedings of NDSS, 2003."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-85886-7_6"},{"key":"e_1_3_2_1_17_1","unstructured":"Google. Google cloud storage. https:\/\/developers.google.com\/storage\/.  Google. Google cloud storage. https:\/\/developers.google.com\/storage\/."},{"key":"e_1_3_2_1_18_1","unstructured":"Google. Google drive. https:\/\/drive.google.com\/.  Google. Google drive. https:\/\/drive.google.com\/."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1007\/11693383_7"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/1456469.1456479"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.5555\/1973355.1973358"},{"key":"e_1_3_2_1_22_1","volume-title":"Proceedings of the 6th USENIX Symposium on Networked Systems Design and Implementation","author":"Levin D.","year":"2009","unstructured":"D. Levin , J. Douceur , J. Lorch , and T. Moscibroda . TrInc: small trusted hardware for large distributed systems . In Proceedings of the 6th USENIX Symposium on Networked Systems Design and Implementation , 2009 . D. Levin, J. Douceur, J. Lorch, and T. Moscibroda. TrInc: small trusted hardware for large distributed systems. In Proceedings of the 6th USENIX Symposium on Networked Systems Design and Implementation, 2009."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.5555\/1251254.1251263"},{"key":"e_1_3_2_1_24_1","volume-title":"OSDI","author":"Mahajan P.","year":"2010","unstructured":"P. Mahajan , S. Setty , S. Lee , A. Clement , L. Alvisi , M. Dahlin , and M. Walfish . Depot: Cloud storage with minimal trust . In OSDI , Oct , 2010 . P. Mahajan, S. Setty, S. Lee, A. Clement, L. Alvisi, M. Dahlin, and M. Walfish. Depot: Cloud storage with minimal trust. In OSDI, Oct, 2010."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/HOTOS.2001.990070"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/571825.571840"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.1980.10006"},{"key":"e_1_3_2_1_28_1","volume-title":"Why aren't operating systems getting faster as fast as hardware? Technical report","author":"Ousterhout J.","year":"1989","unstructured":"J. Ousterhout . Why aren't operating systems getting faster as fast as hardware? Technical report , Digital Equipment Corporation Westem Research Laboratory , Oct. 1989 . J. Ousterhout. Why aren't operating systems getting faster as fast as hardware? Technical report, Digital Equipment Corporation Westem Research Laboratory, Oct. 1989."},{"key":"e_1_3_2_1_29_1","volume-title":"Microsoft","author":"Popa R.","year":"2010","unstructured":"R. Popa , J. Lorch , D. Molnar , H. Wang , and L. Zhuang . Enabling security in cloud storage SLAs with CloudProof. Technical report , Microsoft , 2010 . R. Popa, J. Lorch, D. Molnar, H. Wang, and L. Zhuang. Enabling security in cloud storage SLAs with CloudProof. Technical report, Microsoft, 2010."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.5555\/1895085"},{"key":"e_1_3_2_1_31_1","volume-title":"Proceedings of the Summer USENIX conference","author":"Sandberg R.","year":"1985","unstructured":"R. Sandberg , D. Goldberg , S. Kleiman , D. Walsh , and B. Lyon . Design and implementation of the Sun network filesystem . In Proceedings of the Summer USENIX conference , 1985 . R. Sandberg, D. Goldberg, S. Kleiman, D. Walsh, and B. Lyon. Design and implementation of the Sun network filesystem. In Proceedings of the Summer USENIX conference, 1985."},{"key":"e_1_3_2_1_32_1","volume-title":"Network file system (NFS) version 4 protocol. RFC 3530","author":"Shepler S.","year":"2003","unstructured":"S. Shepler , B. Callaghan , D. Robinson , R. Thurlow , C. Beame , M. Eisler , and D. Noveck . Network file system (NFS) version 4 protocol. RFC 3530 , Network Working Group , Apr. 2003 . S. Shepler, B. Callaghan, D. Robinson, R. Thurlow, C. Beame, M. Eisler, and D. Noveck. Network file system (NFS) version 4 protocol. RFC 3530, Network Working Group, Apr. 2003."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/1866835.1866841"},{"key":"e_1_3_2_1_34_1","first-page":"54","article-title":"Networking data integrity: High speed architectures and hardware implementations","volume":"1","author":"Sklavos N.","year":"2003","unstructured":"N. Sklavos , E. Alexopoulos , and O. Koufopavlou . Networking data integrity: High speed architectures and hardware implementations . Int. Arab J. Inf. Technol , 1 : 54 -- 59 , 2003 . N. Sklavos, E. Alexopoulos, and O. Koufopavlou. Networking data integrity: High speed architectures and hardware implementations. Int. Arab J. Inf. Technol, 1:54--59, 2003.","journal-title":"Int. Arab J. Inf. Technol"},{"key":"e_1_3_2_1_35_1","unstructured":"Trusted Computing Group. Trusted Platform Module (TPM) Specifications. https:\/\/www.trustedcomputinggroup.org\/specs\/TPM\/.  Trusted Computing Group. Trusted Platform Module (TPM) Specifications. https:\/\/www.trustedcomputinggroup.org\/specs\/TPM\/."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/1314354.1314364"},{"key":"e_1_3_2_1_37_1","volume-title":"Efficient trusted cloud storage using parallel, pipelined hardware. Master's thesis","author":"Yang H.-J.","year":"2012","unstructured":"H.-J. Yang . Efficient trusted cloud storage using parallel, pipelined hardware. Master's thesis , Massachusetts Institute of Technology , 2012 . H.-J. Yang. Efficient trusted cloud storage using parallel, pipelined hardware. Master's thesis, Massachusetts Institute of Technology, 2012."}],"event":{"name":"CCS'13: 2013 ACM SIGSAC Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Berlin Germany","acronym":"CCS'13"},"container-title":["Proceedings of the 2013 ACM workshop on Cloud computing security workshop"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2517488.2517494","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2517488.2517494","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T07:34:14Z","timestamp":1750232054000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2517488.2517494"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,11,8]]},"references-count":37,"alternative-id":["10.1145\/2517488.2517494","10.1145\/2517488"],"URL":"https:\/\/doi.org\/10.1145\/2517488.2517494","relation":{},"subject":[],"published":{"date-parts":[[2013,11,8]]},"assertion":[{"value":"2013-11-08","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}