{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:49:22Z","timestamp":1750308562874,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":19,"publisher":"ACM","license":[{"start":{"date-parts":[[2015,4,14]],"date-time":"2015-04-14T00:00:00Z","timestamp":1428969600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2015,4,14]]},"DOI":"10.1145\/2732516.2732522","type":"proceedings-article","created":{"date-parts":[[2015,4,3]],"date-time":"2015-04-03T16:27:14Z","timestamp":1428078434000},"page":"73-80","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Data Freshness for Non-Trusted Environments Using Disposable Certificates"],"prefix":"10.1145","author":[{"given":"Kevin","family":"Koerner","sequence":"first","affiliation":[{"name":"University of Tuebingen, Tuebingen, Germany"}]},{"given":"Thomas","family":"Walter","sequence":"additional","affiliation":[{"name":"University of Tuebingen, Tuebingen, Germany"}]},{"given":"Michael","family":"Menth","sequence":"additional","affiliation":[{"name":"University of Tuebingen, Tuebingen, Germany"}]}],"member":"320","published-online":{"date-parts":[[2015,4,14]]},"reference":[{"volume-title":"Dec.","year":"2002","key":"e_1_3_2_1_1_1","unstructured":"Bundesamt f\u00fcr Sicherheit in der Informationstechnik. Zertifizierungsinfrastruktur f\u00fcr die PKI-1-Verwaltung: Regelungen f\u00fcr Gruppenzertifikate. https:\/\/www.bsi.bund.de\/SharedDocs\/Downloads\/DE\/BSI\/VerwaltungsPKI\/reg_gruppzert1_3_pdf.pdf?__blob=publicationFile , Dec. 2002 . Bundesamt f\u00fcr Sicherheit in der Informationstechnik. Zertifizierungsinfrastruktur f\u00fcr die PKI-1-Verwaltung: Regelungen f\u00fcr Gruppenzertifikate. https:\/\/www.bsi.bund.de\/SharedDocs\/Downloads\/DE\/BSI\/VerwaltungsPKI\/reg_gruppzert1_3_pdf.pdf?__blob=publicationFile, Dec. 2002."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.5555\/1754868.1754897"},{"key":"e_1_3_2_1_3_1","volume-title":"ITU-T","author":"Cooper D.","year":"2008","unstructured":"D. Cooper , S. Santesson , S. Farrell , S. Boeyen , R. Housley , and W. Polk . RFC 5280 - Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile. Technical report , ITU-T , May 2008 . D. Cooper, S. Santesson, S. Farrell, S. Boeyen, R. Housley, and W. Polk. RFC 5280 - Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile. Technical report, ITU-T, May 2008."},{"key":"e_1_3_2_1_4_1","first-page":"B1","article-title":"Lightweight public key infrastructure employing disposable certificates","volume":"6763459","author":"Corella F.","year":"2004","unstructured":"F. Corella . Lightweight public key infrastructure employing disposable certificates . In US-Patent US 6763459 B1 , 2004 . F. Corella. Lightweight public key infrastructure employing disposable certificates. In US-Patent US 6763459 B1, 2004.","journal-title":"US-Patent US"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF00196791"},{"key":"e_1_3_2_1_6_1","first-page":"131","volume-title":"in Proc. Network and Distributed Systems Security (NDSS) Symposium 2003","author":"Goh E.","year":"2003","unstructured":"E. jin Goh , H. Shacham , N. Modadugu , and D. Boneh . Sirius: Securing remote untrusted storage . In in Proc. Network and Distributed Systems Security (NDSS) Symposium 2003 , pages 131 -- 145 , 2003 . E. jin Goh, H. Shacham, N. Modadugu, and D. Boneh. Sirius: Securing remote untrusted storage. In in Proc. Network and Distributed Systems Security (NDSS) Symposium 2003, pages 131--145, 2003."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/2408776.2408793"},{"key":"e_1_3_2_1_8_1","unstructured":"K. Koerner and T. Walter. CollabFuL - Secure Collaboration in Research and Teaching. http:\/\/ceres.zdv.uni-tuebingen.de\/forschung\/collabful.html 2015.  K. Koerner and T. Walter. CollabFuL - Secure Collaboration in Research and Teaching. http:\/\/ceres.zdv.uni-tuebingen.de\/forschung\/collabful.html 2015."},{"key":"e_1_3_2_1_9_1","volume-title":"Computer Networking: A Top-Down Approach","author":"Kurose J. F.","year":"2009","unstructured":"J. F. Kurose and K. W. Ross . Computer Networking: A Top-Down Approach . Addison-Wesley Publishing Company , 5 th edition, 2009 . J. F. Kurose and K. W. Ross. Computer Networking: A Top-Down Approach. Addison-Wesley Publishing Company, 5th edition, 2009.","edition":"5"},{"key":"e_1_3_2_1_10_1","first-page":"9","volume-title":"Proceedings of the 6th Conference on Symposium on Opearting Systems Design & Implementation -","volume":"6","author":"Li J.","year":"2004","unstructured":"J. Li , M. Krohn , D. Mazi\u00e8res , and D. Shasha . Secure untrusted data repository (sundr) . In Proceedings of the 6th Conference on Symposium on Opearting Systems Design & Implementation - Volume 6 , OSDI'04, pages 9 -- 9 , Berkeley, CA, USA , 2004 . USENIX Association. J. Li, M. Krohn, D. Mazi\u00e8res, and D. Shasha. Secure untrusted data repository (sundr). In Proceedings of the 6th Conference on Symposium on Opearting Systems Design & Implementation - Volume 6, OSDI'04, pages 9--9, Berkeley, CA, USA, 2004. USENIX Association."},{"key":"e_1_3_2_1_11_1","unstructured":"P. Maheswari and B. Sindhumathi. AFS: Privacy-Preserving Public Auditing With Data Freshness in the Cloud. e-ISSN = 2278-0661 p-ISSN = 2278-8727.  P. Maheswari and B. Sindhumathi. AFS: Privacy-Preserving Public Auditing With Data Freshness in the Cloud. e-ISSN = 2278-0661 p-ISSN = 2278-8727."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.5555\/874075.876406"},{"key":"e_1_3_2_1_13_1","first-page":"369","volume-title":"Advances in Cryptology - CRYPTO '87, A Conference on the Theory and Applications of Cryptographic Techniques, Santa Barbara, California, USA, August 16-20, 1987","author":"Merkle R. C.","year":"1987","unstructured":"R. C. Merkle . A digital signature based on a conventional encryption function . In Advances in Cryptology - CRYPTO '87, A Conference on the Theory and Applications of Cryptographic Techniques, Santa Barbara, California, USA, August 16-20, 1987 , Proceedings , pages 369 -- 378 , 1987 . R. C. Merkle. A digital signature based on a conventional encryption function. In Advances in Cryptology - CRYPTO '87, A Conference on the Theory and Applications of Cryptographic Techniques, Santa Barbara, California, USA, August 16-20, 1987, Proceedings, pages 369--378, 1987."},{"key":"e_1_3_2_1_14_1","volume-title":"Iris: A scalable cloud file system with efficient integrity checks. IACR Cryptology ePrint Archive","author":"Stefanov E.","year":"2011","unstructured":"E. Stefanov , M. van Dijk , A. Oprea , and A. Juels . Iris: A scalable cloud file system with efficient integrity checks. IACR Cryptology ePrint Archive , 2011 :585, 2011. E. Stefanov, M. van Dijk, A. Oprea, and A. Juels. Iris: A scalable cloud file system with efficient integrity checks. IACR Cryptology ePrint Archive, 2011:585, 2011."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/1314354.1314364"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2011.245"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2012.060912.00182"},{"key":"e_1_3_2_1_19_1","volume-title":"Pipelined Hardware. Master's thesis","author":"Yang H.-J.","year":"2012","unstructured":"H.-J. Yang . Efficient Trusted Cloud Storage Using Parallel , Pipelined Hardware. Master's thesis , Massachusetts Institute of Technology , Departement of Electrical Engineering and Computer Science, July 2012 . H.-J. Yang. Efficient Trusted Cloud Storage Using Parallel, Pipelined Hardware. Master's thesis, Massachusetts Institute of Technology, Departement of Electrical Engineering and Computer Science, July 2012."},{"issue":"2","key":"e_1_3_2_1_20_1","first-page":"201","article-title":"Integrity of mobile agents: a new approach","volume":"4","author":"Zwierko A.","year":"2007","unstructured":"A. Zwierko and Z. Kotulski . Integrity of mobile agents: a new approach . I. J. Network Security , 4 ( 2 ): 201 -- 211 , 2007 . A. Zwierko and Z. Kotulski. Integrity of mobile agents: a new approach. I. J. Network Security, 4(2):201--211, 2007.","journal-title":"I. J. Network Security"}],"event":{"name":"ASIA CCS '15: 10th ACM Symposium on Information, Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Singapore Republic of Singapore","acronym":"ASIA CCS '15"},"container-title":["Proceedings of the 3rd International Workshop on Security in Cloud Computing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2732516.2732522","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2732516.2732522","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T19:04:10Z","timestamp":1750273450000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2732516.2732522"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,4,14]]},"references-count":19,"alternative-id":["10.1145\/2732516.2732522","10.1145\/2732516"],"URL":"https:\/\/doi.org\/10.1145\/2732516.2732522","relation":{},"subject":[],"published":{"date-parts":[[2015,4,14]]},"assertion":[{"value":"2015-04-14","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}