{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,31]],"date-time":"2024-10-31T03:18:20Z","timestamp":1730344700258,"version":"3.28.0"},"reference-count":17,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,8,1]]},"DOI":"10.23919\/wac50355.2021.9559519","type":"proceedings-article","created":{"date-parts":[[2021,10,10]],"date-time":"2021-10-10T23:32:30Z","timestamp":1633908750000},"page":"265-270","source":"Crossref","is-referenced-by-count":0,"title":["Secure Data Management using Distributed Storages for Stronger Cybersecurity in Cloud Service"],"prefix":"10.23919","author":[{"given":"Taek-Young","family":"Youn","sequence":"first","affiliation":[]},{"given":"Nam-Su","family":"Jho","sequence":"additional","affiliation":[]},{"given":"Samuel","family":"Woo","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/s11432-017-9116-x"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2015.2481880"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-04444-1_22"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-89255-7_7"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/1315245.1315317"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/1943513.1943546"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653686"},{"key":"ref17","first-page":"1249","article-title":"Trapdoor Digital Shredder: A New Technique for Improved Data Security without Cryptographic Encryption","volume":"14","author":"youn","year":"2020","journal-title":"KSII Transactions on Internet and Information Systems"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2015.7282976"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/2535929"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ICITST.2016.7856692"},{"key":"ref5","first-page":"64","article-title":"Universal Identity and Access Management Framework for Future Ecosystems","volume":"12","author":"pohn","year":"2021","journal-title":"Journal of Wireless Mobile Networks Ubiquitous Computing and Dependable Applications"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046765"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-016-1796-6"},{"key":"ref2","first-page":"35","article-title":"Secure Computation Outsourcing for Inversion in Finite Field","volume":"10","author":"su","year":"2000","journal-title":"Journal of Internet Services and Information Security"},{"key":"ref1","first-page":"2","article-title":"Efficient Distribution and Processing of Data for Parallelizing Data Mining in Mobile Clouds","volume":"11","author":"kholod","year":"2020","journal-title":"Journal of Wireless Mobile Networks Ubiquitous Computing and Dependable Applications"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/1315245.1315317"}],"event":{"name":"2021 World Automation Congress (WAC)","start":{"date-parts":[[2021,8,1]]},"location":"Taipei, Taiwan","end":{"date-parts":[[2021,8,5]]}},"container-title":["2021 World Automation Congress (WAC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9559429\/9559420\/09559519.pdf?arnumber=9559519","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,12,13]],"date-time":"2021-12-13T21:10:37Z","timestamp":1639429837000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9559519\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,8,1]]},"references-count":17,"URL":"https:\/\/doi.org\/10.23919\/wac50355.2021.9559519","relation":{},"subject":[],"published":{"date-parts":[[2021,8,1]]}}}