{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T17:56:31Z","timestamp":1730224591657,"version":"3.28.0"},"reference-count":27,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010,11]]},"DOI":"10.1109\/hase.2010.22","type":"proceedings-article","created":{"date-parts":[[2010,11,19]],"date-time":"2010-11-19T16:29:12Z","timestamp":1290184152000},"page":"152-161","source":"Crossref","is-referenced-by-count":4,"title":["Evaluation and Comparisons of Dependable Distributed Storage Designs for Clouds"],"prefix":"10.1109","author":[{"given":"Liangliang","family":"Xiao","sequence":"first","affiliation":[]},{"given":"Yunqi","family":"Ye","sequence":"additional","affiliation":[]},{"given":"I-Ling","family":"Yen","sequence":"additional","affiliation":[]},{"given":"Farokh","family":"Bastani","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2003.1203461"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/PTP.2004.1334935"},{"key":"ref12","first-page":"74","article-title":"Building intrusion tolerant applications","author":"malkin","year":"2000","journal-title":"DISCEX II"},{"year":"0","key":"ref13"},{"key":"ref14","article-title":"A framework for evaluating storage system security","author":"riedel","year":"2002","journal-title":"FAST"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/502034.502053"},{"key":"ref16","first-page":"643","article-title":"Grid data management pilot(GDMP): A tool for wide area replication","author":"samar","year":"2001","journal-title":"LASTED"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/65000.65002"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/359168.359176"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/1103780.1103793"},{"journal-title":"Common Weakness Enumeration (CWE)","year":"0","key":"ref4"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/502034.502038"},{"journal-title":"Common Vulnerabilities and Exposures (CVE)","year":"0","key":"ref3"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/RELDIS.2001.969727"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/RISP.1991.130780"},{"article-title":"Group sharing and random access in cryptographic storage file systems","year":"1999","author":"fu","key":"ref8"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/1044956.1044960"},{"journal-title":"Common Attack Pattern Enumeration and Classification (CAPEC)","year":"0","key":"ref2"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48329-2_12"},{"key":"ref1","first-page":"313","article-title":"Safeguarding cryptographic keys","volume":"48","author":"blakley","year":"1979","journal-title":"National Computer Conference"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/SC.2004.9"},{"key":"ref22","first-page":"328","article-title":"Erasure coding vs. replication: a quantitative comparison","author":"weatherspoon","year":"2002","journal-title":"IPTPS"},{"key":"ref21","article-title":"Secure data objects replication in data grid","author":"tu","year":"0","journal-title":"accepted by IEEETDSC"},{"key":"ref24","article-title":"Inet-3.0: internet topology generator","author":"winick","year":"2002","journal-title":"Technical Report"},{"key":"ref23","first-page":"307","article-title":"Ceph: a scalable, high-performance distributed file system","author":"weil","year":"2006","journal-title":"OSDI"},{"key":"ref26","article-title":"Selecting the right data distribution scheme for a survivable storage system","author":"wylie","year":"2001","journal-title":"CMU Technical Report"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/2.863969"}],"event":{"name":"2010 IEEE 12th International Symposium on High-Assurance Systems Engineering (HASE)","start":{"date-parts":[[2010,11,3]]},"location":"San Jose, CA, USA","end":{"date-parts":[[2010,11,4]]}},"container-title":["2010 IEEE 12th International Symposium on High Assurance Systems Engineering"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5628339\/5634286\/05634321.pdf?arnumber=5634321","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,21]],"date-time":"2017-03-21T04:03:26Z","timestamp":1490069006000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5634321\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,11]]},"references-count":27,"URL":"https:\/\/doi.org\/10.1109\/hase.2010.22","relation":{},"subject":[],"published":{"date-parts":[[2010,11]]}}}