{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T01:18:32Z","timestamp":1725671912935},"reference-count":23,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010,10]]},"DOI":"10.1109\/srds.2010.30","type":"proceedings-article","created":{"date-parts":[[2010,11,17]],"date-time":"2010-11-17T16:53:15Z","timestamp":1290012795000},"page":"194-203","source":"Crossref","is-referenced-by-count":13,"title":["Secure, Dependable, and High Performance Cloud Storage"],"prefix":"10.1109","author":[{"given":"Yunqi","family":"Ye","sequence":"first","affiliation":[]},{"given":"Liangliang","family":"Xiao","sequence":"additional","affiliation":[]},{"given":"I-Ling","family":"Yen","sequence":"additional","affiliation":[]},{"given":"Farokh","family":"Bastani","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1145\/1052812.1052814"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1109\/SRDS.2010.30"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1109\/PRDC.2005.31"},{"year":"0","key":"23"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2008.222"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1007\/BF01786227"},{"key":"16","article-title":"Identification of malicious transactions in database systems","author":"hu","year":"2003","journal-title":"IDEas"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/RELDIS.2005.20"},{"key":"14","article-title":"Towards bounded wait-free PASIS","author":"abd-el-malek","year":"2006","journal-title":"Security to Dependability"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2004.1311884"},{"journal-title":"A read\/write protocol family for versatile storage infrastructures","year":"2005","author":"wylie","key":"12"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.1989.37934"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48329-2_12"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1145\/359545.359563"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1145\/62044.62050"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1145\/359168.359176"},{"key":"10","article-title":"Reperasure: Replication Protocol Using Erasure-Code in Peer-to-Peer Storage Network","author":"zhang","year":"2002","journal-title":"SRDS"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1145\/1294261.1294269"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2006.56"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2003.1203461"},{"journal-title":"Evaluating Dependable Distributed Storage Systems","year":"0","author":"xiao","key":"4"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1145\/114005.102808"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2003.1203503"}],"event":{"name":"2010 IEEE International Symposium on Reliable Distributed Systems (SRDS)","start":{"date-parts":[[2010,10,31]]},"location":"New Delhi, Punjab India","end":{"date-parts":[[2010,11,3]]}},"container-title":["2010 29th IEEE Symposium on Reliable Distributed Systems"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5623378\/5623379\/05623392.pdf?arnumber=5623392","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,19]],"date-time":"2017-03-19T00:17:47Z","timestamp":1489882667000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5623392\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,10]]},"references-count":23,"URL":"https:\/\/doi.org\/10.1109\/srds.2010.30","relation":{},"subject":[],"published":{"date-parts":[[2010,10]]}}}