iBet uBet web content aggregator. Adding the entire web to your favor.
iBet uBet web content aggregator. Adding the entire web to your favor.



Link to original content: https://api.crossref.org/works/10.1002/SCJ.20388
{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,11,15]],"date-time":"2023-11-15T11:41:24Z","timestamp":1700048484620},"reference-count":6,"publisher":"Wiley","issue":"6","license":[{"start":{"date-parts":[[2006,4,21]],"date-time":"2006-04-21T00:00:00Z","timestamp":1145577600000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/onlinelibrary.wiley.com\/termsAndConditions#vor"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Systems &amp; Computers in Japan"],"published-print":{"date-parts":[[2006,6,15]]},"abstract":"Abstract<\/jats:title>A safe and durable storage system is essential for mission critical and safe critical operations. In this paper, the authors propose a distributed storage system that uses the (k<\/jats:italic>, n<\/jats:italic>) threshold scheme. Using the (k<\/jats:italic>, n<\/jats:italic>) threshold scheme enables robustness to network problems or data loss due to disk failures to be increased and data secrecy to be improved at the same time. Since the authors have already developed agents for implementing the basic functions for realizing the distributed storage system, they introduce them here. \u00a9 2006 Wiley Periodicals, Inc. Syst Comp Jpn, 37(6): 55\u201363, 2006; Published online in Wiley InterScience (www.interscience.wiley.com<\/jats:ext-link>). DOI 10.1002\/scj.20388<\/jats:p>","DOI":"10.1002\/scj.20388","type":"journal-article","created":{"date-parts":[[2006,4,21]],"date-time":"2006-04-21T15:50:11Z","timestamp":1145634611000},"page":"55-63","source":"Crossref","is-referenced-by-count":13,"title":["Autonomous distributed secret sharing storage system"],"prefix":"10.1002","volume":"37","author":[{"given":"Toshiyuki","family":"Miyamoto","sequence":"first","affiliation":[]},{"given":"Shinji","family":"Doi","sequence":"additional","affiliation":[]},{"given":"Hiroki","family":"Nogawa","sequence":"additional","affiliation":[]},{"given":"Sadatoshi","family":"Kumagai","sequence":"additional","affiliation":[]}],"member":"311","published-online":{"date-parts":[[2006,4,21]]},"reference":[{"key":"e_1_2_1_2_2","unstructured":"CattaneoG CatuognoL Del SorboA PersianoP.Design and implementation of a transparent cryptographic file system for unix. Proc Freenix Track: 2001 USENIX Annual Technical Conference p199\u2013212 Boston."},{"key":"e_1_2_1_3_2","doi-asserted-by":"publisher","DOI":"10.1145\/359168.359176"},{"key":"e_1_2_1_4_2","first-page":"1228","article-title":"Distributed secret sharing methods and their applications","volume":"81","author":"Ogata W","year":"1999","journal-title":"IEICE J"},{"key":"e_1_2_1_5_2","unstructured":"HayashiD MiyamotoT DoiS KumagaiS.Agents for autonomous distributed secret sharing storage system. Proc 2002 ITC\u2010CSCC p482\u2013485."},{"key":"e_1_2_1_6_2","doi-asserted-by":"publisher","DOI":"10.1109\/5.24143"},{"key":"e_1_2_1_7_2","unstructured":"MiyamotoT KumagaiS.A multi agent net model and the realization of software environment. Proc Workshop of Petri Nets to intelligent system development with 20th International Conference on Application and Theory of Petri Nets p83\u201392 1999."}],"container-title":["Systems and Computers in Japan"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.wiley.com\/onlinelibrary\/tdm\/v1\/articles\/10.1002%2Fscj.20388","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1002\/scj.20388","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,11,15]],"date-time":"2023-11-15T11:14:40Z","timestamp":1700046880000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1002\/scj.20388"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006,4,21]]},"references-count":6,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2006,6,15]]}},"alternative-id":["10.1002\/scj.20388"],"URL":"http:\/\/dx.doi.org\/10.1002\/scj.20388","archive":["Portico"],"relation":{},"ISSN":["0882-1666","1520-684X"],"issn-type":[{"value":"0882-1666","type":"print"},{"value":"1520-684X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2006,4,21]]}}}