iBet uBet web content aggregator. Adding the entire web to your favor.
iBet uBet web content aggregator. Adding the entire web to your favor.



Link to original content: https://api.crossref.org/works/10.1109/TCC.2015.2489638
{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,7,23]],"date-time":"2024-07-23T05:13:16Z","timestamp":1721711596456},"reference-count":54,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"3","license":[{"start":{"date-parts":[[2017,7,1]],"date-time":"2017-07-01T00:00:00Z","timestamp":1498867200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Cloud Comput."],"published-print":{"date-parts":[[2017,7,1]]},"DOI":"10.1109\/tcc.2015.2489638","type":"journal-article","created":{"date-parts":[[2015,10,13]],"date-time":"2015-10-13T16:20:10Z","timestamp":1444753210000},"page":"428-442","source":"Crossref","is-referenced-by-count":10,"title":["TruXy: Trusted Storage Cloud for Scientific Workflows"],"prefix":"10.1109","volume":"5","author":[{"given":"Surya","family":"Nepal","sequence":"first","affiliation":[]},{"given":"Richard O.","family":"Sinnott","sequence":"additional","affiliation":[]},{"given":"Carsten","family":"Friedrich","sequence":"additional","affiliation":[]},{"given":"Catherine","family":"Wise","sequence":"additional","affiliation":[]},{"given":"Shiping","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Sehrish","family":"Kanwal","sequence":"additional","affiliation":[]},{"given":"Jinhui","family":"Yao","sequence":"additional","affiliation":[]},{"given":"Andrew","family":"Lonie","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/CLOUD.2011.35"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653688"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2011.24"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCSW.2010.36"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2007.190647"},{"key":"ref30","doi-asserted-by":"crossref","first-page":"1432","DOI":"10.1109\/TKDE.2011.62","article-title":"A privacy-preserving remote data integrity checking protocol with data dynamics and public verifiability","volume":"23","author":"hao","year":"2011","journal-title":"IEEE Trans Knowl Data Eng"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1145\/1315245.1315317"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1145\/1460877.1460889"},{"key":"ref35","first-page":"598","article-title":"Provable data possession at untrusted stores","author":"ateniese","year":"0","journal-title":"Proc 14th ACM Conf Comput Commun Security"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2010.5510914"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2013.191"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2011.245"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2013.2295611"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/ESCIW.2009.5408002"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/eScience.2008.167"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/CyberC.2011.80"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/CCGrid.2013.109"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/DSNW.2011.5958795"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/CEC.2011.45"},{"key":"ref23","first-page":"32","article-title":"Twin clouds: Secure cloud computing with low latency","author":"bugiel","year":"0","journal-title":"Proc 12th Int Conf Commun Multimedia Security"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-79228-4_1"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2005.42"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/PDCAT.2013.49"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1145\/505452.505453"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/MobServ.2012.11"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/71.910866"},{"key":"ref52","first-page":"333","article-title":"Swift\/RAID: A distributed RAID system","volume":"7","author":"long","year":"1994","journal-title":"Comput Syst"},{"key":"ref10","doi-asserted-by":"crossref","first-page":"358","DOI":"10.1002\/cpe.3282","article-title":"The Australia urban research gateway","volume":"27","author":"sinnott","year":"2014","journal-title":"Concurrency Comput Pract Experience"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1093\/bioinformatics\/bth361"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1145\/2535929"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-85729-439-5_6"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1093\/bioinformatics\/btt199"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1534\/genetics.112.144204"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1038\/nbt.2028"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-39640-3_27"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/eScience.2013.33"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/CCGRID.2010.17"},{"key":"ref19","doi-asserted-by":"crossref","author":"liu","year":"2012","journal-title":"Design Cloud Workflow Systems","DOI":"10.1007\/978-1-4614-1933-4"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-84996-241-4_9"},{"key":"ref3","first-page":"825","article-title":"Science clouds: Early experiences in cloud computing for scientific applications","author":"keahey","year":"2008","journal-title":"Proc Workshop Cloud Comput Appl"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/CLOUD.2010.64"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-84628-757-2"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1186\/gb-2010-11-8-r86"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4419-6524-0_13"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046767"},{"key":"ref9","first-page":"11","article-title":"Pegasus: Mapping scientific workflows onto the grid","author":"deelman","year":"0","journal-title":"Proc 2nd Eur AcrossGrids Conf Grid Comput"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/35.312841"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/MSST.2010.5496972"},{"key":"ref48","first-page":"8","article-title":"The HybrEx model for confidentiality and privacy in cloud computing","author":"ko","year":"0","journal-title":"Proc 3rd USENIX Conf Hot Topics Cloud Comput"},{"key":"ref47","first-page":"297","article-title":"Airavat: Security and privacy for MapReduce","author":"roy","year":"0","journal-title":"Proc 7th USENIX Conf Netw Syst Des Implementation"},{"key":"ref42","doi-asserted-by":"crossref","first-page":"995","DOI":"10.1109\/TPDS.2011.252","article-title":"A secure erasure code-based cloud storage system with secure data forwarding","volume":"23","author":"lin","year":"2012","journal-title":"IEEE Trans Parallel Distrib Syst"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653686"},{"key":"ref44","article-title":"Cs2: A searchable cryptographic cloud storage system","author":"kamara","year":"2011"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/CIT.2010.171"}],"container-title":["IEEE Transactions on Cloud Computing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6245519\/8024042\/07296593.pdf?arnumber=7296593","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,10,11]],"date-time":"2021-10-11T02:35:10Z","timestamp":1633919710000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7296593\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,7,1]]},"references-count":54,"journal-issue":{"issue":"3"},"URL":"https:\/\/doi.org\/10.1109\/tcc.2015.2489638","relation":{},"ISSN":["2168-7161"],"issn-type":[{"value":"2168-7161","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,7,1]]}}}