{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,12,30]],"date-time":"2022-12-30T05:23:50Z","timestamp":1672377830217},"reference-count":91,"publisher":"Association for Computing Machinery (ACM)","issue":"1","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["SIGOPS Oper. Syst. Rev."],"published-print":{"date-parts":[[2011,2,18]]},"abstract":"Secure, fault-tolerant distributed systems are difficult to build, to validate, and to operate. Conservative design for such systems dictates that their security and fault tolerance depend on a very small number of assumptions taken on faith; such assumptions are typically called the \"trusted computing base\" (TCB) of a system. However, a rich trade-off exists between larger TCBs and more secure, more faulttolerant, or more efficient systems. In our recent work, we have explored this trade-off by defining \"small,\" generic trusted primitives--for example, an attested, monotonically sequenced FIFO buffer of a few hundred machine words guaranteed to hold appended words until eviction and showing how such primitives can improve the performance, fault tolerance, and security of systems using them. In this article, we review our efforts in generating simple trusted primitives such as an attested circular buffer (called Attested Appendonly Memory), and an attested human activity detector. We describe the benefits of using these primitives to increase the fault-tolerance of replicated systems and archival storage, and to improve the security of email SPAM and click-fraud prevention systems. Finally, we share some lessons we have learned from this endeavor.<\/jats:p>","DOI":"10.1145\/1945023.1945038","type":"journal-article","created":{"date-parts":[[2011,3,1]],"date-time":"2011-03-01T20:14:26Z","timestamp":1299010466000},"page":"126-141","update-policy":"http:\/\/dx.doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Small trusted primitives for dependable systems"],"prefix":"10.1145","volume":"45","author":[{"given":"Petros","family":"Maniatis","sequence":"first","affiliation":[{"name":"Intel Labs Berkeley"}]},{"given":"Byung-Gon","family":"Chun","sequence":"additional","affiliation":[{"name":"Intel Labs Berkeley"}]}],"member":"320","published-online":{"date-parts":[[2011,2,18]]},"reference":[{"key":"e_1_2_1_1_1","unstructured":"Amazon S3. http:\/\/aws.amazon.com\/s3\/. Amazon S3. http:\/\/aws.amazon.com\/s3\/."},{"key":"e_1_2_1_2_1","unstructured":"Click fraud rate rises to 14.1%. http:\/\/redmondmag.com\/columns\/print.asp?EditorialsID=1456. Click fraud rate rises to 14.1%. http:\/\/redmondmag.com\/columns\/print.asp?EditorialsID=1456."},{"key":"e_1_2_1_3_1","unstructured":"Five percent of web traffic caused by ddos attacks. http:\/\/www.builderau.com.au\/news\/soa\/Fivepercent-of-Web-traffic-caused-by-DDoSattacks\/0 339028227 339287902 00.htm. Five percent of web traffic caused by ddos attacks. http:\/\/www.builderau.com.au\/news\/soa\/Fivepercent-of-Web-traffic-caused-by-DDoSattacks\/0 339028227 339287902 00.htm."},{"key":"e_1_2_1_4_1","unstructured":"Gmail CAPTCHA cracked. http:\/\/securitylabs.websense.com\/content\/Blogs\/2919.aspx. Gmail CAPTCHA cracked. http:\/\/securitylabs.websense.com\/content\/Blogs\/2919.aspx."},{"key":"e_1_2_1_5_1","unstructured":"Intel Active Management Technology (AMT). http:\/\/www.intel.com\/technology\/platformtechnology\/intel-amt\/index.htm. Intel Active Management Technology (AMT). http:\/\/www.intel.com\/technology\/platformtechnology\/intel-amt\/index.htm."},{"key":"e_1_2_1_6_1","unstructured":"Intel cto envisions on-chip data centers. http:\/\/www.informationweek.com\/news\/globalcio\/interviews\/showArticle.jhtml?articleID=221900325. Intel cto envisions on-chip data centers. http:\/\/www.informationweek.com\/news\/globalcio\/interviews\/showArticle.jhtml?articleID=221900325."},{"key":"e_1_2_1_7_1","unstructured":"Java. http:\/\/java.sun.com\/. Java. http:\/\/java.sun.com\/."},{"key":"e_1_2_1_8_1","unstructured":"Six botnets churning out 85% of all spam. http:\/\/arstechnica.com\/news.ars\/post\/20080305-six-botnets-churning-out-85-percent-of-allspam.html. Six botnets churning out 85% of all spam. http:\/\/arstechnica.com\/news.ars\/post\/20080305-six-botnets-churning-out-85-percent-of-allspam.html."},{"key":"e_1_2_1_9_1","unstructured":"Spam reaches all-time high of 95% of all email. http:\/\/www.net-security.org\/secworld.php?id=5545. Spam reaches all-time high of 95% of all email. http:\/\/www.net-security.org\/secworld.php?id=5545."},{"key":"e_1_2_1_10_1","unstructured":"Spammers using porn to break CAPTCHAs. http:\/\/www.schneier.com\/blog\/archives\/2007\/11\/spammers_using.html. Spammers using porn to break CAPTCHAs. http:\/\/www.schneier.com\/blog\/archives\/2007\/11\/spammers_using.html."},{"key":"e_1_2_1_11_1","volume-title":"AdFraud workshop. http:\/\/crypto.stanford.edu\/adfraud\/.","author":"The","unstructured":"The first AdFraud workshop. http:\/\/crypto.stanford.edu\/adfraud\/. The first AdFraud workshop. http:\/\/crypto.stanford.edu\/adfraud\/."},{"key":"e_1_2_1_12_1","unstructured":"Trusted Platform Module (TPM) specifications. https:\/\/www.trustedcomputinggroup.org\/specs\/TPM\/. Trusted Platform Module (TPM) specifications. https:\/\/www.trustedcomputinggroup.org\/specs\/TPM\/."},{"key":"e_1_2_1_13_1","unstructured":"Vista's UAC security prompt was designed to annoy you. http:\/\/arstechnica.com\/news.ars\/post\/20080411-vistas-uac-security-prompt-was-designed-toannoy-you.html. Vista's UAC security prompt was designed to annoy you. http:\/\/arstechnica.com\/news.ars\/post\/20080411-vistas-uac-security-prompt-was-designed-toannoy-you.html."},{"key":"e_1_2_1_14_1","unstructured":"Windows Live Hotmail CAPTCHA cracked exploited. http:\/\/arstechnica.com\/news.ars\/post\/20080415-gone-in-60-seconds-spambot-cracks-livehotmailcaptcha.html. Windows Live Hotmail CAPTCHA cracked exploited. http:\/\/arstechnica.com\/news.ars\/post\/20080415-gone-in-60-seconds-spambot-cracks-livehotmailcaptcha.html."},{"key":"e_1_2_1_15_1","volume-title":"Congress, United States of America. Public Law 104-191: Health Insurance Portability and Accountability Act (HIPAA)","year":"1996","unstructured":"104th Congress, United States of America. Public Law 104-191: Health Insurance Portability and Accountability Act (HIPAA) , 1996 . 104th Congress, United States of America. Public Law 104-191: Health Insurance Portability and Accountability Act (HIPAA), 1996."},{"key":"e_1_2_1_16_1","volume-title":"Congress, United States of America. Public Law 107-204: Sarbanes-Oxley Act of 2002","year":"2002","unstructured":"107th Congress, United States of America. Public Law 107-204: Sarbanes-Oxley Act of 2002 , 2002 . 107th Congress, United States of America. Public Law 107-204: Sarbanes-Oxley Act of 2002, 2002."},{"key":"e_1_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/1095810.1095817"},{"key":"e_1_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1147\/rd.483.0475"},{"key":"e_1_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/12.494101"},{"key":"e_1_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/1217935.1217957"},{"key":"e_1_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/945445.945462"},{"key":"e_1_2_1_22_1","volume-title":"Proc. of CRYPTO","author":"Bellare M.","year":"1993","unstructured":"M. Bellare and P. Rogaway . Entity authentication and key distribution . In Proc. of CRYPTO , 1993 . M. Bellare and P. Rogaway. Entity authentication and key distribution. In Proc. of CRYPTO, 1993."},{"key":"e_1_2_1_23_1","volume-title":"Proc. of USENIX Security","author":"Berger S.","year":"2006","unstructured":"S. Berger , R. C\u00e1ceres , K. A. Goldman , R. Perez , R. Sailer , and L. van Doorn . vTPM : Virtualizing the trusted platform module . In Proc. of USENIX Security , 2006 . S. Berger, R. C\u00e1ceres, K. A. Goldman, R. Perez, R. Sailer, and L. van Doorn. vTPM: Virtualizing the trusted platform module. In Proc. of USENIX Security, 2006."},{"key":"e_1_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/1030083.1030103"},{"key":"e_1_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.31"},{"key":"e_1_2_1_26_1","volume-title":"Proc. of OSDI","author":"Castro M.","year":"1999","unstructured":"M. Castro and B. Liskov . Practical Byzantine fault tolerance . In Proc. of OSDI , 1999 . M. Castro and B. Liskov. Practical Byzantine fault tolerance. In Proc. of OSDI, 1999."},{"key":"e_1_2_1_27_1","volume-title":"Proc. of OSDI","author":"Castro M.","year":"2000","unstructured":"M. Castro and B. Liskov . Proactive Recovery in a Byzantine-Fault-Tolerant System . In Proc. of OSDI , 2000 . M. Castro and B. Liskov. Proactive Recovery in a Byzantine-Fault-Tolerant System. In Proc. of OSDI, 2000."},{"key":"e_1_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/571637.571640"},{"key":"e_1_2_1_29_1","volume-title":"Proc. of NSDI","author":"Chun B.-G.","year":"2006","unstructured":"B.-G. Chun , F. Dabek , A. Haeberlen , E. Sit , H. Weatherspoon , M. F. Kaashoek , J. Kubiatowicz , and R. Morris . Efficient replica maintenance for distributed storage systems . In Proc. of NSDI , 2006 . B.-G. Chun, F. Dabek, A. Haeberlen, E. Sit, H. Weatherspoon, M. F. Kaashoek, J. Kubiatowicz, and R. Morris. Efficient replica maintenance for distributed storage systems. In Proc. of NSDI, 2006."},{"key":"e_1_2_1_30_1","volume-title":"Proc. of USENIX ATC","author":"Chun B.-G.","year":"2008","unstructured":"B.-G. Chun , P. Maniatis , and S. Shenker . Diverse replication for single-machine Byzantine-fault tolerance . In Proc. of USENIX ATC , 2008 . B.-G. Chun, P. Maniatis, and S. Shenker. Diverse replication for single-machine Byzantine-fault tolerance. In Proc. of USENIX ATC, 2008."},{"key":"e_1_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/1294261.1294280"},{"key":"e_1_2_1_32_1","volume-title":"Proc. of USENIX FAST","author":"Chun B.-G.","year":"2009","unstructured":"B.-G. Chun , P. Maniatis , S. Shenker , and J. Kubiatowicz . Tiered Fault Tolerance for Long-Term Integrity . In Proc. of USENIX FAST , 2009 . B.-G. Chun, P. Maniatis, S. Shenker, and J. Kubiatowicz. Tiered Fault Tolerance for Long-Term Integrity. In Proc. of USENIX FAST, 2009."},{"key":"e_1_2_1_33_1","volume-title":"European Dependable Computing","author":"Correia M.","year":"2002","unstructured":"M. Correia , P. Verissimo , and N. F. Neves . The design of a COTS real-time distribued security kernel . In European Dependable Computing , 2002 . M. Correia, P. Verissimo, and N. F. Neves. The design of a COTS real-time distribued security kernel. In European Dependable Computing, 2002."},{"key":"e_1_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/2.955100"},{"key":"e_1_2_1_35_1","volume-title":"Proc. of OSDI","author":"Geambasu R.","year":"2010","unstructured":"R. Geambasu , A. A. Levy , T. Kohno , A. Krishnamurthy , and H. M. Levy . Comet: An Active Distributed Key-Value Store . In Proc. of OSDI , 2010 . R. Geambasu, A. A. Levy, T. Kohno, A. Krishnamurthy, and H. M. Levy. Comet: An Active Distributed Key-Value Store. In Proc. of OSDI, 2010."},{"key":"e_1_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.5555\/1791688.1791726"},{"key":"e_1_2_1_37_1","volume-title":"Dynamics of a Trusted Platform","author":"Grawrock D.","year":"2008","unstructured":"D. Grawrock . Dynamics of a Trusted Platform . Intel Press , 2008 . D. Grawrock. Dynamics of a Trusted Platform. Intel Press, 2008."},{"key":"e_1_2_1_38_1","volume-title":"Proc. of NSDI","author":"Gummadi R.","year":"2009","unstructured":"R. Gummadi , H. Balakrishnan , P. Maniatis , and S. Ratnasamy . Not-a-Bot: improving service availability in the face of botnet attacks . In Proc. of NSDI , 2009 . R. Gummadi, H. Balakrishnan, P. Maniatis, and S. Ratnasamy. Not-a-Bot: improving service availability in the face of botnet attacks. In Proc. of NSDI, 2009."},{"key":"e_1_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF00196791"},{"key":"e_1_2_1_40_1","volume-title":"Decentralized Storage Despite Massive Correlated Failures. In Proc. of NSDI","author":"Haeberlen A.","year":"2005","unstructured":"A. Haeberlen , A. Mislove , and P. Druschel . Glacier: Highly Durable , Decentralized Storage Despite Massive Correlated Failures. In Proc. of NSDI , 2005 . A. Haeberlen, A. Mislove, and P. Druschel. Glacier: Highly Durable, Decentralized Storage Despite Massive Correlated Failures. In Proc. of NSDI, 2005."},{"key":"e_1_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/78969.78972"},{"key":"e_1_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/1272996.1273032"},{"key":"e_1_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/1243418.1243424"},{"key":"e_1_2_1_44_1","volume-title":"USENIX HotDep","author":"Junqueira F. P.","year":"2005","unstructured":"F. P. Junqueira and K. Marzullo . The virtue of dependent failures in multi-site systems . In USENIX HotDep , 2005 . F. P. Junqueira and K. Marzullo. The virtue of dependent failures in multi-site systems. In USENIX HotDep, 2005."},{"key":"e_1_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/1455770.1455774"},{"key":"e_1_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/1629575.1629596"},{"key":"e_1_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.5555\/647502.728330"},{"key":"e_1_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/378993.379239"},{"key":"e_1_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/279227.279229"},{"key":"e_1_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/357172.357176"},{"key":"e_1_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/138873.138874"},{"key":"e_1_2_1_52_1","volume-title":"Proc. of NSDI","author":"Leonini L.","year":"2009","unstructured":"L. Leonini , \u00c9. Rivi\u00e9re, and P. Felber . SPLAY: distributed systems evaluation made simple (or how to turn ideas into live systems in a breeze) . In Proc. of NSDI , 2009 . L. Leonini, \u00c9. Rivi\u00e9re, and P. Felber. SPLAY: distributed systems evaluation made simple (or how to turn ideas into live systems in a breeze). In Proc. of NSDI, 2009."},{"key":"e_1_2_1_53_1","volume-title":"Proc. of NSDI","author":"Levin D.","year":"2009","unstructured":"D. Levin , J. R. Douceur , J. R. Lorch , and T. Moscibroda . TrInc: Small Trusted Hardware for Large Distributed Systems . In Proc. of NSDI , 2009 . D. Levin, J. R. Douceur, J. R. Lorch, and T. Moscibroda. TrInc: Small Trusted Hardware for Large Distributed Systems. In Proc. of NSDI, 2009."},{"key":"e_1_2_1_54_1","volume-title":"Proc. of OSDI","author":"Li J.","year":"2004","unstructured":"J. Li , M. Krohn , D. Mazi ` eres, and D. Shasha. Secure untrusted data repository (SUNDR) . In Proc. of OSDI , 2004 . J. Li, M. Krohn, D. Mazi`eres, and D. Shasha. Secure untrusted data repository (SUNDR). In Proc. of OSDI, 2004."},{"key":"e_1_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1145\/1095810.1095818"},{"key":"e_1_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1145\/258533.258650"},{"key":"e_1_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1109\/69.842262"},{"key":"e_1_2_1_58_1","volume-title":"Proc. of USENIX Security","author":"Maniatis P.","year":"2002","unstructured":"P. Maniatis and M. Baker . Secure History Preservation Through Timeline Entanglement . In Proc. of USENIX Security , 2002 . P. Maniatis and M. Baker. Secure History Preservation Through Timeline Entanglement. In Proc. of USENIX Security, 2002."},{"key":"e_1_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1145\/1047915.1047917"},{"key":"e_1_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1145\/1572272.1572303"},{"key":"e_1_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1145\/1831708.1831730"},{"key":"e_1_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.17"},{"key":"e_1_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1145\/1352592.1352625"},{"key":"e_1_2_1_64_1","volume-title":"Proc. of CRYPTO","author":"Merkle R. C.","year":"1987","unstructured":"R. C. Merkle . A digital signature based on a conventional encryption function . In Proc. of CRYPTO , 1987 . R. C. Merkle. A digital signature based on a conventional encryption function. In Proc. of CRYPTO, 1987."},{"key":"e_1_2_1_65_1","volume-title":"Consensus with dual failure modes","author":"Meyer F.","year":"1987","unstructured":"F. Meyer and D. Pradhan . Consensus with dual failure modes . In IEEE Fault-Tolerant Computing , 1987 . F. Meyer and D. Pradhan. Consensus with dual failure modes. In IEEE Fault-Tolerant Computing, 1987."},{"key":"e_1_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.1145\/1132026.1132027"},{"key":"e_1_2_1_67_1","doi-asserted-by":"publisher","DOI":"10.1145\/1346256.1346278"},{"key":"e_1_2_1_68_1","doi-asserted-by":"publisher","DOI":"10.1007\/bf00196774"},{"key":"e_1_2_1_69_1","doi-asserted-by":"publisher","DOI":"10.1145\/238721.238781"},{"key":"e_1_2_1_70_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.32"},{"key":"e_1_2_1_71_1","volume-title":"Mar.","author":"Preimesberger C.","year":"2007","unstructured":"C. Preimesberger . Intel Faces Up to E- Mail Retention Problems in AMD Lawsuit . eWeek. com , Mar. 2007 . Fetched on 10\/9\/2007 from http:\/\/www.eweek.com\/article2\/0,1759,2101674,00.asp. C. Preimesberger. Intel Faces Up to E-Mail Retention Problems in AMD Lawsuit. eWeek. com, Mar. 2007. Fetched on 10\/9\/2007 from http:\/\/www.eweek.com\/article2\/0,1759,2101674,00.asp."},{"key":"e_1_2_1_72_1","doi-asserted-by":"publisher","DOI":"10.1145\/1326257.1326258"},{"key":"e_1_2_1_73_1","doi-asserted-by":"publisher","DOI":"10.1145\/945445.945448"},{"key":"e_1_2_1_74_1","volume-title":"Proc. of NSDI","author":"Sen S.","year":"2010","unstructured":"S. Sen , W. Lloyd , and M. J. Freedman . Prophecy: Using History for High-Throughput Fault Tolerance . In Proc. of NSDI , 2010 . S. Sen, W. Lloyd, and M. J. Freedman. Prophecy: Using History for High-Throughput Fault Tolerance. In Proc. of NSDI, 2010."},{"key":"e_1_2_1_75_1","doi-asserted-by":"publisher","DOI":"10.1145\/1095810.1095812"},{"key":"e_1_2_1_76_1","doi-asserted-by":"publisher","DOI":"10.1145\/1141277.1141435"},{"key":"e_1_2_1_77_1","doi-asserted-by":"publisher","DOI":"10.5555\/645520.655970"},{"key":"e_1_2_1_78_1","doi-asserted-by":"publisher","DOI":"10.1109\/RELDIS.1988.25784"},{"key":"e_1_2_1_79_1","doi-asserted-by":"publisher","DOI":"10.1145\/358198.358210"},{"key":"e_1_2_1_80_1","first-page":"2584","article-title":"Can they be reconciled?","author":"Verissimo P.","year":"2003","unstructured":"P. Verissimo . Uncertainty and Predictability : Can they be reconciled? LCNS: FuDiCo , 2584 , 2003 . P. Verissimo. Uncertainty and Predictability: Can they be reconciled? LCNS: FuDiCo, 2584, 2003.","journal-title":"LCNS: FuDiCo"},{"key":"e_1_2_1_81_1","doi-asserted-by":"publisher","DOI":"10.5555\/647881.737914"},{"key":"e_1_2_1_82_1","doi-asserted-by":"publisher","DOI":"10.1145\/1122480.1122497"},{"key":"e_1_2_1_84_1","doi-asserted-by":"publisher","DOI":"10.5555\/1766171.1766196"},{"key":"e_1_2_1_85_1","doi-asserted-by":"publisher","DOI":"10.1145\/1159913.1159948"},{"key":"e_1_2_1_86_1","doi-asserted-by":"publisher","DOI":"10.1145\/1015467.1015489"},{"key":"e_1_2_1_87_1","volume-title":"Proc. of USENIX Security","author":"Whitten A.","year":"1999","unstructured":"A. Whitten and J. D. Tygar . Why Johnny can't encrypt: A usability evaluation of PGP 5.0 . In Proc. of USENIX Security , 1999 . A. Whitten and J. D. Tygar. Why Johnny can't encrypt: A usability evaluation of PGP 5.0. In Proc. of USENIX Security, 1999."},{"key":"e_1_2_1_88_1","volume-title":"Proc. of OSDI","author":"Williams D.","year":"2008","unstructured":"D. Williams , P. Reynolds , K. Walsh , E. G. Sirer , and F. B. Schneider . Device driver safety through a reference validation mechanism . In Proc. of OSDI , 2008 . D. Williams, P. Reynolds, K. Walsh, E. G. Sirer, and F. B. Schneider. Device driver safety through a reference validation mechanism. In Proc. of OSDI, 2008."},{"key":"e_1_2_1_89_1","doi-asserted-by":"publisher","DOI":"10.1007\/11513988_13"},{"key":"e_1_2_1_90_1","doi-asserted-by":"publisher","DOI":"10.1145\/945445.945470"},{"key":"e_1_2_1_91_1","doi-asserted-by":"publisher","DOI":"10.5555\/1267903.1267909"},{"key":"e_1_2_1_92_1","doi-asserted-by":"publisher","DOI":"10.1145\/1735997.1736008"}],"container-title":["ACM SIGOPS Operating Systems Review"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1945023.1945038","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,12,29]],"date-time":"2022-12-29T18:47:52Z","timestamp":1672339672000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1945023.1945038"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,2,18]]},"references-count":91,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2011,2,18]]}},"alternative-id":["10.1145\/1945023.1945038"],"URL":"https:\/\/doi.org\/10.1145\/1945023.1945038","relation":{},"ISSN":["0163-5980"],"issn-type":[{"value":"0163-5980","type":"print"}],"subject":[],"published":{"date-parts":[[2011,2,18]]},"assertion":[{"value":"2011-02-18","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}