{"id":"https://openalex.org/W2083719953","doi":"https://doi.org/10.1109/fskd.2011.6019976","title":"Research and implementation of user data cryptographic mechanism based on VFS","display_name":"Research and implementation of user data cryptographic mechanism based on VFS","publication_year":2011,"publication_date":"2011-07-01","ids":{"openalex":"https://openalex.org/W2083719953","doi":"https://doi.org/10.1109/fskd.2011.6019976","mag":"2083719953"},"language":"en","primary_location":{"id":"doi:10.1109/fskd.2011.6019976","is_oa":false,"landing_page_url":"https://doi.org/10.1109/fskd.2011.6019976","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2011 Eighth International Conference on Fuzzy Systems and Knowledge Discovery (FSKD)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100641549","display_name":"Kui Wu","orcid":"https://orcid.org/0000-0002-2069-0032"},"institutions":[{"id":"https://openalex.org/I96852419","display_name":"Capital Normal University","ror":"https://ror.org/005edt527","country_code":"CN","type":"education","lineage":["https://openalex.org/I96852419"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Kui Wu","raw_affiliation_strings":["JFR of CNU&ICT, Capital Normal University, Beijing, China","JFR of CNU&ICT, Capital Normal Univ., Beijing, China"],"affiliations":[{"raw_affiliation_string":"JFR of CNU&ICT, Capital Normal University, Beijing, China","institution_ids":["https://openalex.org/I96852419"]},{"raw_affiliation_string":"JFR of CNU&ICT, Capital Normal Univ., Beijing, China","institution_ids":["https://openalex.org/I96852419"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100739644","display_name":"Jingang Liu","orcid":"https://orcid.org/0000-0001-6629-1646"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Jingang Liu","raw_affiliation_strings":["JFR of CNU&ICT, ICT of CAS&CNU, Beijing, China"],"affiliations":[{"raw_affiliation_string":"JFR of CNU&ICT, ICT of CAS&CNU, Beijing, China","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5100641549"],"corresponding_institution_ids":["https://openalex.org/I96852419"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.12539788,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"37","issue":null,"first_page":"2557","last_page":"2560"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12941","display_name":"Embedded Systems and FPGA Design","score":0.9002000093460083,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12941","display_name":"Embedded Systems and FPGA Design","score":0.9002000093460083,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7856084108352661},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.7167987823486328},{"id":"https://openalex.org/keywords/directory","display_name":"Directory","score":0.6453914642333984},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.5653690099716187},{"id":"https://openalex.org/keywords/file-system","display_name":"File system","score":0.4812219440937042},{"id":"https://openalex.org/keywords/data-security","display_name":"Data security","score":0.44298216700553894},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.41805362701416016},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.39266476035118103},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.36790990829467773},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.33262765407562256}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7856084108352661},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.7167987823486328},{"id":"https://openalex.org/C2777683733","wikidata":"https://www.wikidata.org/wiki/Q201456","display_name":"Directory","level":2,"score":0.6453914642333984},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.5653690099716187},{"id":"https://openalex.org/C2780940931","wikidata":"https://www.wikidata.org/wiki/Q174989","display_name":"File system","level":2,"score":0.4812219440937042},{"id":"https://openalex.org/C10511746","wikidata":"https://www.wikidata.org/wiki/Q899388","display_name":"Data security","level":3,"score":0.44298216700553894},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.41805362701416016},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.39266476035118103},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.36790990829467773},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.33262765407562256}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/fskd.2011.6019976","is_oa":false,"landing_page_url":"https://doi.org/10.1109/fskd.2011.6019976","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2011 Eighth International Conference on Fuzzy Systems and Knowledge Discovery (FSKD)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions","score":0.44999998807907104}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":8,"referenced_works":["https://openalex.org/W160356688","https://openalex.org/W200839506","https://openalex.org/W2160571105","https://openalex.org/W2369443772","https://openalex.org/W2373904972","https://openalex.org/W2374864365","https://openalex.org/W6606517376","https://openalex.org/W6683530858"],"related_works":["https://openalex.org/W3115906952","https://openalex.org/W3134811395","https://openalex.org/W3155196058","https://openalex.org/W4252960523","https://openalex.org/W350349969","https://openalex.org/W4382053117","https://openalex.org/W3214026606","https://openalex.org/W2809887432","https://openalex.org/W4387194003","https://openalex.org/W4221042637"],"abstract_inverted_index":{"In":[0],"order":[1],"to":[2,8,14,35],"meet":[3],"the":[4,16,46,57,86],"desire":[5],"of":[6,20,48],"people":[7],"modern":[9],"operation":[10,41],"system":[11,42,53,70],"mobility":[12],"and":[13,33,39,56,79,81],"consider":[15],"missing":[17],"or":[18,91],"stolen":[19],"device":[21,88],"that":[22],"will":[23],"leak":[24],"user":[25,49,58,78],"sensitive":[26],"data,":[27],"a":[28,37],"method":[29],"based":[30,62],"on":[31,63],"Aufs":[32],"eCryptfs":[34,68],"build":[36],"secure":[38],"steady":[40],"is":[43,60,71,89],"presented.":[44],"Meanwhile,":[45],"duplicates":[47],"personal":[50],"modification":[51],"for":[52,77],"are":[54],"auto-saved":[55],"directory":[59],"encrypted":[61],"Vnode":[64],"layer.":[65],"On":[66],"boot,":[67],"file":[69],"automounted":[72],"which":[73],"implements":[74],"encryption":[75],"transparently":[76],"applications":[80],"ensures":[82],"data":[83],"security":[84],"even":[85],"storage":[87],"lost":[90],"stolen.":[92]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
