[{"data": {"name": "Adding availability to log services of untrusted machines", "@type": "ScholarlyArticle", "genre": "proceedings-article", "author": [{"name": "A. Arona", "@type": "Person"}, {"name": "D. Bruschi", "@type": "Person"}, {"name": "E. Rosti", "@type": "Person"}], "@context": "http://schema.org/", "encoding": [{"@type": "MediaObject", "contentUrl": "http://www.acsac.org/1999/papers/thu-a-1030-rosti.pdf", "encodingFormat": "application/pdf"}], "publisher": {"name": "IEEE Comput. Soc", "@type": "Organization"}, "identifier": [{"@type": "PropertyValue", "value": "10.1109/csac.1999.816028", "propertyID": "DOI"}, {"@type": "PropertyValue", "value": "CC4wjXJH5Vvta-CT4MBEd7CpV11-CDE3waaPeEi9T-CRGf2LkwJkaNP", "propertyID": "ISCC"}], "datePublished": null}, "schema": "schema.org", "mediatype": "application/ld+json"}]