-
2
-
-
0347755635
-
Embedded security for network-attached storage
-
June
-
H. Gobioff, D. Nagle, and G. Gibson, "Embedded Security for Network-Attached Storage", CMU SCS technical report CMU-CS-99-154, June 1999.
-
(1999)
CMU SCS Technical Report
, vol.CMU-CS-99-154
-
-
Gobioff, H.1
Nagle, D.2
Gibson, G.3
-
4
-
-
84964528983
-
Survivable storage systems
-
IEEE, June
-
G. Ganger, P.K. Khosla, M. Bakkaloglu, M.W. Bigrigg, G. Goodson, S. Oguz, V. Pandurangan, C. Soules, J. Strunk, and J.J. Wylie, "Survivable Storage Systems," DARPA Information Survivability Conference and Exposition, pp. 184-195 vol 2. IEEE, June 2001.
-
(2001)
DARPA Information Survivability Conference and Exposition
, vol.2
, pp. 184-195
-
-
Ganger, G.1
Khosla, P.K.2
Bakkaloglu, M.3
Bigrigg, M.W.4
Goodson, G.5
Oguz, S.6
Pandurangan, V.7
Soules, C.8
Strunk, J.9
Wylie, J.J.10
-
5
-
-
85077741011
-
Storage-based intrusion detection: Watching storage activity for suspicious behavior
-
August
-
A. Pennington, J. Strunk, J. Griffin, C. Soules, G. Goodson, and G. Ganger, "Storage-based Intrusion Detection: Watching Storage Activity For Suspicious Behavior," 12th USENIX Security Symposium, August, 2003.
-
(2003)
12th USENIX Security Symposium
-
-
Pennington, A.1
Strunk, J.2
Griffin, J.3
Soules, C.4
Goodson, G.5
Ganger, G.6
-
10
-
-
85033460636
-
PLUTUS: Scalable secure file sharing on untrusted storage
-
April
-
M. Kallahalla, E. Riedel, R. Swaminathan, Q. Wang, and K. Fu, "PLUTUS: Scalable secure file sharing on untrusted storage," Conference on File andStorage Technology, pp. 29-42, April 2003.
-
(2003)
Conference on File AndStorage Technology
, pp. 29-42
-
-
Kallahalla, M.1
Riedel, E.2
Swaminathan, R.3
Wang, Q.4
Fu, K.5
-
11
-
-
85033498470
-
SiRiUS: Securing remote untrusted storage
-
E. Goh, H. Shacham, N. Modadugu, and D. Boneh, "SiRiUS: Securing Remote Untrusted Storage," Proceedings of the Internet Society (ISOC) Network and Distributed Systems Security (NDSS) Symposium, 2003.
-
(2003)
Proceedings of the Internet Society (ISOC) Network and Distributed Systems Security (NDSS) Symposium
-
-
Goh, E.1
Shacham, H.2
Modadugu, N.3
Boneh, D.4
-
13
-
-
0034997394
-
Strong security for distributed file systems
-
April
-
E. Miller, D. Long, W. Freeman, and B. Reed, "Strong security for distributed file systems," Proceedings of the 20th IEEE International Performance, Computing and Communications Conference (IPCCC '01), pp. 34-40, April 2001.
-
(2001)
Proceedings of the 20th IEEE International Performance, Computing and Communications Conference (IPCCC '01)
, pp. 34-40
-
-
Miller, E.1
Long, D.2
Freeman, W.3
Reed, B.4
-
14
-
-
85084162873
-
Strong security for network-attached storage
-
January
-
E. Miller, D. Long, W. Freeman, and B. Reed, "Strong security for network-attached storage," Proceedings of the 2002 Conference on File and Storage Technologies, pp. 1-13, January 2002.
-
(2002)
Proceedings of the 2002 Conference on File and Storage Technologies
, pp. 1-13
-
-
Miller, E.1
Long, D.2
Freeman, W.3
Reed, B.4
-
16
-
-
21844470195
-
On Correlated failures in survivable storage systems
-
May
-
M. Bakkaloglu, J.J. Wylie, C. Wang, and G.R. Ganger, "On Correlated Failures in Survivable Storage Systems," CMU SCS Technical Report CMU-CS- 02-129, May 2002.
-
(2002)
CMU SCS Technical Report
, vol.CMU-CS- 02-129
-
-
Bakkaloglu, M.1
Wylie, J.J.2
Wang, C.3
Ganger, G.R.4
-
18
-
-
0003569870
-
Filesystems for network-attached secure disks
-
July
-
G. Gibson, D. Nagle, K. Amiri, F. Chang, H. Gobioff, E. Riedel, D. Rochberg, and J. Zelenka, "Filesystems for Network-Attached Secure Disks," CMU Computer Science Technical Report, CMU-CS-97-118, July 1997.
-
(1997)
CMU Computer Science Technical Report
, vol.CMU-CS-97-118
-
-
Gibson, G.1
Nagle, D.2
Amiri, K.3
Chang, F.4
Gobioff, H.5
Riedel, E.6
Rochberg, D.7
Zelenka, J.8
-
19
-
-
0142130619
-
Decentralized Storage consistency via versioning servers
-
September
-
G. Goodson, J.J. Wylie, G. Ganger and M. Reiter, "Decentralized Storage Consistency via Versioning Servers," Carnegie Mellon University Technical Report CMU-CS-02-180, September 2002.
-
(2002)
Carnegie Mellon University Technical Report
, vol.CMU-CS-02-180
-
-
Goodson, G.1
Wylie, J.J.2
Ganger, G.3
Reiter, M.4
-
20
-
-
21844458124
-
A protocol family for versatile survivable storage infrastructures
-
December
-
G. Goodson, J.J. Wylie, G. Ganger, and M. Reiter, "A Protocol Family for Versatile Survivable Storage Infrastructures," Carnegie Mellon University Parallel Data Lab Technical Report CMU-PDL-03-104, December 2003.
-
(2003)
Carnegie Mellon University Parallel Data Lab Technical Report
, vol.CMU-PDL-03-104
-
-
Goodson, G.1
Wylie, J.J.2
Ganger, G.3
Reiter, M.4
-
22
-
-
0033906295
-
Authenticating network-attached storage
-
January
-
B. Reed, E. Chron, R. Burns, and D. Long, "Authenticating network-attached storage," IEEE Micro, 20(1):49-57, January 2000.
-
(2000)
IEEE Micro
, vol.20
, Issue.1
, pp. 49-57
-
-
Reed, B.1
Chron, E.2
Burns, R.3
Long, D.4
-
23
-
-
2642522650
-
Intrusion detection, diagnosis, and recovery with self-securing storage
-
May
-
J. Strunk, G. Goodson, A. Pennington, C. Soules, and G. Ganger, "Intrusion Detection, Diagnosis, and Recovery with Self-Securing Storage," CMU SCS Technical Report CMU-CS-02-140, May 2002.
-
(2002)
CMU SCS Technical Report
, vol.CMU-CS-02-140
-
-
Strunk, J.1
Goodson, G.2
Pennington, A.3
Soules, C.4
Ganger, G.5
-
26
-
-
0342410321
-
Survivable information storage systems
-
August
-
J.J. Wylie, M. Bigrigg, J. Strunk, G. Ganger, H. Kiliccote, and P. Khosla, "Survivable information storage systems," IEEE Computer, 33(8):61-68, August 2000.
-
(2000)
IEEE Computer
, vol.33
, Issue.8
, pp. 61-68
-
-
Wylie, J.J.1
Bigrigg, M.2
Strunk, J.3
Ganger, G.4
Kiliccote, H.5
Khosla, P.6
|