-
1
-
-
1542489567
-
Hippodrome: Running circles around storage administration
-
Darrell D. E. Long, editor, Monterey, California, USA, January, USENIX
-
Eric Anderson, Michael Hobbs, Kimberly Keeton, Susan Spence, Mustafa Uysal, and Al-istair C. Veitch. Hippodrome: Running circles around storage administration. In Darrell D. E. Long, editor, Proceedings of the FAST'02 Conference on File and Storage Technologies, pages 175-188, Monterey, California, USA, January 2002. USENIX.
-
(2002)
Proceedings of the FAST'02 Conference On File and Storage Technologies
, pp. 175-188
-
-
Anderson, E.1
Hobbs, M.2
Keeton, K.3
Spence, S.4
Uysal, M.5
Veitch, A.C.6
-
3
-
-
2442501617
-
Modelling and detecting the cascade vulnerability problem using soft constraints
-
Nicosia, Cyprus, March, ACM Press
-
Stefano Bistarelli, Simon N. Foley, and Barry O'Sullivan. Modelling and detecting the cascade vulnerability problem using soft constraints. In Proceedings of the ACM Symposium on Applied Computing, Nicosia, Cyprus, March 2004. ACM Press.
-
(2004)
Proceedings of the ACM Symposium On Applied Computing
-
-
Bistarelli, S.1
Foley, S.N.2
O'Sullivan, B.3
-
4
-
-
0024663219
-
The Chinese wall security policy
-
Oakland, California, USA, May, IEEE Computer Society Press
-
D.F.C. Brewer and M.J. Nash. The Chinese wall security policy. In Proceedings of the 1989 IEEE Symposium on Security and Privacy, pages 206-214, Oakland, California, USA, May 1989. IEEE Computer Society Press.
-
(1989)
Proceedings of the 1989 IEEE Symposium On Security and Privacy
, pp. 206-214
-
-
Brewer, D.F.C.1
Nash, M.J.2
-
7
-
-
0032118217
-
Configuring large systems using generative constraint satisfaction
-
July
-
Gerhard Fleischanderl, Gerhard E. Friedrich, Alois Haselbeck, Herwig Schreiner, and Markus Stumptner. Configuring large systems using generative constraint satisfaction. IEEE Intelligent Systems, 13(4):59-68, July 1998.
-
(1998)
IEEE Intelligent Systems
, vol.13
, Issue.4
, pp. 59-68
-
-
Fleischanderl, G.1
Friedrich, G.E.2
Haselbeck, A.3
Schreiner, H.4
Stumptner, M.5
-
8
-
-
84974747910
-
Aggregation and separation as noninterference properties
-
Simon N. Foley. Aggregation and separation as noninterference properties. Journal of Computer Security, 1(2):159-188, 1992.
-
(1992)
Journal of Computer Security
, vol.1
, Issue.2
, pp. 159-188
-
-
Foley, S.N.1
-
9
-
-
0030680628
-
The specification and implementation of commercial security requirements including dynamic segregation of duties
-
Zurich, Switzerland, April, ACM Press
-
Simon N. Foley. The specification and implementation of commercial security requirements including dynamic segregation of duties. In Proceedings of the 4 ACM Conference on Computer and Communications Security, pages 125-134, Zurich, Switzerland, April 1997. ACM Press.
-
(1997)
Proceedings of the 4 ACM Conference On Computer and Communications Security
, pp. 125-134
-
-
Foley, S.N.1
-
10
-
-
84958062112
-
Eliminating interchangeable values in constraint satisfaction problems
-
California, USA, July, MIT Press
-
Eugene Freuder. Eliminating interchangeable values in constraint satisfaction problems. In Proceedings of the 9' National Conference on Artificial Intelligence, volume 1, pages 227-233, California, USA, July 1991. MIT Press.
-
(1991)
Proceedings of the 9' National Conference On Artificial Intelligence
, vol.1
, pp. 227-233
-
-
-
11
-
-
0004967366
-
Strategic directions in storage i/o issues in large-scale computing
-
Garth A. Gibson, Jeffrey Scott Vitter, and John Wilkes. Strategic directions in storage i/o issues in large-scale computing. ACM Computing Surveys, 28(4):779-793, 1996.
-
(1996)
ACM Computing Surveys
, vol.28
, Issue.4
, pp. 779-793
-
-
Gibson, G.A.1
Vitter, J.S.2
Wilkes, J.3
-
15
-
-
84962638983
-
Secure group services for storage area networks
-
Greenbelt, Maryland, USA, December, IEEE Computer Society
-
Yongdae Kim, Maithili Narasimha, Fabio Maino, and Gene Tsudik. Secure group services for storage area networks. In Proceedings of the First International IEEE Security in Storage Workshop, pages 80-93, Greenbelt, Maryland, USA, December 2002. IEEE Computer Society.
-
(2002)
Proceedings of the First International IEEE Security In Storage Workshop
, pp. 80-93
-
-
Kim, Y.1
Narasimha, M.2
Maino, F.3
Tsudik, G.4
-
17
-
-
0025135715
-
Extending the brewer-nash model to a multilevel context
-
Oakland, California, USA, May, IEEE Computer Society Press
-
Catherine Meadows. Extending the brewer-nash model to a multilevel context. In Proceedings of the IEEE Symposium on Security and Privacy, pages 95-102, Oakland, California, USA, May 1990. IEEE Computer Society Press.
-
(1990)
Proceedings of the IEEE Symposium On Security and Privacy
, pp. 95-102
-
-
Meadows, C.1
-
19
-
-
0002687270
-
Towards a generic model of configuration
-
N. S. Sridharan, editor, Detroit, Michigan, USA, August
-
Sanjay Mittal and Felix Frayman. Towards a generic model of configuration. In N. S. Sridharan, editor, Proceedings of 11 International Joint Conference on Artificial Intelligence, pages 1395-1401, Detroit, Michigan, USA, August 1989.
-
(1989)
Proceedings of 11 International Joint Conference On Artificial Intelligence
, pp. 1395-1401
-
-
Mittal, S.1
Frayman, F.2
-
20
-
-
84944041103
-
A case for redundant arrays of inexpensive disks (raid)
-
Chicago, USA, June
-
D.A. Patterson, G.A. Gibson, and R.H. Katz. A case for redundant arrays of inexpensive disks (raid). In Proceedings of the 1988 ACM Conference on the Management of Data (SIGMOD), pages 109-116, Chicago, USA, June 1988.
-
(1988)
Proceedings of the 1988 ACM Conference On the Management of Data (SIGMOD)
, pp. 109-116
-
-
Patterson, D.A.1
Gibson, G.A.2
Katz, R.H.3
-
21
-
-
0027699087
-
Lattice-based access control models
-
November
-
Ravi S. Sandhu. Lattice-based access control models. Computer, 26(11):9-19, November 1993.
-
(1993)
Computer
, vol.26
, Issue.11
, pp. 9-19
-
-
Ravi, S.S.1
-
24
-
-
55849120317
-
The hp autoraid hierarchical storage system
-
Copper Mountain Resort, Colorado, USA, December, ACM Press
-
John Wilkes, Richard A. Golding, Carl Staelin, and Tim Sullivan. The hp autoraid hierarchical storage system. In Proceedings of the 15 ACM Symposium on Operating System Principles, pages 96-108, Copper Mountain Resort, Colorado, USA, December 1995. ACM Press.
-
(1995)
Proceedings of the 15 ACM Symposium On Operating System Principles
, pp. 96-108
-
-
Wilkes, J.1
Golding, R.A.2
Staelin, C.3
Sullivan, T.4
|