-
1
-
-
4944230579
-
FARSITE: Federated, available, and reliable storage for an incompletely trusted environment
-
A. Adya, W. J. Bolosky, M. Castro, R. Chaiken, G. Cermak, J. R. Douceur, J. Howell, J. R. Lorch, M. Theimer, and R. Wattenhofer. FARSITE: Federated, available, and reliable storage for an incompletely trusted environment. In Proceedings of the 5th Symposium on Operating Systems Design and Implementation (OSDI-02), 2002.
-
(2002)
Proceedings of the 5th Symposium on Operating Systems Design and Implementation (OSDI-02)
-
-
Adya, A.1
Bolosky, W.J.2
Castro, M.3
Chaiken, R.4
Cermak, G.5
Douceur, J.R.6
Howell, J.7
Lorch, J.R.8
Theimer, M.9
Wattenhofer, R.10
-
2
-
-
0025028340
-
Naming and grouping privileges to simplify security management in large databases
-
R. W. Baldwin. Naming and grouping privileges to simplify security management in large databases. In IEEE Symposium on Research in Security and Privacy, pages 116-132, 1990.
-
(1990)
IEEE Symposium on Research in Security and Privacy
, pp. 116-132
-
-
Baldwin, R.W.1
-
3
-
-
33947657628
-
-
Subversion project home
-
B. Behlendorf, C. M. Pilato, G. Stein, K. Fogel, K. Hancock, and B. Collins-Sussman. Subversion project homepage, 2003.
-
(2003)
-
-
Behlendorf, B.1
Pilato, C.M.2
Stein, G.3
Fogel, K.4
Hancock, K.5
Collins-Sussman, B.6
-
4
-
-
84976863388
-
A critique of ansi sql isolation levels
-
New York, NY, USA, ACM Press
-
H. Berenson, P. Bernstein, J. Gray, J. Melton, E. O'Neil, and P. O'Neil. A critique of ansi sql isolation levels. In SIGMOD '95: Proceedings of the 1995 ACM SIGMOD international conference on Management of data, pages 1-10, New York, NY, USA, 1995. ACM Press.
-
(1995)
SIGMOD '95: Proceedings of the 1995 ACM SIGMOD international conference on Management of data
, pp. 1-10
-
-
Berenson, H.1
Bernstein, P.2
Gray, J.3
Melton, J.4
O'Neil, E.5
O'Neil, P.6
-
5
-
-
33947653997
-
-
B. Berliner. CVS II: Parallelizing software development. In Proceedings of the USENIX Winter 1990 Technical Conference, pages 341-352, Berkeley, CA, 1990. USENIX Association.
-
B. Berliner. CVS II: Parallelizing software development. In Proceedings of the USENIX Winter 1990 Technical Conference, pages 341-352, Berkeley, CA, 1990. USENIX Association.
-
-
-
-
7
-
-
33947680461
-
-
Web. http://www.ibm.com/software/awdtools/clearcase/.
-
Web. http
-
-
-
8
-
-
0032691358
-
Notepals: Light weight note sharing by the group, for the group
-
R. C. Davis, J. A. Landay, V. Chen, J. Huang, and R. B. Lee. Notepals: Light weight note sharing by the group, for the group. In Proceedings of CHI 1999, pages 338-345, 1999.
-
(1999)
Proceedings of CHI 1999
, pp. 338-345
-
-
Davis, R.C.1
Landay, J.A.2
Chen, V.3
Huang, J.4
Lee, R.B.5
-
10
-
-
5444270649
-
A read-only transaction anomaly under snapshot isolation
-
A. Fekete, E. O'Neil, and P. O'Neil. A read-only transaction anomaly under snapshot isolation. SIGMOD Rec., 33(3): 12-14, 2004.
-
(2004)
SIGMOD Rec
, vol.33
, Issue.3
, pp. 12-14
-
-
Fekete, A.1
O'Neil, E.2
O'Neil, P.3
-
12
-
-
33947662223
-
Distributed file systems, capabilities, and motefs
-
In preparation
-
V. Gaburici and P. Keleher. Distributed file systems, capabilities, and motefs. In preparation, 2006.
-
(2006)
-
-
Gaburici, V.1
Keleher, P.2
-
13
-
-
0031611082
-
A cost-effective, high-bandwidth storage architecture
-
G. A. Gibson, D. F. Nagle, K. Amiri, J. Butler, F. W. Chang, H. Gobioff, C. Hardin, E. Riedel, D. Rochberg, and J. Zelenka. A cost-effective, high-bandwidth storage architecture. In Proceedings of the Eighth International Conference on Architectural Support for Programming Languages and Operating Systems, pages 92-103, 1998.
-
(1998)
Proceedings of the Eighth International Conference on Architectural Support for Programming Languages and Operating Systems
, pp. 92-103
-
-
Gibson, G.A.1
Nagle, D.F.2
Amiri, K.3
Butler, J.4
Chang, F.W.5
Gobioff, H.6
Hardin, C.7
Riedel, E.8
Rochberg, D.9
Zelenka, J.10
-
14
-
-
0023978621
-
The Cedar file system
-
D. K. Glifford, R. M. Needham, and M. D. Schroeder. The Cedar file system. Communications of the Association for Computing Machinery, 31(3):288-298, 1988.
-
(1988)
Communications of the Association for Computing Machinery
, vol.31
, Issue.3
, pp. 288-298
-
-
Glifford, D.K.1
Needham, R.M.2
Schroeder, M.D.3
-
15
-
-
0024646230
-
On security in capability-based systems
-
L. Gong. On security in capability-based systems. Operating Systems Review, 23(2):56-60, 1989.
-
(1989)
Operating Systems Review
, vol.23
, Issue.2
, pp. 56-60
-
-
Gong, L.1
-
17
-
-
0030157209
-
The dangers of replication and a solution
-
J. Gray, P. Helland, P. O'Neil, and D. Shasha. The dangers of replication and a solution. In Proceedings of the 1996 ACM SIGMOD International Conference on Management of Data, pages 173-182, 1996.
-
(1996)
Proceedings of the 1996 ACM SIGMOD International Conference on Management of Data
, pp. 173-182
-
-
Gray, J.1
Helland, P.2
O'Neil, P.3
Shasha, D.4
-
18
-
-
4544225295
-
The Vesta approach to software configuration management
-
Technical Report 168, Compaq Systems Research Center, Mar
-
A. Heydon, R. Levin, T. Mann, and Y. Yu. The Vesta approach to software configuration management. Technical Report 168, Compaq Systems Research Center, Mar. 2001.
-
(2001)
-
-
Heydon, A.1
Levin, R.2
Mann, T.3
Yu, Y.4
-
19
-
-
0024939933
-
Availability and Consistency Tradeoffs in the Echo Distributed File System
-
Sept
-
A. Hisgen, A. Birrell, T. Mann, M. Schroeder, and G. Swart. Availability and Consistency Tradeoffs in the Echo Distributed File System. In The 2nd Workshop of Workstation Operating Systems, pages 49-54, Sept. 1989.
-
(1989)
The 2nd Workshop of Workstation Operating Systems
, pp. 49-54
-
-
Hisgen, A.1
Birrell, A.2
Mann, T.3
Schroeder, M.4
Swart, G.5
-
20
-
-
0023964787
-
Scale and performance in a distributed file system
-
J. Howard, M. Kazar, S. Menees, D. Nichols, M. Satyanarayanan, R. Sidebotham, and M. West. Scale and performance in a distributed file system. ACM Transactions on Computer Systems, 6:51-81, 1988.
-
(1988)
ACM Transactions on Computer Systems
, vol.6
, pp. 51-81
-
-
Howard, J.1
Kazar, M.2
Menees, S.3
Nichols, D.4
Satyanarayanan, M.5
Sidebotham, R.6
West, M.7
-
21
-
-
85033460636
-
-
M. Kallahalla, E. Riedel, R. Swaminathan, Q. Wang, and K. Fu. Plutus: Scalable secure file sharing on untrusted storage. In Proceedings of the 2nd USENIX Conference on File and Storage Technologies, 2003.
-
M. Kallahalla, E. Riedel, R. Swaminathan, Q. Wang, and K. Fu. Plutus: Scalable secure file sharing on untrusted storage. In Proceedings of the 2nd USENIX Conference on File and Storage Technologies, 2003.
-
-
-
-
24
-
-
0034440650
-
Oceanstore: An Architecture for Global-Scale Persistent Storage
-
J. Kubiatowicz, D. Bindel, Y. Chen, S. Czerwinski, P. Eaton, D. Geels, R. Gummadi, S. Rhea, H. Weatherspoon, W. Weimer, C. Wells, and B. Zhao. Oceanstore: An Architecture for Global-Scale Persistent Storage. In Proceedings of ASPLOS, 2000.
-
(2000)
Proceedings of ASPLOS
-
-
Kubiatowicz, J.1
Bindel, D.2
Chen, Y.3
Czerwinski, S.4
Eaton, P.5
Geels, D.6
Gummadi, R.7
Rhea, S.8
Weatherspoon, H.9
Weimer, W.10
Wells, C.11
Zhao, B.12
-
26
-
-
85084162072
-
-
D. Mazieres. A toolkit for user-level file systems. In In Proc. Usenix Technical Conference, pages 261-274, 2001.
-
D. Mazieres. A toolkit for user-level file systems. In In Proc. Usenix Technical Conference, pages 261-274, 2001.
-
-
-
-
27
-
-
0042352260
-
Separating key management from file system security
-
Dec
-
D. Mazières, M. Kaminsky, M. F. Kaashoek, and E. Witchel. Separating key management from file system security. In Proceedings of the 17th ACM Symposium on Operating Systems Principles (SOSP'99), pages 124-139, Dec. 1999.
-
(1999)
Proceedings of the 17th ACM Symposium on Operating Systems Principles (SOSP'99)
, pp. 124-139
-
-
Mazières, D.1
Kaminsky, M.2
Kaashoek, M.F.3
Witchel, E.4
-
28
-
-
21644432386
-
Secure and flexible global file sharing
-
S. Miltchev, V. Prevelakis, S. Ioannidis, J. Ioannidis, A. D. Keromytis, and J. M. Smith. Secure and flexible global file sharing. In Proceedings of the USENIX 2003 Annual Technical Conference, 2003.
-
(2003)
Proceedings of the USENIX 2003 Annual Technical Conference
-
-
Miltchev, S.1
Prevelakis, V.2
Ioannidis, S.3
Ioannidis, J.4
Keromytis, A.D.5
Smith, J.M.6
-
30
-
-
0028514601
-
Kerberos: An authentication service for computer networks
-
Sept
-
B. C. Neuman and T. Ts'o. Kerberos: An authentication service for computer networks. IEEE Communications, 32(9), Sept. 1994.
-
(1994)
IEEE Communications
, vol.32
, Issue.9
-
-
Neuman, B.C.1
Ts'o, T.2
-
31
-
-
0032001741
-
Perspectives on optimistically replicated peer-to-peer filing
-
T. W. Page, R. G. Guy, J. S. Heidemann, D. Ratner, P. Reiher, A. Goel, G. H. Kuenning, and G. J. Popek. Perspectives on optimistically replicated peer-to-peer filing. Software-Practice and Experience, 28:123-133, 1998.
-
(1998)
Software-Practice and Experience
, vol.28
, pp. 123-133
-
-
Page, T.W.1
Guy, R.G.2
Heidemann, J.S.3
Ratner, D.4
Reiher, P.5
Goel, A.6
Kuenning, G.H.7
Popek, G.J.8
-
32
-
-
33947680947
-
SWALLOW: A distributed data storage system for a local network
-
Zurich, Switzerland
-
D. P. Reed and L. Svobodova. SWALLOW: a distributed data storage system for a local network. In International Workshop on Local Networks, Zurich, Switzerland, 1981.
-
(1981)
International Workshop on Local Networks
-
-
Reed, D.P.1
Svobodova, L.2
-
33
-
-
85084160341
-
Capability file names: Separating authorisation from user management in an internet file system
-
J. Regan and C. Jensen. Capability file names: Separating authorisation from user management in an internet file system. In Proceedings of the 10th USENIX Security Symposium, 2001.
-
(2001)
Proceedings of the 10th USENIX Security Symposium
-
-
Regan, J.1
Jensen, C.2
-
34
-
-
33947631018
-
3DFS: A time-oriented file server
-
Berkeley, CA, USA, Jan, Usenix Association
-
W. D. Roome. 3DFS: A time-oriented file server. In Proceedings of the Usenix Winter 1992 Technical Conference, pages 405-418, Berkeley, CA, USA, Jan. 1991. Usenix Association.
-
(1991)
Proceedings of the Usenix Winter 1992 Technical Conference
, pp. 405-418
-
-
Roome, W.D.1
-
36
-
-
0042352263
-
Deciding when to forget in the Elephant file system
-
Dec
-
D. S. Santry, M. J. Feeley, N. C. Hutchinson, A. C. Veitch, R. W. Carton, and J. Ofir. Deciding when to forget in the Elephant file system. In Proceedings of the 17th ACM Symposium on Operating Systems Principles (SOSP'99), pages 110-123, Dec. 1999.
-
(1999)
Proceedings of the 17th ACM Symposium on Operating Systems Principles (SOSP'99)
, pp. 110-123
-
-
Santry, D.S.1
Feeley, M.J.2
Hutchinson, N.C.3
Veitch, A.C.4
Carton, R.W.5
Ofir, J.6
-
37
-
-
33947700630
-
Data staging on untrusted surrogates
-
S. Sobti, N. Garg, F. Zheng, J. Lai, Y. Shao, C. Zhang, E. Ziskind, A. Krishnamurthy, and R. Y. Wang. Data staging on untrusted surrogates. In Proceedings of the 2nd USENIX Conference on File and Storage Technologies, 2003.
-
(2003)
Proceedings of the 2nd USENIX Conference on File and Storage Technologies
-
-
Sobti, S.1
Garg, N.2
Zheng, F.3
Lai, J.4
Shao, Y.5
Zhang, C.6
Ziskind, E.7
Krishnamurthy, A.8
Wang, R.Y.9
-
39
-
-
84978374045
-
Self-Securing storage: Protecting data in compromised systems
-
Berkeley, CA, Oct. 23-25, The USENIX Association
-
J. D. Strunk, G. R. Goodson, M. L. Scheinholtz, C. A. N. Soules, and G. R. Ganger. Self-Securing storage: Protecting data in compromised systems. In Proceedings of the 4th Symposium on Operating Systems Design and Implementation (OSDI-00), pages 165-180, Berkeley, CA, Oct. 23-25 2000. The USENIX Association.
-
(2000)
Proceedings of the 4th Symposium on Operating Systems Design and Implementation (OSDI-00)
, pp. 165-180
-
-
Strunk, J.D.1
Goodson, G.R.2
Scheinholtz, M.L.3
Soules, C.A.N.4
Ganger, G.R.5
-
40
-
-
0028552756
-
Session guarantees for weakly consistent replicated data
-
Los Alamitos, CA, USA, IEEE Computer Society Press
-
D. B. Terry, A. J. Demers, K. Petersen, M. J. Spreitzer, M. M. Theimer, and B. B. Welch. Session guarantees for weakly consistent replicated data. In PDIS '94: Proceedings of the third international conference on on Parallel and distributed information systems, pages 140-150, Los Alamitos, CA, USA, 1994. IEEE Computer Society Press.
-
(1994)
PDIS '94: Proceedings of the third international conference on on Parallel and distributed information systems
, pp. 140-150
-
-
Terry, D.B.1
Demers, A.J.2
Petersen, K.3
Spreitzer, M.J.4
Theimer, M.M.5
Welch, B.B.6
-
41
-
-
0003570191
-
The rsync algorithm
-
Technical Report TR-CS-96-05, Australian National University
-
P. Tridgell and P. Mackerras. The rsync algorithm. Technical Report TR-CS-96-05, Australian National University, 1996.
-
(1996)
-
-
Tridgell, P.1
Mackerras, P.2
-
42
-
-
0024681074
-
The design of a high-performance file server
-
Washington, DC, IEEE Computer Society
-
R. van Renesse, A. S. Tanenbaum, and A. Wilschut. The design of a high-performance file server. In Proceedings of the 9th International Conference on Distributed Computing Systems (ICDCS), pages 22-27, Washington, DC, 1989. IEEE Computer Society.
-
(1989)
Proceedings of the 9th International Conference on Distributed Computing Systems (ICDCS)
, pp. 22-27
-
-
van Renesse, R.1
Tanenbaum, A.S.2
Wilschut, A.3
-
43
-
-
0027809739
-
-
M. A. E. Wobber, M. Burrows, and B. Lampson. Authentication in the Taos operating system. In Proceedings of the 14th ACM Symposium on Operating System Principles, pages 256-269, Systems Research Center SRC, DEC, Dec. 1993. ACM SIGOPS, ACM Press.
-
M. A. E. Wobber, M. Burrows, and B. Lampson. Authentication in the Taos operating system. In Proceedings of the 14th ACM Symposium on Operating System Principles, pages 256-269, Systems Research Center SRC, DEC, Dec. 1993. ACM SIGOPS, ACM Press.
-
-
-
|