-
3
-
-
47249095818
-
-
Scsi primary commands. http://www.t10.org/ftp/t10/drafts/spc4/spc4r09. pdf.
-
Scsi primary commands
-
-
-
4
-
-
47249116598
-
-
Storage networking industry association
-
Storage networking industry association. http://www.snia.org.
-
-
-
-
5
-
-
47249117037
-
-
Technical committee t10
-
Technical committee t10. http://www.t10.org.
-
-
-
-
6
-
-
47249153978
-
-
Virtual pc overview. http://www.microsoft.com/windows/virtualpc/ evaluation/techoverview.mspx.
-
Virtual pc overview
-
-
-
7
-
-
47249159906
-
-
Scsi object-based storage device commands. In T10 Technical Committee of INCITS, October 4, 2004.
-
Scsi object-based storage device commands. In T10 Technical Committee of INCITS, October 4, 2004.
-
-
-
-
8
-
-
84856598167
-
Block-Level Security for Network-Attached Disks
-
Mar
-
M. K. Aguilera, M. Ji, M. Lillibridge, J. MacCormick, E. Oertli, D. G. Andersen, M. Burrows, T. Mann, and C. Thekkath. Block-Level Security for Network-Attached Disks. In Proc. 2nd USENIX Conference on File and Storage Technologies, Mar. 2003.
-
(2003)
Proc. 2nd USENIX Conference on File and Storage Technologies
-
-
Aguilera, M.K.1
Ji, M.2
Lillibridge, M.3
MacCormick, J.4
Oertli, E.5
Andersen, D.G.6
Burrows, M.7
Mann, T.8
Thekkath, C.9
-
9
-
-
25844477999
-
Advanced virtualization capabilities of power5 systems
-
W. J. Armstrong, R. L. Arndt, D. C. Boutcher, R. G. Kovacs, D. Larson, K. A. Lucke, N. Nayar, and R. C. Swanberg. Advanced virtualization capabilities of power5 systems. IBM J. Res. Dev., 49(4/5):523-532, 2005.
-
(2005)
IBM J. Res. Dev
, vol.49
, Issue.4-5
, pp. 523-532
-
-
Armstrong, W.J.1
Arndt, R.L.2
Boutcher, D.C.3
Kovacs, R.G.4
Larson, D.5
Lucke, K.A.6
Nayar, N.7
Swanberg, R.C.8
-
10
-
-
84962752982
-
A two layered approach for securing an object store network
-
Washington, DC, USA, IEEE Computer Society
-
A. Azagury, R. Canetti, M. Factor, S. Halevi, E. Henis, D. Naor, N. Rinetzky, O. Rodeh, and J. Satran. A two layered approach for securing an object store network. In SISW '02: Proceedings of the First International IEEE Security in Storage Workshop, page 10, Washington, DC, USA, 2002. IEEE Computer Society.
-
(2002)
SISW '02: Proceedings of the First International IEEE Security in Storage Workshop
, pp. 10
-
-
Azagury, A.1
Canetti, R.2
Factor, M.3
Halevi, S.4
Henis, E.5
Naor, D.6
Rinetzky, N.7
Rodeh, O.8
Satran, J.9
-
11
-
-
21644433634
-
-
P. Barham, B. Dragovic, K. Fraser, S. Hand, T. Harris, A. Ho, R. Neugebauery, I. Pratt, and A. Warfield. Xen and the art of virtualization. In In Proceedings of the 19th ACM Symposium on Operating Systems Principles, October 2003.
-
P. Barham, B. Dragovic, K. Fraser, S. Hand, T. Harris, A. Ho, R. Neugebauery, I. Pratt, and A. Warfield. Xen and the art of virtualization. In In Proceedings of the 19th ACM Symposium on Operating Systems Principles, October 2003.
-
-
-
-
12
-
-
85059766484
-
-
Proceedings of the 2nd ACM/USENIX Symposium on Networked Systems Design and Implementation NSDI, Boston, MA, May
-
C. Clark, K. Fraser, S. Hand, J. G. Hanseny, E. July, C. Limpach, I. Pratt, and A. Warfield. Live migration of virtual machines. In In Proceedings of the 2nd ACM/USENIX Symposium on Networked Systems Design and Implementation (NSDI), Boston, MA, May 2005.
-
(2005)
Live migration of virtual machines
-
-
Clark, C.1
Fraser, K.2
Hand, S.3
Hanseny, J.G.4
July, E.5
Limpach, C.6
Pratt, I.7
Warfield, A.8
-
14
-
-
1642330230
-
The direct access file system
-
M. DeBergalis, P. F. Corbett, S. Kleiman, A. Lent, D. Noveck, T. Talpey, and M. Wittle. The direct access file system. In FAST, 2003.
-
(2003)
FAST
-
-
DeBergalis, M.1
Corbett, P.F.2
Kleiman, S.3
Lent, A.4
Noveck, D.5
Talpey, T.6
Wittle, M.7
-
16
-
-
33947179923
-
The osd security protocol
-
Washington, DC, USA, IEEE Computer Society
-
M. Factor, D. Nagle, D. Naor, E. Riedel, and J. Satran. The osd security protocol. In SISW '05: Proceedings of the Third IEEE International Security in Storage Workshop (SISW05), pages 29-39, Washington, DC, USA, 2005. IEEE Computer Society.
-
(2005)
SISW '05: Proceedings of the Third IEEE International Security in Storage Workshop (SISW05)
, pp. 29-39
-
-
Factor, M.1
Nagle, D.2
Naor, D.3
Riedel, E.4
Satran, J.5
-
18
-
-
47249132115
-
Enforcing confinement in distributed storage and a cryptographic model for access control. Cryptology ePrint Archive
-
Report 2005/169
-
S. Halevi, P. A. Karger, and D. Naor. Enforcing confinement in distributed storage and a cryptographic model for access control. Cryptology ePrint Archive, Report 2005/169, 2005. http://eprint.iacr.org/.
-
(2005)
-
-
Halevi, S.1
Karger, P.A.2
Naor, D.3
-
19
-
-
0003653892
-
Postmark: A new file system benchmark
-
TR-3022
-
J. Katcher. Postmark: A new file system benchmark. In NetApp Technical Report TR-3022, 1997.
-
(1997)
NetApp Technical Report
-
-
Katcher, J.1
-
20
-
-
85077625340
-
Operating system support for virtual machines
-
S. T. King, G. W. Dunlap, and P. M. Chen. Operating system support for virtual machines. In USENIX Annual Technical Conference, General Track, pages 71-84, 2003.
-
(2003)
USENIX Annual Technical Conference, General Track
, pp. 71-84
-
-
King, S.T.1
Dunlap, G.W.2
Chen, P.M.3
-
22
-
-
34547428127
-
Scalable security for large, high performance storage systems
-
New York, NY, USA, ACM Press
-
A. W. Leung and E. L. Miller. Scalable security for large, high performance storage systems. In StorageSS '06: Proceedings of the second ACM workshop on Storage security and survivability, pages 29-40, New York, NY, USA, 2006. ACM Press.
-
(2006)
StorageSS '06: Proceedings of the second ACM workshop on Storage security and survivability
, pp. 29-40
-
-
Leung, A.W.1
Miller, E.L.2
-
23
-
-
0035703990
-
Don't trust your file server
-
Washington, DC, USA, IEEE Computer Society
-
D. Mazieres. Don't trust your file server. In HOTOS '01: Proceedings of the Eighth Workshop on Hot Topics in Operating Systems, page 113, Washington, DC, USA, 2001. IEEE Computer Society.
-
(2001)
HOTOS '01: Proceedings of the Eighth Workshop on Hot Topics in Operating Systems
, pp. 113
-
-
Mazieres, D.1
-
24
-
-
85084162873
-
Strong security for network-attached storage
-
Berkeley, CA, USA, USENIX Association
-
E. L. Miller, D. D. E. Long, W. E. Freeman, and B. Reed. Strong security for network-attached storage. In FAST '02: Proceedings of the Conference on File and Storage Technologies, pages 1-13, Berkeley, CA, USA, 2002. USENIX Association.
-
(2002)
FAST '02: Proceedings of the Conference on File and Storage Technologies
, pp. 1-13
-
-
Miller, E.L.1
Long, D.D.E.2
Freeman, W.E.3
Reed, B.4
-
25
-
-
29844444147
-
The NFS version 4 protocol
-
B. Pawlowski, S. Shepler, C. Beame, B. Callaghan, M. Eisler, D. Noveck, D. Robinson, and R. Thurlow. The NFS version 4 protocol. Proceedings of the 2nd international system administration and networking conference (SANE2000), page 94, 2000.
-
(2000)
Proceedings of the 2nd international system administration and networking conference (SANE2000)
, pp. 94
-
-
Pawlowski, B.1
Shepler, S.2
Beame, C.3
Callaghan, B.4
Eisler, M.5
Noveck, D.6
Robinson, D.7
Thurlow, R.8
-
26
-
-
0033906295
-
Authenticating network-attached storage
-
B. C. Reed, E. G. Chron, R. C. Burns, and D. D. E. Long. Authenticating network-attached storage. IEEE Micro, 20(1 ):49-57, 2000.
-
(2000)
IEEE Micro
, vol.20
, Issue.1
, pp. 49-57
-
-
Reed, B.C.1
Chron, E.G.2
Burns, R.C.3
Long, D.D.E.4
-
27
-
-
47249103437
-
-
R. Rose. Survey of system virtualization techniques
-
R. Rose. Survey of system virtualization techniques.
-
-
-
-
28
-
-
0001636850
-
Kerberos: An authentication service for open network systems
-
Berkeley, CA, USENIX Association
-
J. G. Steiner, B. C. Neuman, and J. I. Schiller. Kerberos: An authentication service for open network systems. In Proceedings of the USENIX Winter 1988 Technical Conference, pages 191-202, Berkeley, CA, 1988. USENIX Association.
-
(1988)
Proceedings of the USENIX Winter 1988 Technical Conference
, pp. 191-202
-
-
Steiner, J.G.1
Neuman, B.C.2
Schiller, J.I.3
|