메뉴 건너뛰기




Volumn 28, Issue 1-2, 2009, Pages 94-99

An oblique-matrix technique for data integrity assurance

Author keywords

Data integrity; Error detection; File system; Security; Storage integrity

Indexed keywords

COMPUTER APPLICATIONS; QUALITY ASSURANCE;

EID: 57849139290     PISSN: 01674048     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.cose.2008.10.003     Document Type: Article
Times cited : (2)

References (25)
  • 1
    • 57849124307 scopus 로고    scopus 로고
    • Braden R, Borman D, Partridge C. Computing the internet checksum network working group request for comments (RFC), 1071, Sept. 1988.
    • Braden R, Borman D, Partridge C. Computing the internet checksum network working group request for comments (RFC), 1071, Sept. 1988.
  • 2
    • 57849091464 scopus 로고    scopus 로고
    • Carrier B. An investigator's guide to file system internals. First conference in computer security, incident handling and response, Hawaii, United States, June 2002.
    • Carrier B. An investigator's guide to file system internals. First conference in computer security, incident handling and response, Hawaii, United States, June 2002.
  • 3
    • 57849083244 scopus 로고    scopus 로고
    • CERT Coordination Centre. CERT/CC overview incident and vulnerability trends technical report. www.cert.org/present/cert-overview-trends.
    • CERT Coordination Centre. CERT/CC overview incident and vulnerability trends technical report. www.cert.org/present/cert-overview-trends.
  • 4
    • 57849150156 scopus 로고    scopus 로고
    • Network architecture: hamming codes and cyclic redundancy for transmission error correction
    • Chung S.-J. Network architecture: hamming codes and cyclic redundancy for transmission error correction. ACM 33 4 (Dec. 2001)
    • (2001) ACM , vol.33 , Issue.4
    • Chung, S.-J.1
  • 5
    • 57849120447 scopus 로고    scopus 로고
    • Damgrad I. A design principle for hash functions. G Brassard, Crypto, vol. 435, 1989.
    • Damgrad I. A design principle for hash functions. G Brassard, Crypto, vol. 435, 1989.
  • 6
    • 85084099412 scopus 로고    scopus 로고
    • Fu K, Kaashoek MF, Mazieres D. Fast and secure distributed read-only file system. In: Proceedings of the fourth symposium on operating systems desine and implementation, San Diego, CA, Oct. 2000.
    • Fu K, Kaashoek MF, Mazieres D. Fast and secure distributed read-only file system. In: Proceedings of the fourth symposium on operating systems desine and implementation, San Diego, CA, Oct. 2000.
  • 7
    • 0027621805 scopus 로고    scopus 로고
    • Hou RY, Patt YN. Comparing rebuild algorithms for mirrored and RAID-5 disk arrays. In: International conference on management of data, 1993 (ACM SIGMOD 1993).
    • Hou RY, Patt YN. Comparing rebuild algorithms for mirrored and RAID-5 disk arrays. In: International conference on management of data, 1993 (ACM SIGMOD 1993).
  • 8
    • 33845577369 scopus 로고    scopus 로고
    • Howells G, Papoutsis E, McDonald-Maier K. Novel techniques for ensuring secure communications for distributed low power devices. In: Proceedings of the first NASA/ESA conference on adaptive hardware and systems (AHS 2006).
    • Howells G, Papoutsis E, McDonald-Maier K. Novel techniques for ensuring secure communications for distributed low power devices. In: Proceedings of the first NASA/ESA conference on adaptive hardware and systems (AHS 2006).
  • 9
    • 0035269588 scopus 로고    scopus 로고
    • Fast calculation of the number of minimum-weight words of CRC codes
    • Kazakov P. Fast calculation of the number of minimum-weight words of CRC codes. IEEE Transactions on Information Theory 47 3 (Mar. 2001) 1190-1195
    • (2001) IEEE Transactions on Information Theory , vol.47 , Issue.3 , pp. 1190-1195
    • Kazakov, P.1
  • 10
    • 27544455735 scopus 로고    scopus 로고
    • Kounavis ME, Berry FL. A systematic approach to building high performance software-based CRC generators. In: Proceedings of the 10th IEEE symposium on computers and communications (ISCC 2005).
    • Kounavis ME, Berry FL. A systematic approach to building high performance software-based CRC generators. In: Proceedings of the 10th IEEE symposium on computers and communications (ISCC 2005).
  • 11
    • 47249096288 scopus 로고    scopus 로고
    • Lu M, Lin S, Chiueh T. Efficient logging and replication techniques for comprehensive data protection. In: 24th IEEE conference on mass storage systems and technologies (MSST 2007).
    • Lu M, Lin S, Chiueh T. Efficient logging and replication techniques for comprehensive data protection. In: 24th IEEE conference on mass storage systems and technologies (MSST 2007).
  • 14
    • 84942243987 scopus 로고    scopus 로고
    • Murphy S, Hayatnagarkar A, Krishnaswamy S, Morrison W, Watson R. Prophylactic, treatment and containment techniques for ensuring active network security. In: Proceedings of the DARPA information survivability conference and exposition (DISCEX 2003).
    • Murphy S, Hayatnagarkar A, Krishnaswamy S, Morrison W, Watson R. Prophylactic, treatment and containment techniques for ensuring active network security. In: Proceedings of the DARPA information survivability conference and exposition (DISCEX 2003).
  • 16
    • 84885660591 scopus 로고    scopus 로고
    • Prabhakaran V, Agrawal N, Bairavasundaram LN, Gunawi HS, Arpaci-Dusseau AC, Arpaci-Dusseau RH. IRON File Systems. In: Proceedings of the 20th ACM symposium on operating systems principles (SOSP '05), Brighton, UK, October 2005.
    • Prabhakaran V, Agrawal N, Bairavasundaram LN, Gunawi HS, Arpaci-Dusseau AC, Arpaci-Dusseau RH. IRON File Systems. In: Proceedings of the 20th ACM symposium on operating systems principles (SOSP '05), Brighton, UK, October 2005.
  • 17
    • 60449083388 scopus 로고    scopus 로고
    • Partridge C, Hughes J, Stone J. Performance of checksums and CRCs over real data. ACM SIGCOMM computer communication review. In: Proceedings of the conference on applications, technologies, architectures, and protocols for computer communication, vol. 25, no. 4, p. 68-76, October 1995.
    • Partridge C, Hughes J, Stone J. Performance of checksums and CRCs over real data. ACM SIGCOMM computer communication review. In: Proceedings of the conference on applications, technologies, architectures, and protocols for computer communication, vol. 25, no. 4, p. 68-76, October 1995.
  • 18
    • 57849164753 scopus 로고    scopus 로고
    • Quinlan S, Dorward S. A new approach to archival storage. In: Proceedings of first USENIX conference on file and storage technology, Monterey, CA, Jan 2002.
    • Quinlan S, Dorward S. A new approach to archival storage. In: Proceedings of first USENIX conference on file and storage technology, Monterey, CA, Jan 2002.
  • 19
    • 0025462742 scopus 로고
    • Analysis of checksums, extended-precision checksums, and cyclic redundancy checks
    • Saxena N.R., and McCluskey E.G. Analysis of checksums, extended-precision checksums, and cyclic redundancy checks. IEEE Transactions on Computers 39 7 (July 1990) 969-975
    • (1990) IEEE Transactions on Computers , vol.39 , Issue.7 , pp. 969-975
    • Saxena, N.R.1    McCluskey, E.G.2
  • 20
    • 57849096372 scopus 로고    scopus 로고
    • Seltzer M, Yigit O. A new hashing package for UNIX. In: Proceedings of the Winter USENIX technical conference, Dallas, TX, January 1991.
    • Seltzer M, Yigit O. A new hashing package for UNIX. In: Proceedings of the Winter USENIX technical conference, Dallas, TX, January 1991.
  • 21
    • 52849139160 scopus 로고    scopus 로고
    • Error detection capability of shortened hamming codes and their dual codes
    • Shutao X., and Fangwei F. Error detection capability of shortened hamming codes and their dual codes. Acta Mathematicae Applicatae Sinica 16 3 (July 2000)
    • (2000) Acta Mathematicae Applicatae Sinica , vol.16 , Issue.3
    • Shutao, X.1    Fangwei, F.2
  • 22
    • 33244492171 scopus 로고    scopus 로고
    • Sivathanu G, Wright C, Zadok E. Ensuring data integrity in storage: techniques and applications. In: Proceedings of the 2005 ACM workshop on storage security and survivability (StorageSS 2005).
    • Sivathanu G, Wright C, Zadok E. Ensuring data integrity in storage: techniques and applications. In: Proceedings of the 2005 ACM workshop on storage security and survivability (StorageSS 2005).
  • 23
    • 33947271266 scopus 로고    scopus 로고
    • Mirrored disk organization reliability analysis
    • Thomasian A., and Blaum A. Mirrored disk organization reliability analysis. IEEE Transactions on Computers 55 12 (December 2006)
    • (2006) IEEE Transactions on Computers , vol.55 , Issue.12
    • Thomasian, A.1    Blaum, A.2
  • 24
    • 57849086637 scopus 로고    scopus 로고
    • OS Environment backup technology (RAID-1, standby disk series, pre-install image on HDD)
    • Toshihiro W., Takahisa S., Hiroyuki Y., and Koji K. OS Environment backup technology (RAID-1, standby disk series, pre-install image on HDD). NEC Technical Journal 56 6 (2003)
    • (2003) NEC Technical Journal , vol.56 , Issue.6
    • Toshihiro, W.1    Takahisa, S.2    Hiroyuki, Y.3    Koji, K.4
  • 25
    • 57849112026 scopus 로고    scopus 로고
    • Wright CP, Martino M, Zadoc E. NCryptfs: a secure and convenient cryptographic file system. In: Proceedings of the annual USENIX technical conference. San Antonio, TX: June 2003.
    • Wright CP, Martino M, Zadoc E. NCryptfs: a secure and convenient cryptographic file system. In: Proceedings of the annual USENIX technical conference. San Antonio, TX: June 2003.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.