-
1
-
-
67651050147
-
-
104th Congress. 1996. Health Information Portability and Accountability Act. http://www.hhs.gov/ocr/hipaa/.
-
104th Congress. 1996. Health Information Portability and Accountability Act. http://www.hhs.gov/ocr/hipaa/.
-
-
-
-
2
-
-
10444279524
-
FARSITE: Federated, available, and reliable storage for an incompletely trusted environment
-
USENIX
-
Adya, A., Bolosky, W. J., Castro, M., Chaiken, R., Cermak, G., Douceur, J. R., Howell, J., Lorch, J. R., Theimer, M., and Wattenhofer, R. 2002. FARSITE: Federated, available, and reliable storage for an incompletely trusted environment. In Proceedings of the 5th Symposium on Operating Systems Design and Implementation (OSDI). USENIX.
-
(2002)
Proceedings of the 5th Symposium on Operating Systems Design and Implementation (OSDI)
-
-
Adya, A.1
Bolosky, W.J.2
Castro, M.3
Chaiken, R.4
Cermak, G.5
Douceur, J.R.6
Howell, J.7
Lorch, J.R.8
Theimer, M.9
Wattenhofer, R.10
-
3
-
-
34748917584
-
A fresh look at the reliability of long term digital storage
-
Baker, M., Shah, M., Rosenthal, D. S. H., Roussopoulos, M., Maniatis, P., Giuli, T., and Bungale, P. 2006. A fresh look at the reliability of long term digital storage. In Proceedings of EuroSys, 221--234.
-
(2006)
Proceedings of EuroSys
, pp. 221-234
-
-
Baker, M.1
Shah, M.2
Rosenthal, D.S.H.3
Roussopoulos, M.4
Maniatis, P.5
Giuli, T.6
Bungale, P.7
-
4
-
-
84937422374
-
The security of chaffing and winnowing
-
Springer, Berlin
-
Bellare, M. and Boldyreva, A. 2000. The security of chaffing and winnowing. In Proceedings of the Advances in Cryptology 6th International Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT'00). Lecure Notes in Computer Science, vol. 1976, Springer, Berlin, 517--530.
-
(2000)
Proceedings of the Advances in Cryptology 6th International Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT'00). Lecure Notes in Computer Science
, vol.1976
, pp. 517-530
-
-
Bellare, M.1
Boldyreva, A.2
-
5
-
-
84862209017
-
Address obfuscation: An effcient approach to combat a broad range of memory error exploits
-
Bhatkar, S., DuVarney, D. C., and Sekar, R. 2003. Address obfuscation: An effcient approach to combat a broad range of memory error exploits. In Proceedings of the 12th USENIX Security Symposium, 105--120.
-
(2003)
Proceedings of the 12th USENIX Security Symposium
, pp. 105-120
-
-
Bhatkar, S.1
DuVarney, D.C.2
Sekar, R.3
-
6
-
-
85084162339
-
Myriad: Cost-Effective disaster tolerance
-
Chang, F., Ji, M., Leung, S.-T. A., MacCormick, J., Perl, S. E., and Zhang, L. 2002. Myriad: Cost-Effective disaster tolerance. In Proceedings of the Conference on File and Storage
-
(2002)
Proceedings of the Conference on File and Storage
-
-
Chang, F.1
Ji, M.2
Leung, S.-T.A.3
MacCormick, J.4
Perl, S.E.5
Zhang, L.6
-
7
-
-
67651037668
-
-
Technologies (FAST). 103--116.
-
Technologies (FAST). 103--116.
-
-
-
-
8
-
-
35048848083
-
An efficient dispersal and encryption scheme for secure distributed information storage
-
Choi, S. J., Youn, H. Y., and Lee, B. K. 2003. An efficient dispersal and encryption scheme for secure distributed information storage. Lecture Notes in Computer Science, vol. 2660, 958--967.
-
(2003)
Lecture Notes in Computer Science
, vol.2660
, pp. 958-967
-
-
Choi, S.J.1
Youn, H.Y.2
Lee, B.K.3
-
9
-
-
33744479345
-
Freenet: A distributed anonymous information storage and retrieval system
-
Clarke, I., Sandberg, O., Wiley, B., and Hong, T. W. 2001. Freenet: A distributed anonymous information storage and retrieval system. Lecture Notes in Computer Science, vol. 2009, 46--66.
-
(2001)
Lecture Notes in Computer Science
, vol.2009
, pp. 46-66
-
-
Clarke, I.1
Sandberg, O.2
Wiley, B.3
Hong, T.W.4
-
11
-
-
0030697765
-
Building diverse systems
-
Forrest, S., Somayaji, A., and Ackley, D. H. 1997. Building diverse systems. In Proceedings of the 6th Workshop on Hot Topics in Operating Systems (HotOS-VI), 67--72.
-
(1997)
Proceedings of the 6th Workshop on Hot Topics in Operating Systems (HotOS-VI)
, pp. 67-72
-
-
Forrest, S.1
Somayaji, A.2
Ackley, D.H.3
-
12
-
-
33745210777
-
Trustworthy 100-year digital objects: Durable encoding for when it's too late to ask
-
Gladney, H. M. and Lorie, R. A. 2005. Trustworthy 100-year digital objects: Durable encoding for when it's too late to ask. ACM Trans. Inf. Syst. 23, 3, 299--324.
-
(2005)
ACM Trans. Inf. Syst
, vol.23
, Issue.3
, pp. 299-324
-
-
Gladney, H.M.1
Lorie, R.A.2
-
14
-
-
4544293523
-
Efficient Byzantine-tolerant erasure-coded storage
-
Goodson, G. R., Wylie, J. J., Ganger, G. R., and Reiter, M. K. 2004. Efficient Byzantine-tolerant erasure-coded storage. In Proceedings of the International Conference on Dependable Systems and Networking (DSN'04).
-
(2004)
Proceedings of the International Conference on Dependable Systems and Networking (DSN'04)
-
-
Goodson, G.R.1
Wylie, J.J.2
Ganger, G.R.3
Reiter, M.K.4
-
15
-
-
67651019083
-
-
Gunawi, H. S, Agrawal, N, Arpaci-Dusseau, A. C, Arpaci-Dusseau, R. H, and Schindler
-
Gunawi, H. S., Agrawal, N., Arpaci-Dusseau, A. C., Arpaci-Dusseau, R. H., and Schindler,
-
-
-
-
16
-
-
27544512937
-
-
J. 2005. Deconstructing commodity storage clusters. In Proceedings of the 32nd International Symposium on Computer Architecture, 60--71.
-
J. 2005. Deconstructing commodity storage clusters. In Proceedings of the 32nd International Symposium on Computer Architecture, 60--71.
-
-
-
-
17
-
-
85001706405
-
Glacier: Highly durable, decentralized storage despite massive correlated failures
-
USENIX
-
Haeberlen, A., Mislove, A., and Druschel, P. 2005. Glacier: Highly durable, decentralized storage despite massive correlated failures. In Proceedings of the 2nd Symposium on Networked Systems Design and Implementation (NSDI). USENIX.
-
(2005)
Proceedings of the 2nd Symposium on Networked Systems Design and Implementation (NSDI)
-
-
Haeberlen, A.1
Mislove, A.2
Druschel, P.3
-
18
-
-
84947222165
-
Mnemosyne: Peer-to-peer steganographic storage
-
Hand, S. and Roscoe, T. 2002. Mnemosyne: Peer-to-peer steganographic storage. Lecture Notes in Computer Science, vol. 2429, 130--140.
-
(2002)
Lecture Notes in Computer Science
, vol.2429
, pp. 130-140
-
-
Hand, S.1
Roscoe, T.2
-
19
-
-
0011841706
-
Design and implementation of a secure distributed data repository
-
Iyengar, A., Cahn, R., Garay, J. A., and Jutla, C. 1998. Design and implementation of a secure distributed data repository. In Proceedings of the 14th IFIP International Information Security Conference (SEC'98), 123--135.
-
(1998)
Proceedings of the 14th IFIP International Information Security Conference (SEC'98)
, pp. 123-135
-
-
Iyengar, A.1
Cahn, R.2
Garay, J.A.3
Jutla, C.4
-
20
-
-
85033460636
-
Plutus: Scalable secure file sharing on untrusted storage
-
USENIX
-
Kallahalla, M., Riedel, E., Swaminathan, R., Wang, Q., and Fu, K. 2003. Plutus: Scalable secure file sharing on untrusted storage. In Proceedings of the 2nd USENIX Conference on File and Storage Technologies (FAST). USENIX, 29--42.
-
(2003)
Proceedings of the 2nd USENIX Conference on File and Storage Technologies (FAST)
, pp. 29-42
-
-
Kallahalla, M.1
Riedel, E.2
Swaminathan, R.3
Wang, Q.4
Fu, K.5
-
21
-
-
85084159905
-
Designing for disasters
-
Keeton, K., Santos, C., Beyer, D., Chase, J., and Wilkes, J. 2004. Designing for disasters. In Proceedings of the 3rd USENIX Conference on File and Storage Technologies AST).
-
(2004)
Proceedings of the 3rd USENIX Conference on File and Storage Technologies AST)
-
-
Keeton, K.1
Santos, C.2
Beyer, D.3
Chase, J.4
Wilkes, J.5
-
23
-
-
84920746689
-
SafeStore: A durable and practical storage system
-
Kotla, R., Alvisi, L., and Dahlin, M. 2007. SafeStore: A durable and practical storage system. In Proceedings of the USENIX Annual Technical Conference, 129--142.
-
(2007)
Proceedings of the USENIX Annual Technical Conference
, pp. 129-142
-
-
Kotla, R.1
Alvisi, L.2
Dahlin, M.3
-
24
-
-
16644392046
-
The LOCKSS peer-to-peer digital preservation system
-
Maniatis, P., Roussopoulos, M., Giuli, T. J., Rosenthal, D. S. H., and Baker, M. 2005. The LOCKSS peer-to-peer digital preservation system. ACM Trans. Comput. Syst. 23, 1, 2--50.
-
(2005)
ACM Trans. Comput. Syst
, vol.23
, Issue.1
, pp. 2-50
-
-
Maniatis, P.1
Roussopoulos, M.2
Giuli, T.J.3
Rosenthal, D.S.H.4
Baker, M.5
-
25
-
-
85084162873
-
Strong security for network-attached storage
-
Miller, E. L., Long, D. D. E., Freeman, W. E., and Reed, B. C. 2002. Strong security for network-attached storage. In Proceedings of the Conference on File and Storage Technologies (FAST), 1--13.
-
(2002)
Proceedings of the Conference on File and Storage Technologies (FAST)
, pp. 1-13
-
-
Miller, E.L.1
Long, D.D.E.2
Freeman, W.E.3
Reed, B.C.4
-
26
-
-
67651065860
-
-
Oxley, M. G. 2002. (H.R.3763) Sarbanes-Oxley Act of 2002.
-
Oxley, M. G. 2002. (H.R.3763) Sarbanes-Oxley Act of 2002.
-
-
-
-
27
-
-
0031223146
-
-
Plank, J. S. 1997. A tutorial on Reed-Solomon coding for fault-tolerance in RAID-like systems. Softw. Practice Exper. 27, 9, 995--1012. Correction in James S. Plank and Ying Ding, Tech. rep. UT-CS-03-504, University of Tennessee, 2003.
-
Plank, J. S. 1997. A tutorial on Reed-Solomon coding for fault-tolerance in RAID-like systems. Softw. Practice Exper. 27, 9, 995--1012. Correction in James S. Plank and Ying Ding, Tech. rep. UT-CS-03-504, University of Tennessee, 2003.
-
-
-
-
29
-
-
0024641589
-
Efficient dispersal of information for security, load balancing, and fault tolerance
-
Rabin, M. O. 1989. Efficient dispersal of information for security, load balancing, and fault tolerance. J. ACM 36, 335--348.
-
(1989)
J. ACM
, vol.36
, pp. 335-348
-
-
Rabin, M.O.1
-
30
-
-
84943547553
-
Pond: The OceanStore prototype
-
Rhea, S., Eaton, P., Geels, D., Weatherspoon, H., Zhao, B., and Kubiatowicz, J. 2003. Pond: The OceanStore prototype. In Proceedings of the 2nd USENIX Conference on File and Storage Technologies (FAST), 1--14.
-
(2003)
Proceedings of the 2nd USENIX Conference on File and Storage Technologies (FAST)
, pp. 1-14
-
-
Rhea, S.1
Eaton, P.2
Geels, D.3
Weatherspoon, H.4
Zhao, B.5
Kubiatowicz, J.6
-
31
-
-
1542488706
-
Chaffing and winnowing: Confidentiality without encryption
-
Rivest, R. L. 1998. Chaffing and winnowing: Confidentiality without encryption. CryptoBytes, 4, 1, 12--17.
-
(1998)
CryptoBytes
, vol.4
, Issue.1
, pp. 12-17
-
-
Rivest, R.L.1
-
32
-
-
0042352263
-
Deciding when to forget in the Elephant file system
-
Santry, D. S., Feeley, M. J., Hutchinson, N. C., Veitch, A. C., Carton, R. W., and Ofir, J. 1999. Deciding when to forget in the Elephant file system. In Proceedings of the 17th ACM Symposium on Operating Systems Principles (SOSP'99), 110--123.
-
(1999)
Proceedings of the 17th ACM Symposium on Operating Systems Principles (SOSP'99)
, pp. 110-123
-
-
Santry, D.S.1
Feeley, M.J.2
Hutchinson, N.C.3
Veitch, A.C.4
Carton, R.W.5
Ofir, J.6
-
34
-
-
0018545449
-
How to share a secret
-
Shamir, A. 1979. How to share a secret. Comm. ACM 22, 11, 612--613.
-
(1979)
Comm. ACM
, vol.22
, Issue.11
, pp. 612-613
-
-
Shamir, A.1
-
37
-
-
33947132170
-
Potshards: Storing data for the long term without encryption
-
Storer, M., Greenan, K., Miller, E. L., and Maltzahn, C. 2005. Potshards: Storing data for the long term without encryption. In Proceedings of the 3rd International IEEE Security in Storage Workshop.
-
(2005)
Proceedings of the 3rd International IEEE Security in Storage Workshop
-
-
Storer, M.1
Greenan, K.2
Miller, E.L.3
Maltzahn, C.4
-
39
-
-
55449096984
-
POTSHARDS: Secure long-term storage without encryption
-
Storer, M. W., Greenan, K. M., Miller, E. L., and Voruganti, K. 2007. POTSHARDS: Secure long-term storage without encryption. In Proceedings of the USENIX Annual Technical Conference, 143--156.
-
(2007)
Proceedings of the USENIX Annual Technical Conference
, pp. 143-156
-
-
Storer, M.W.1
Greenan, K.M.2
Miller, E.L.3
Voruganti, K.4
-
41
-
-
67651053317
-
Improving secure long term archival of digitally signed documents
-
Troncoso, C., De Cock, D., and Preneel, B. 2008. Improving secure long term archival of digitally signed documents. In Proceedings of the ACM Workshop on Storage Security and Survivability, 27--36.
-
(2008)
Proceedings of the ACM Workshop on Storage Security and Survivability
, pp. 27-36
-
-
Troncoso, C.1
De Cock, D.2
Preneel, B.3
-
42
-
-
85084163931
-
Publius: A robust, tamper-evident, censorship-resistant Web publishing system
-
Waldman, M., Rubin, A. D., and Cranor, L. F. 2000. Publius: A robust, tamper-evident, censorship-resistant Web publishing system. In Proceedings of the 9th USENIX Security Symposium.
-
(2000)
Proceedings of the 9th USENIX Security Symposium
-
-
Waldman, M.1
Rubin, A.D.2
Cranor, L.F.3
-
43
-
-
34547261222
-
Packet vaccine: Black-Box exploit detection and signature generation
-
Wang, X., Li, Z., Xu, J., Reiter, M. K., Kil, C., and Choi, J. Y. 2006. Packet vaccine: Black-Box exploit detection and signature generation. In Proceedings of the 13th ACM Conference on Computer and Communications Security (CCS'06).
-
(2006)
Proceedings of the 13th ACM Conference on Computer and Communications Security (CCS'06)
-
-
Wang, X.1
Li, Z.2
Xu, J.3
Reiter, M.K.4
Kil, C.5
Choi, J.Y.6
-
44
-
-
33645459930
-
Verifiable secret redistribution for threshold sharing schemes
-
Tech. rep. CMU-CS-02-114-R, Carnegie Mellon University. October
-
Wong, T. M., Wang, C., and Wing, J. M. 2002. Verifiable secret redistribution for threshold sharing schemes. Tech. rep. CMU-CS-02-114-R, Carnegie Mellon University. October.
-
(2002)
-
-
Wong, T.M.1
Wang, C.2
Wing, J.M.3
-
45
-
-
67651009760
-
-
Wylie, J. J, Bigrigg, M. W, Strunk, J. D, Ganger, G. R, Kilite
-
Wylie, J. J., Bigrigg, M. W., Strunk, J. D., Ganger, G. R., Kilite
-
-
-
-
46
-
-
67651062711
-
-
H., and Khosla, P. K. 2000. Survivable storage systems. IEEE Comput., 61--68.
-
H., and Khosla, P. K. 2000. Survivable storage systems. IEEE Comput., 61--68.
-
-
-
-
47
-
-
33745803872
-
Automatic diagnosis and responses to memory corruption vulnerabilities
-
Xu, J., Ning, P., Kil, C., Zhai, Y., and Bookholt, C. 2005. Automatic diagnosis and responses to memory corruption vulnerabilities. In Proceedings of the 12th ACM Conference on Computer and Communications Security (CCS'05), 223--234.
-
(2005)
Proceedings of the 12th ACM Conference on Computer and Communications Security (CCS'05)
, pp. 223-234
-
-
Xu, J.1
Ning, P.2
Kil, C.3
Zhai, Y.4
Bookholt, C.5
-
49
-
-
77958128593
-
BitVault: A highly reliable distributed data retention platform
-
Zhang, Z., Lian, Q., Lin, S., Chen, W., Chen, Y., and Jin, C. 2007. BitVault: A highly reliable distributed data retention platform. ACM SIGOPS Oper. Syst. Rev. 41, 2, 27--36.
-
(2007)
ACM SIGOPS Oper. Syst. Rev
, vol.41
, Issue.2
, pp. 27-36
-
-
Zhang, Z.1
Lian, Q.2
Lin, S.3
Chen, W.4
Chen, Y.5
Jin, C.6
|