-
1
-
-
0027660422
-
Atomic snapshots of shared memory
-
Afek, Y., Attiya, H., Dolev, D., Gafni, E., Merritt, M., Shavit, N.: Atomic snapshots of shared memory. Journal of the ACM 40(4), 873-890 (1993)
-
(1993)
Journal of the ACM
, vol.40
, Issue.4
, pp. 873-890
-
-
Afek, Y.1
Attiya, H.2
Dolev, D.3
Gafni, E.4
Merritt, M.5
Shavit, N.6
-
2
-
-
34748917584
-
A fresh look at the reliability of long-term digital storage
-
Baker, M., Shah, M., Rosenthal, D.S.H., Roussopoulos, M., Maniatis, P., Giuli, T., Bungale, P.: A fresh look at the reliability of long-term digital storage. In: Proc. 1st European Conference on Computer Systems (Euro Sys), pp. 221-234 (2006)
-
(2006)
Proc. 1st European Conference on Computer Systems (Euro Sys)
, pp. 221-234
-
-
Baker, M.1
Shah, M.2
Rosenthal, D.S.H.3
Roussopoulos, M.4
Maniatis, P.5
Giuli, T.6
Bungale, P.7
-
3
-
-
0028482823
-
Checking the correctness of memories
-
Blum, M., Evans, W., Gemmell, P., Kannan, S., Naor, M.: Checking the correctness of memories. Algorithmica 12, 225-244 (1994)
-
(1994)
Algorithmica
, vol.12
, pp. 225-244
-
-
Blum, M.1
Evans, W.2
Gemmell, P.3
Kannan, S.4
Naor, M.5
-
5
-
-
36849043102
-
Efficient fork-linearizable access to untrusted shared memory
-
August
-
Cachin, C., Shelat, A., Shraer, A.: Efficient fork-linearizable access to untrusted shared memory. In: Proc. 26th ACM Symposium on Principles of Distributed Computing (PODC), pp. 129-138 (August 2007)
-
(2007)
Proc. 26th ACM Symposium on Principles of Distributed Computing (PODC)
, pp. 129-138
-
-
Cachin, C.1
Shelat, A.2
Shraer, A.3
-
6
-
-
27544456041
-
Towards constant bandwidth overhead integrity checking of untrusted data
-
Clarke, D., Suh, G.E., Gassend, B., Sudan, A., van Dijk, M., Devadas, S.: Towards constant bandwidth overhead integrity checking of untrusted data. In: Proc. 26th IEEE Symposium on Security & Privacy (2005)
-
(2005)
Proc. 26th IEEE Symposium on Security & Privacy
-
-
Clarke, D.1
Suh, G.E.2
Gassend, B.3
Sudan, A.4
van Dijk, M.5
Devadas, S.6
-
7
-
-
68849092853
-
-
CNET News. Red Hat, Fedora servers compromised (August 2008), http://news.cnet.com/8301-1009-3-10023565-83.html
-
CNET News. Red Hat, Fedora servers compromised (August 2008), http://news.cnet.com/8301-1009-3-10023565-83.html
-
-
-
-
8
-
-
85033498470
-
SiRiUS: Securing remote untrusted storage
-
Goh, E.-J., Shacham, H., Modadugu, N., Boneh, D.: SiRiUS: Securing remote untrusted storage. In: Proc. Network and Distributed Systems Security Symposium (NDSS) (2003)
-
(2003)
Proc. Network and Distributed Systems Security Symposium (NDSS)
-
-
Goh, E.-J.1
Shacham, H.2
Modadugu, N.3
Boneh, D.4
-
11
-
-
77952379905
-
Secure untrusted data repository (SUNDR)
-
Li, J., Krohn, M., Maziéres, D., Shasha, D.: Secure untrusted data repository (SUNDR). In: Proc. 6th Symp. Operating Systems Design and Implementation (OSDI), pp. 121-136 (2004)
-
(2004)
Proc. 6th Symp. Operating Systems Design and Implementation (OSDI)
, pp. 121-136
-
-
Li, J.1
Krohn, M.2
Maziéres, D.3
Shasha, D.4
-
13
-
-
0042352260
-
Separating key management from file system security
-
Mazières, D., Kaminsky, M., Kaashoek, F., Witchel, E.: Separating key management from file system security. In: Proc. 17th ACM Symposium on Operating System Principles (SOSP) (1999)
-
(1999)
Proc. 17th ACM Symposium on Operating System Principles (SOSP)
-
-
Mazières, D.1
Kaminsky, M.2
Kaashoek, F.3
Witchel, E.4
-
16
-
-
33747176236
-
Authentication and integrity in outsourced databases
-
Mykletun, E., Narasimha, M., Tsudik, G.: Authentication and integrity in outsourced databases. ACM Transactions on Storage 2(2), 107-138 (2006)
-
(2006)
ACM Transactions on Storage
, vol.2
, Issue.2
, pp. 107-138
-
-
Mykletun, E.1
Narasimha, M.2
Tsudik, G.3
-
18
-
-
68849112951
-
-
Siong, N.P, Toivonen, H, M2Crypto Python interface to Open SSL. Version 0.18.2 2008
-
Siong, N.P., Toivonen, H.: M2Crypto Python interface to Open SSL. Version 0.18.2 (2008), http://chandlerproject.org/Projects/MeTooCrypto
-
-
-
|