-
1
-
-
70349160867
-
-
Apple Inc. Time Machine. http://www.apple, com/macosx/features/ timemachine.html, 2007.
-
Apple Inc. Time Machine. http://www.apple, com/macosx/features/ timemachine.html, 2007.
-
-
-
-
2
-
-
34748917584
-
A fresh look at the reliability of long-term digital storage
-
M. Baker, M. Shah, D. S. H. Rosenthal, M. Rous-sopoulos, P. Maniatis, T.J. Giuli, and P. Bungale. A fresh look at the reliability of long-term digital storage. In Proc. of the ACM SIGOPS/EuroSys European Conference on Computer Systems (EuroSys '06), pages 221-234, 2006.
-
(2006)
Proc. of the ACM SIGOPS/EuroSys European Conference on Computer Systems (EuroSys '06)
, pp. 221-234
-
-
Baker, M.1
Shah, M.2
Rosenthal, D.S.H.3
Rous-sopoulos, M.4
Maniatis, P.5
Giuli, T.J.6
Bungale, P.7
-
3
-
-
78549282010
-
PRACTI replication
-
May
-
N. Belaramani, M. Dahlin, L. Gao, A. Nayate, A. Venkataramani, P. Yalagandula, and J. Zheng. PRACTI replication. In Proc. of the USENIX Symposium on Networked Systems Design and Implementation (NSDI '06), pages 59-72, May 2006.
-
(2006)
Proc. of the USENIX Symposium on Networked Systems Design and Implementation (NSDI '06)
, pp. 59-72
-
-
Belaramani, N.1
Dahlin, M.2
Gao, L.3
Nayate, A.4
Venkataramani, A.5
Yalagandula, P.6
Zheng, J.7
-
4
-
-
70349162987
-
-
Carbonite, Inc, online, 2007
-
Carbonite, Inc. Remote backup online, http://www. carbonite. com, 2007.
-
Remote backup
-
-
-
6
-
-
12744279165
-
On the performance, feasibility, and use of forward-secure signatures
-
E. Cronin, S. Jamin, T. Malkin, and P. McDaniel. On the performance, feasibility, and use of forward-secure signatures. In Proc. of ACM Conference on Computer and Communications Security, pages 131-144, 2003.
-
(2003)
Proc. of ACM Conference on Computer and Communications Security
, pp. 131-144
-
-
Cronin, E.1
Jamin, S.2
Malkin, T.3
McDaniel, P.4
-
7
-
-
70349155151
-
-
Decho Corporation. Online backup, data backup, and remote backup solutions, 2007
-
Decho Corporation. Online backup, data backup, and remote backup solutions. http://www.mozy.com, 2007.
-
-
-
-
8
-
-
70349130457
-
Spike in laptop thefts stirs jitters over data
-
June 22
-
P. Dvorak. Spike in laptop thefts stirs jitters over data. The Washington Post, June 22, 2006.
-
(2006)
The Washington Post
-
-
Dvorak, P.1
-
9
-
-
0042349623
-
A trusted open platform
-
P. England, B. Lampson, J. Manferdelli, M. Peinado, and B. Willman. A trusted open platform. IEEE Computer, 7(36):55-62, 2003.
-
(2003)
IEEE Computer
, vol.7
, Issue.36
, pp. 55-62
-
-
England, P.1
Lampson, B.2
Manferdelli, J.3
Peinado, M.4
Willman, B.5
-
11
-
-
70349092793
-
-
Microsoft Corporation. About Active Directory Domain Services. http://msdn.microsoft.com/en-us/library/aa772142(VS.85).aspx, 2008.
-
Microsoft Corporation. About Active Directory Domain Services. http://msdn.microsoft.com/en-us/library/aa772142(VS.85).aspx, 2008.
-
-
-
-
12
-
-
70349156504
-
-
Microsoft Corporation. Live Mesh. https://www.mesh.com, 2008.
-
(2008)
Live Mesh
-
-
-
15
-
-
70349120007
-
-
NetApp, Inc
-
NetApp, Inc. Snap vault. http://www.netapp. com/us/products/protection- software/snapvault. html, 2008.
-
(2008)
Snap vault
-
-
-
16
-
-
79953672829
-
Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software
-
February
-
J. Newsome and D. Song. Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software. In Proc. of the Network and Distributed System Security Symposium, February 2005.
-
(2005)
Proc. of the Network and Distributed System Security Symposium
-
-
Newsome, J.1
Song, D.2
-
17
-
-
35148866841
-
Peer-to-peer replication in WinFS
-
Technical Report MSR-TR-2006-78, Microsoft Research, June
-
L. Novik, I. Hudis, D. Terry, S. Anand, V. Jhaveri, A. Shah, and Y. Wu. Peer-to-peer replication in WinFS. Technical Report MSR-TR-2006-78, Microsoft Research, June 2006.
-
(2006)
-
-
Novik, L.1
Hudis, I.2
Terry, D.3
Anand, S.4
Jhaveri, V.5
Shah, A.6
Wu, Y.7
-
19
-
-
0031541392
-
Flexible update propagation for weakly consistent replication
-
October
-
K. Petersen, M. Spreitzer, D. Terry, M. Theimer, and A. Demers. Flexible update propagation for weakly consistent replication. In Proc. of the ACM Symposium on Operating Systems Principles (SOSP '97), pages 288-301, October 1997.
-
(1997)
Proc. of the ACM Symposium on Operating Systems Principles (SOSP '97)
, pp. 288-301
-
-
Petersen, K.1
Spreitzer, M.2
Terry, D.3
Theimer, M.4
Demers, A.5
-
20
-
-
33244463191
-
Ext3cow: A time-shifting file system for regulatory compliance
-
May
-
Z. Peterson and R. Burns. Ext3cow: A time-shifting file system for regulatory compliance. ACM Transactions on Storage, 1(2): 190-212, May 2005.
-
(2005)
ACM Transactions on Storage
, vol.1
, Issue.2
, pp. 190-212
-
-
Peterson, Z.1
Burns, R.2
-
21
-
-
70349097762
-
-
V. Ramasubramanian, T. Rodeheffer, D. Terry, M. Walraed-Sullivan, T. Wobber, C. Marshall, and A. Vahdat. Cimbiosys: A platform for content-based partial replication. Technical Report MSR-TR-2008-116, Microsoft Research, 2008. To appear in Proc. of the USENIX Symposium on Networked Systems Design and Implementation (NSDI 09).
-
V. Ramasubramanian, T. Rodeheffer, D. Terry, M. Walraed-Sullivan, T. Wobber, C. Marshall, and A. Vahdat. Cimbiosys: A platform for content-based partial replication. Technical Report MSR-TR-2008-116, Microsoft Research, 2008. To appear in Proc. of the USENIX Symposium on Networked Systems Design and Implementation (NSDI 09).
-
-
-
-
23
-
-
0016081584
-
Protection and the control of information sharing in Multics
-
J. Saltzer. Protection and the control of information sharing in Multics. Communications of the ACM, 17(7):388-402, 1974.
-
(1974)
Communications of the ACM
, vol.17
, Issue.7
, pp. 388-402
-
-
Saltzer, J.1
-
24
-
-
0042352263
-
Deciding when to forget in the Elephant file system
-
December
-
D. S. Santry, M. J. Feeley, N. C. Hutchinson, A. C. Veitch, R. W. Carton, and J. Ofir. Deciding when to forget in the Elephant file system. In Proc. of the ACM Symposium on Operating Systems Principles (SOSP '99), pages 110-123, December 1999.
-
(1999)
Proc. of the ACM Symposium on Operating Systems Principles (SOSP '99)
, pp. 110-123
-
-
Santry, D.S.1
Feeley, M.J.2
Hutchinson, N.C.3
Veitch, A.C.4
Carton, R.W.5
Ofir, J.6
-
25
-
-
0030684221
-
Dealing with server corruption in weakly consistent, replicated data systems
-
September
-
M. Spreitzer, M. Theimer, K. Petersen, A. Demers, and D. Terry. Dealing with server corruption in weakly consistent, replicated data systems. In Proc. of the ACM/IEEE International Conference on Mobile Computing and Networking (MobiCom '97), pages 234-240, September 1997.
-
(1997)
Proc. of the ACM/IEEE International Conference on Mobile Computing and Networking (MobiCom '97)
, pp. 234-240
-
-
Spreitzer, M.1
Theimer, M.2
Petersen, K.3
Demers, A.4
Terry, D.5
-
26
-
-
70349083843
-
-
Symantec Corporation
-
Symantec Corporation. Symantec Backup. http://www. Symantec.com, 2007.
-
(2007)
Symantec Backup
-
-
-
27
-
-
78651556127
-
Eventually consistent
-
W. Vogels. Eventually consistent. Queue, 6(6): 14-19, 2008.
-
(2008)
Queue
, vol.6
, Issue.6
, pp. 14-19
-
-
Vogels, W.1
-
28
-
-
70349130880
-
-
January 2008
-
Wikipedia. Polygraph. http://en. wikipedia.org/wiki/Polygraph, January 2008.
-
Polygraph
-
-
-
29
-
-
0028380781
-
Authentication in the Taos Operating System
-
February
-
E. Wobber, M. Abadi, M. Burrows, and B. Lamp-son. Authentication in the Taos Operating System. ACM Transactions on Computer Systems, 12(1):3-32, February 1994.
-
(1994)
ACM Transactions on Computer Systems
, vol.12
, Issue.1
, pp. 3-32
-
-
Wobber, E.1
Abadi, M.2
Burrows, M.3
Lamp-son, B.4
-
30
-
-
84888352157
-
Making information flow explicit in HiStar
-
November
-
N. Zeldovich, S. Boyd-Wickizer, E. Kohler, and D. Mazieres. Making information flow explicit in HiStar. In Proc. of the Symposium on Operating Systems Design and Implementation (OSDI '06), pages 263-278, November 2006.
-
(2006)
Proc. of the Symposium on Operating Systems Design and Implementation (OSDI '06)
, pp. 263-278
-
-
Zeldovich, N.1
Boyd-Wickizer, S.2
Kohler, E.3
Mazieres, D.4
|