메뉴 건너뛰기




Volumn 27, Issue 5, 2011, Pages 614-619

A high performance data integrity assurance based on the determinant technique

Author keywords

Data integrity; Error detection; File system; Security; Storage integrity

Indexed keywords

DATA INTEGRITY; DATA MATRICES; DETERMINANT FACTORS; FILE SYSTEM; HAMMING CODE; MEASURING DATA; NETWORK APPLICATIONS; PERFORMANCE DATA; SECURITY; SECURITY STRATEGIES; SIMULATION RESULT; STORAGE INTEGRITY;

EID: 79951852780     PISSN: 0167739X     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.future.2010.05.011     Document Type: Article
Times cited : (7)

References (19)
  • 2
    • 0036216396 scopus 로고    scopus 로고
    • The benefits of a notification process in addressing the worsening computer virus problems: Results of a survey and a simulation model
    • J.L. Aron, M. O'leary, A.R. Gove, S. Azadegan, and M.C. Schneider The benefits of a notification process in addressing the worsening computer virus problems: results of a survey and a simulation model Computers & Security 21 2 2002
    • (2002) Computers & Security , vol.21 , Issue.2
    • Aron, J.L.1    O'Leary, M.2    Gove, A.R.3    Azadegan, S.4    Schneider, M.C.5
  • 11
    • 57849150156 scopus 로고    scopus 로고
    • Network architecture: Hamming codes and cyclic redundancy for transmission error correction
    • S.J. Chung Network architecture: hamming codes and cyclic redundancy for transmission error correction ACM 33 4 2001
    • (2001) ACM , vol.33 , Issue.4
    • Chung, S.J.1
  • 12
    • 57849086637 scopus 로고    scopus 로고
    • OS environment backup technology (RAID-1, standby disk series, pre-install image on HDD)
    • W. Toshihiro, S. Takahisa, Y. Hiroyuki, and K. Koji OS environment backup technology (RAID-1, standby disk series, pre-install image on HDD) NEC Technical Journal 56 6 2003
    • (2003) NEC Technical Journal , vol.56 , Issue.6
    • Toshihiro, W.1    Takahisa, S.2    Hiroyuki, Y.3    Koji, K.4
  • 14
    • 57849139290 scopus 로고    scopus 로고
    • An Oblique-matrix technique for data integrity assurance
    • J.A. Ghaeb, and J. Chebil An Oblique-matrix technique for data integrity assurance Elsevier, Computer and security 28 12 2009
    • (2009) Elsevier, Computer and Security , vol.28 , Issue.2
    • Ghaeb, J.A.1    Chebil, J.2
  • 15
    • 34247614499 scopus 로고    scopus 로고
    • Dual-level key management for secure grid communication in dynamic and hierarchical groups
    • X. Zou, Y. Dai, and X. Ran Dual-level key management for secure grid communication in dynamic and hierarchical groups Future Generation Computer Systems 23 6 2007
    • (2007) Future Generation Computer Systems , vol.23 , Issue.6
    • Zou, X.1    Dai, Y.2    Ran, X.3
  • 17
    • 33750303836 scopus 로고    scopus 로고
    • An efficient image authentication method based on hamming code
    • C. Chi-Shiang, and C. Chin-Chen An efficient image authentication method based on hamming code Elsevier Pattern Recognition 40 2 2007 681 690
    • (2007) Elsevier Pattern Recognition , vol.40 , Issue.2 , pp. 681-690
    • Chi-Shiang, C.1    Chin-Chen, C.2
  • 19


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.