-
1
-
-
84978405320
-
FARSITE: Federated, available, and reliable storage for an incompletely trusted environment
-
December
-
A. Adya, W. Bolosky, M. Castro, G. Cermak, R. Chaiken, J. Douceur, J. Howell, J. Lorch, M. Theimer, and R. Wattenhofer. FARSITE: Federated, available, and reliable storage for an incompletely trusted environment. In OSDI, pages 1–14, December 2002.
-
(2002)
OSDI
, pp. 1-14
-
-
Adya, A.1
Bolosky, W.2
Castro, M.3
Cermak, G.4
Chaiken, R.5
Douceur, J.6
Howell, J.7
Lorch, J.8
Theimer, M.9
Wattenhofer, R.10
-
2
-
-
85077187994
-
Scalable secure storage when half the system is faulty
-
N. Alon, H. Kaplan, M. Krivelevich, D. Malkhi, and J. Stern. Scalable secure storage when half the system is faulty. In ICALP, 2000.
-
(2000)
ICALP
-
-
Alon, N.1
Kaplan, H.2
Krivelevich, M.3
Malkhi, D.4
Stern, J.5
-
4
-
-
35048891868
-
Keying hash functions for message authentication
-
M. Bellare, R. Canetti, and H. Krawczyk. Keying hash functions for message authentication. In CRYPTO, pages 1–15, 1996.
-
(1996)
CRYPTO
, pp. 1-15
-
-
Bellare, M.1
Canetti, R.2
Krawczyk, H.3
-
5
-
-
0027764777
-
A cryptographic file system for UNIX
-
M. Blaze. A cryptographic file system for UNIX. In CCS, 1993.
-
(1993)
CCS
-
-
Blaze, M.1
-
6
-
-
0000552770
-
Twenty years of attacks on the RSA cryptosystem
-
D. Boneh. Twenty years of attacks on the RSA cryptosystem. Notices of the AMS, 46, 1999.
-
(1999)
Notices of the AMS
, vol.46
-
-
Boneh, D.1
-
7
-
-
85013791146
-
Proactive recovery in a byzantine-fault-tolerant system
-
October
-
M. Castro and B. Liskov. Proactive recovery in a Byzantine-fault-tolerant system. In OSDI, pages 273–288, October 2000.
-
(2000)
OSDI
, pp. 273-288
-
-
Castro, M.1
Liskov, B.2
-
8
-
-
0039783096
-
-
Technical report, University of Salerno
-
G. Cattaneo, G. Persiano, A. Del Sorbo, A. Cozzolino, E. Mauriello, and R. Pisapia. Design and implementation of a transparent cryptographic file system for UNIX. Technical report, University of Salerno, 1997.
-
(1997)
Design and Implementation of a Transparent Cryptographic File System for UNIX
-
-
Cattaneo, G.1
Persiano, G.2
Del Sorbo, A.3
Cozzolino, A.4
Mauriello, E.5
Pisapia, R.6
-
10
-
-
85077196808
-
Trusted linux: An operating system approach
-
February
-
C. Dalton and T. Choo. Trusted linux: An operating system approach. CACM, 44(2), February 2001.
-
(2001)
CACM
, vol.44
, Issue.2
-
-
Dalton, C.1
Choo, T.2
-
11
-
-
0035204340
-
Optimizing file availability in a secure serverless distributed file system
-
J. R. Douceur and R. P. Wattenhofer. Optimizing file availability in a secure serverless distributed file system. In SRDS, pages 4–13, 2001.
-
(2001)
SRDS
, pp. 4-13
-
-
Douceur, J.R.1
Wattenhofer, R.P.2
-
12
-
-
0037542382
-
Storage management and caching in PAST, a large-scale, persistent peer-to-peer storage utility
-
P. Druschel and A. Rowstron. Storage management and caching in PAST, a large-scale, persistent peer-to-peer storage utility. In SOSP, 2001.
-
(2001)
SOSP
-
-
Druschel, P.1
Rowstron, A.2
-
16
-
-
85084162114
-
Embedded inodes and explicit grouping: Exploiting disk bandwidth for small files
-
G. Ganger and M. Kaashoek. Embedded inodes and explicit grouping: Exploiting disk bandwidth for small files. In USENIX Tech. Conf., pages 1–17, 1997.
-
(1997)
USENIX Tech. Conf.
, pp. 1-17
-
-
Ganger, G.1
Kaashoek, M.2
-
17
-
-
84964528983
-
Survivable storage systems
-
June
-
G. Ganger, P. Khosla, M. Bakkaloglu, M. Bigrigg, G. Goodson, S. Oguz, V. Pandurangan, C. Soules, J. Strunk, and J. Wylie. Survivable storage systems. In DARPA Information Survivability Conference and Exposition, IEEE, volume 2, pages 184–195, June 2001.
-
(2001)
DARPA Information Survivability Conference and Exposition, IEEE
, vol.2
, pp. 184-195
-
-
Ganger, G.1
Khosla, P.2
Bakkaloglu, M.3
Bigrigg, M.4
Goodson, G.5
Oguz, S.6
Pandurangan, V.7
Soules, C.8
Strunk, J.9
Wylie, J.10
-
21
-
-
85033498470
-
Sirius: Securing remote untrusted storage
-
To appear
-
E. Goh, H. Shacham, N. Modadugu, and D. Boneh. SiRiUS: Securing remote untrusted storage. In NDSS, 2003. To appear.
-
(2003)
NDSS
-
-
Goh, E.1
Shacham, H.2
Modadugu, N.3
Boneh, D.4
-
22
-
-
0023964787
-
Scale and performance in a distributed file system
-
February
-
J. Howard, M. Kazar, S. Menees, D. Nichols, M. Satyanarayanan, R. Sidebotham, and M. West. Scale and performance in a distributed file system. ACM TOCS, 6(1), February 1988.
-
(1988)
ACM TOCS
, vol.6
, Issue.1
-
-
Howard, J.1
Kazar, M.2
Menees, S.3
Nichols, D.4
Satyanarayanan, M.5
Sidebotham, R.6
West, M.7
-
25
-
-
0034440650
-
Oceanstore: An architecture for global-scale persistent storage
-
December
-
J. Kubiatowicz, D. Bindel, Y. Chen, S. Czerwinski, P. Eaton, D. Geels, R. Gummadi, S. Rhea, H. Weatherspoon, W. Weimer, C. Wells, and B. Zhao. Oceanstore: An architecture for global-scale persistent storage. In ASPLOS, December 2000.
-
(2000)
ASPLOS
-
-
Kubiatowicz, J.1
Bindel, D.2
Chen, Y.3
Czerwinski, S.4
Eaton, P.5
Geels, D.6
Gummadi, R.7
Rhea, S.8
Weatherspoon, H.9
Weimer, W.10
Wells, C.11
Zhao, B.12
-
26
-
-
0018518477
-
How to make a multiprocessor computer that correctly executes multiprocessor programs
-
L. Lamport. How to make a multiprocessor computer that correctly executes multiprocessor programs. IEEE Trans. on Computers, C-28(9):690–691, 1979.
-
(1979)
IEEE Trans. On Computers
, vol.C-28
, Issue.9
, pp. 690-691
-
-
Lamport, L.1
-
27
-
-
0019634370
-
Password authentication with insecure communication
-
L. Lamport. Password authentication with insecure communication. CACM, 24(11):770–772, 1981.
-
(1981)
CACM
, vol.24
, Issue.11
, pp. 770-772
-
-
Lamport, L.1
-
28
-
-
84968474107
-
Divisors in residue classes
-
H. Lenstra. Divisors in residue classes. Mathematics of computation, pages 331–340, 1984.
-
(1984)
Mathematics of Computation
, pp. 331-340
-
-
Lenstra, H.1
-
30
-
-
84978429558
-
Separating key management from file system security
-
December
-
D. Mazières, M. Kaminsky, M. Kaashoek, and E. Witchel. Separating key management from file system security. In SOSP, pages 124–139, December 1999.
-
(1999)
SOSP
, pp. 124-139
-
-
Mazières, D.1
Kaminsky, M.2
Kaashoek, M.3
Witchel, E.4
-
31
-
-
0035703990
-
Don’t trust your file server
-
May
-
D. Mazières and D. Shasha. Don’t trust your file server. In HotOS, pages 113–118, May 2001.
-
(2001)
HotOS
, pp. 113-118
-
-
Mazières, D.1
Shasha, D.2
-
32
-
-
21844454934
-
Building secure file systems out of byzantine storage
-
D. Mazières and D. Shasha. Building secure file systems out of byzantine storage. In PODC, pages 1–15, 2002.
-
(2002)
PODC
, pp. 1-15
-
-
Mazières, D.1
Shasha, D.2
-
34
-
-
84958802026
-
A digital signature based on a conventional encryption function
-
R. C. Merkle. A digital signature based on a conventional encryption function. In CRYPTO, volume 293, pages 369–378, 1987.
-
(1987)
CRYPTO
, vol.293
, pp. 369-378
-
-
Merkle, R.C.1
-
35
-
-
4644274612
-
Strong security for distributed file systems
-
January
-
E. Miller, D. Long, W. Freeman, and B. Reed. Strong security for distributed file systems. In FAST, pages 1–13, January 2002.
-
(2002)
FAST
, pp. 1-13
-
-
Miller, E.1
Long, D.2
Freeman, W.3
Reed, B.4
-
37
-
-
85077187617
-
-
OpenAFS. http://www.openafs.org/.
-
-
-
-
38
-
-
85084160673
-
Venti: A new approach to archival data storage
-
January
-
S. Quinlan and S. Dorward. Venti: A new approach to archival data storage. In FAST, pages 89–102, January 2002.
-
(2002)
FAST
, pp. 89-102
-
-
Quinlan, S.1
Dorward, S.2
-
39
-
-
0024641589
-
Efficient dispersal of information for security, load balancing and fault tolerance
-
M. Rabin. Efficient dispersal of information for security, load balancing and fault tolerance. JACM, 36(2):335–348, 1989.
-
(1989)
JACM
, vol.36
, Issue.2
, pp. 335-348
-
-
Rabin, M.1
-
40
-
-
85084162793
-
A framework for evalauting storage system security
-
January
-
E. Riedel, M. Kallahalla, and R. Swaminathan. A framework for evalauting storage system security. In FAST, pages 15–30, January 2002.
-
(2002)
FAST
, pp. 15-30
-
-
Riedel, E.1
Kallahalla, M.2
Swaminathan, R.3
-
41
-
-
47249105152
-
Deciding when to forget in the elephant file system
-
December
-
D. Santry, M. Feeley, N. Hutchinson, A. Veitch, R. Carton, and J. Ofir. Deciding when to forget in the elephant file system. In SOSP, pages 110–123, December 1999.
-
(1999)
SOSP
, pp. 110-123
-
-
Santry, D.1
Feeley, M.2
Hutchinson, N.3
Veitch, A.4
Carton, R.5
Ofir, J.6
-
42
-
-
3042826032
-
-
Technical report, IETF, January
-
J. Satran, D. Smith, K. Meth, C. Sapuntzakis, R. Haagens, E. Zeidner, P. Von Stamwitz, and L. Dalle Ore. iSCSI draft standard. Technical report, IETF, January 2002.
-
(2002)
iSCSI Draft Standard
-
-
Satran, J.1
Smith, D.2
Meth, K.3
Sapuntzakis, C.4
Haagens, R.5
Zeidner, E.6
von Stamwitz, P.7
Dalle Ore, L.8
-
43
-
-
0022281039
-
The ITC distributed file system: Principles and design
-
M. Satyanarayanan, J. Howard, D. Nichols, R. Sidebotham, A. Spector, and M. West. The ITC distributed file system: principles and design. In SOSP, pages 35–50, 1985.
-
(1985)
SOSP
, pp. 35-50
-
-
Satyanarayanan, M.1
Howard, J.2
Nichols, D.3
Sidebotham, R.4
Spector, A.5
West, M.6
-
44
-
-
0025564050
-
Implementing fault-tolerant services using the state machine approach: A tutorial
-
December
-
F. Schneider. Implementing fault-tolerant services using the state machine approach: A tutorial. ACM Computing Surveys, 22(4):299–319, December 1990.
-
(1990)
ACM Computing Surveys
, vol.22
, Issue.4
, pp. 299-319
-
-
Schneider, F.1
-
47
-
-
84978374045
-
Self-securing storage: Protecting data in compromised systems
-
October
-
J. Strunk, G. Goodson, M. Scheinholtz, C. Soules, and G. Ganger. Self-securing storage: protecting data in compromised systems. In OSDI, October 2000.
-
(2000)
OSDI
-
-
Strunk, J.1
Goodson, G.2
Scheinholtz, M.3
Soules, C.4
Ganger, G.5
-
49
-
-
84977284109
-
How to make replicated data secure
-
D. Tygar and M. Herlihy. How to make replicated data secure. In CRYPTO, pages 379–391, 1987.
-
(1987)
CRYPTO
, pp. 379-391
-
-
Tygar, D.1
Herlihy, M.2
|