-
1
-
-
0030083168
-
Serverless network file systems
-
Feb
-
T. Anderson, M. Dahlin, J. Neefe, D. Patterson, D. Roselli, and R. Y. Wang. Serverless network file systems. ACM Trans. Comput. Syst., 14(1):41–79, Feb. 1996.
-
(1996)
ACM Trans. Comput. Syst.
, vol.14
, Issue.1
, pp. 41-79
-
-
Anderson, T.1
Dahlin, M.2
Neefe, J.3
Patterson, D.4
Roselli, D.5
Wang, R.Y.6
-
6
-
-
4444361800
-
The design and implementation of a transparent cryptographic file system for UNIX
-
Boston, MA, June
-
G. Cattaneo, L. Catuogno, A. D. Sorbo, and P. Persiano. The design and implementation of a transparent cryptographic file system for UNIX. In Proceedings of the Freenix Track: 2001 USENIX Annual Technical Conference, pages 199–212, Boston, MA, June 2001.
-
(2001)
Proceedings of the Freenix Track: 2001 USENIX Annual Technical Conference
, pp. 199-212
-
-
Cattaneo, G.1
Catuogno, L.2
Sorbo, A.D.3
Persiano, P.4
-
8
-
-
84958953847
-
Cryptanalysis of MD4
-
Fast Software Encryption Workshop
-
H. Dobbertin. Cryptanalysis of MD4. Lecture Notes in Computer Science, 1039:53–69, 1996. Fast Software Encryption Workshop.
-
(1996)
Lecture Notes in Computer Science
, vol.1039
, pp. 53-69
-
-
Dobbertin, H.1
-
9
-
-
0033336340
-
An experimental analysis of cryptographic overhead in performance-critical systems
-
College Park, MD, Oct. IEEE
-
W. Freeman and E. Miller. An experimental analysis of cryptographic overhead in performance-critical systems. In Proceedings of the 7th International Symposium on Modeling, Analysis, and Simulation of Computer and Telecommunication Systems (MASCOTS’99), pages 348–357, College Park, MD, Oct. 1999. IEEE.
-
(1999)
Proceedings of the 7th International Symposium on Modeling, Analysis, and Simulation of Computer and Telecommunication Systems (MASCOTS’99)
, pp. 348-357
-
-
Freeman, W.1
Miller, E.2
-
11
-
-
85084099412
-
Fast and secure distributed read-only file system
-
San Diego, CA, Oct
-
K. Fu, M. F. Kaashoek, and D. Mazières. Fast and secure distributed read-only file system. In Proceedings of the 4th Symposium on Operating Systems Design and Implementation (OSDI), pages 181–196, San Diego, CA, Oct. 2000.
-
(2000)
Proceedings of the 4th Symposium on Operating Systems Design and Implementation (OSDI)
, pp. 181-196
-
-
Fu, K.1
Kaashoek, M.F.2
Mazières, D.3
-
12
-
-
0346339931
-
A cost-effective, high-bandwidth storage architecture
-
San Jose, CA, Oct
-
G. A. Gibson, D. F. Nagle, K. Amiri, J. Butler, F. W. Chang, H. Gobioff, C. Hardin, E. Riedel, D. Rochberg, and J. Zelenka. A cost-effective, high-bandwidth storage architecture. In Proceedings of the 8th Interational Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS), pages 92–103, San Jose, CA, Oct. 1998.
-
(1998)
Proceedings of the 8th Interational Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS)
, pp. 92-103
-
-
Gibson, G.A.1
Nagle, D.F.2
Amiri, K.3
Butler, J.4
Chang, F.W.5
Gobioff, H.6
Hardin, C.7
Riedel, E.8
Rochberg, D.9
Zelenka, J.10
-
13
-
-
0038618924
-
-
PhD thesis, Carnegie Mellon University, July Also available as Technical Report CMU-CS-99-160
-
H. Gobioff. Security for a High Performance Commodity Storage Subsystem. PhD thesis, Carnegie Mellon University, July 1999. Also available as Technical Report CMU-CS-99-160.
-
(1999)
Security for A High Performance Commodity Storage Subsystem
-
-
Gobioff, H.1
-
14
-
-
0023964787
-
Scale and performance in a distributed file system
-
Feb
-
J. H. Howard, M. L. Kazar, S. G. Menees, D. A. Nichols, M. Satyanarayanan, R. N. Sidebotham, and M. J. Wes. Scale and performance in a distributed file system. ACM Trans. Comput. Syst., 6(1):51–81, Feb. 1988.
-
(1988)
ACM Trans. Comput. Syst.
, vol.6
, Issue.1
, pp. 51-81
-
-
Howard, J.H.1
Kazar, M.L.2
Menees, S.G.3
Nichols, D.A.4
Satyanarayanan, M.5
Sidebotham, R.N.6
Wes, M.J.7
-
17
-
-
84968422314
-
How to build a trusted database system on untrusted storage
-
San Diego, CA, Oct
-
U. Maheshwari, R. Vingralek, and B. Shapiro. How to build a trusted database system on untrusted storage. In Proceedings of the 4th Symposium on Operating Systems Design and Implementation (OSDI), pages 135–150, San Diego, CA, Oct. 2000.
-
(2000)
Proceedings of the 4th Symposium on Operating Systems Design and Implementation (OSDI)
, pp. 135-150
-
-
Maheshwari, U.1
Vingralek, R.2
Shapiro, B.3
-
18
-
-
0042352260
-
Separating key management from file system security
-
Dec
-
D. Mazières, M. Kaminsky, M. F. Kaashoek, and E. Witchel. Separating key management from file system security. In Proceedings of the 17th ACM Symposium on Operating Systems Principles (SOSP’99), pages 124–139, Dec. 1999.
-
(1999)
Proceedings of the 17th ACM Symposium on Operating Systems Principles (SOSP’99)
, pp. 124-139
-
-
Mazières, D.1
Kaminsky, M.2
Kaashoek, M.F.3
Witchel, E.4
-
20
-
-
0001636850
-
Kerberos: An authentication service for open network systems
-
Dallas, TX
-
B. C. Neumann, J. G. Steiner, and J. I. Schiller. Kerberos: An authentication service for open network systems. In Proceedings of the Winter 1988 USENIX Technical Conference, pages 191–201, Dallas, TX, 1988.
-
(1988)
Proceedings of the Winter 1988 USENIX Technical Conference
, pp. 191-201
-
-
Neumann, B.C.1
Steiner, J.G.2
Schiller, J.I.3
-
21
-
-
0033906295
-
Authenticating network attached storage
-
Jan
-
B. Reed, E. Chron, R. Burns, and D. D. E. Long. Authenticating network attached storage. IEEE Micro, 20(1):49–57, Jan. 2000.
-
(2000)
IEEE Micro
, vol.20
, Issue.1
, pp. 49-57
-
-
Reed, B.1
Chron, E.2
Burns, R.3
Long, D.D.E.4
-
22
-
-
0030378565
-
Plugging the holes on host-based authentication
-
J. Reid. Plugging the holes on host-based authentication. In Computers and Security, pages 661–671, 1996.
-
(1996)
Computers and Security
, pp. 661-671
-
-
Reid, J.1
-
24
-
-
0030149435
-
An empirical study of a wide-area distributed file system
-
May
-
M. Spasojevic and M. Satyanarayanan. An empirical study of a wide-area distributed file system. ACM Trans. Comput. Syst., 14(2):200–222, May 1996.
-
(1996)
ACM Trans. Comput. Syst.
, vol.14
, Issue.2
, pp. 200-222
-
-
Spasojevic, M.1
Satyanarayanan, M.2
-
25
-
-
84978374045
-
Self-securing storage: Protecting data in compromised systems
-
Oct
-
J. D. Strunk, G. R. Goodson, M. L. Scheinholtz, C. A. N. Soules, and G. R. Ganger. Self-securing storage: Protecting data in compromised systems. In Proceedings of the 4th Symposium on Operating Systems Design and Implementation (OSDI), pages 165–180, Oct. 2000.
-
(2000)
Proceedings of the 4th Symposium on Operating Systems Design and Implementation (OSDI)
, pp. 165-180
-
-
Strunk, J.D.1
Goodson, G.R.2
Scheinholtz, M.L.3
Soules, C.A.N.4
Ganger, G.R.5
-
26
-
-
0002474948
-
Performance comparison of public-key cryptosystems
-
Summer
-
M. J. Wiener. Performance comparison of public-key cryptosystems. RSA CryptoBytes, 4(1), Summer 1998.
-
(1998)
RSA CryptoBytes
, vol.4
, Issue.1
-
-
Wiener, M.J.1
|