-
1
-
-
3042683432
-
Message authentication using hash functions - The HMAC construction
-
Spring
-
Bellare, M., Canetti, R., Krawczyk, H., "Message Authentication using Hash Functions - The HMAC Construction," RSA Laboratories CryptoBytes, Vol. 2, No. 1, Spring 1996.
-
(1996)
RSA Laboratories CryptoBytes
, vol.2
, Issue.1
-
-
Bellare, M.1
Canetti, R.2
Krawczyk, H.3
-
3
-
-
85051382582
-
Shared logging services for fault-tolerant distributed computing
-
Bologna, Italy, Sept
-
Daniels, D., Haskin, R., Reinke, J., Sawdon, W. “Shared Logging Services for Fault-Tolerant Distributed Computing,” Position Paper for Fourth ACM SIGOPS European Workshop, Bologna, Italy, Sept. 1990.
-
(1990)
Position Paper for Fourth ACM SIGOPS European Workshop
-
-
Daniels, D.1
Haskin, R.2
Reinke, J.3
Sawdon, W.4
-
4
-
-
0003629991
-
-
FIPS 180-1. U.S. Department of Commerce/N.I.S.T., National Technical Information Service, Springfield, VA, April
-
FIPS 180-1. Secure Hash Standard. U.S. Department of Commerce/N.I.S.T., National Technical Information Service, Springfield, VA, April 1995.
-
(1995)
Secure Hash Standard
-
-
-
5
-
-
85084099412
-
Fast and secure distributed read-only file system
-
San Diego, CA, October
-
Fu, K., Kaashoek, F., Mazieres, D., "Fast and secure distributed read-only file system," Proceedings of OSDI 2000, San Diego, CA, October 2000.
-
(2000)
Proceedings of OSDI 2000
-
-
Fu, K.1
Kaashoek, F.2
Mazieres, D.3
-
6
-
-
0002679112
-
Network attached storage architecture
-
November
-
Gibson, G. A., Van Meter, R., "Network Attached Storage Architecture", Communications of the ACM, 43(11), November 2000.
-
(2000)
Communications of the ACM
, vol.43
, Issue.11
-
-
Gibson, G.A.1
Van Meter, R.2
-
8
-
-
80051952903
-
Metadata update performance in file systems
-
Monterey, CA, Nov
-
Ganger, G. R., Patt, Y. N., "Metadata Update Performance in File Systems," Proceedings of the First OSDI, Monterey, CA, Nov. 1994.
-
(1994)
Proceedings of the First OSDI
-
-
Ganger, G.R.1
Patt, Y.N.2
-
9
-
-
0023963197
-
Recovery management in quicksilver
-
Feb
-
Haskin, R., Malachi, Y., Sawdon, W., Chan, G., "Recovery Management in QuickSilver," ACM Transactions on Computer Systems, 6(1), pp. 82-108, Feb. 1988.
-
(1988)
ACM Transactions on Computer Systems
, vol.6
, Issue.1
, pp. 82-108
-
-
Haskin, R.1
Malachi, Y.2
Sawdon, W.3
Chan, G.4
-
10
-
-
85079968074
-
-
as of March 28
-
Internet Engineering Task Force, IP Storage (IPS) Working Group Charter, http://www.ietf.org/html.charters/ips-charter.html as of March 28, 2001.
-
(2001)
IP Storage (IPS) Working Group Charter
-
-
-
13
-
-
0003729341
-
HMAC: Keyed-hashing for message authentication
-
Internet Engineering Task Force, Network Research Group, February
-
Krawczyk, H., Bellare, M., Canetti, R., “HMAC: Keyed-Hashing for Message Authentication,” RFC 2104, Internet Engineering Task Force, Network Research Group, February 1997.
-
(1997)
RFC 2104
-
-
Krawczyk, H.1
Bellare, M.2
Canetti, R.3
-
14
-
-
84968422314
-
How to build a trusted database system on untrusted storage
-
San Diego, CA, October
-
Maheshwari, U., Vingralek, R., Shapiro, W., "How to Build a Trusted Database System on Untrusted Storage," Proceedings of OSDI 2000, San Diego, CA, October 2000.
-
(2000)
Proceedings of OSDI 2000
-
-
Maheshwari, U.1
Vingralek, R.2
Shapiro, W.3
-
15
-
-
84976682539
-
A fast file system for UnIx
-
Aug
-
McKusick, M.K., Joy, W., Leffler, S., Fabry, R. "A Fast File System for UNIX," ACM Transactions on Computer Systems 2(3), pp 181-197. Aug. 1984.
-
(1984)
ACM Transactions on Computer Systems
, vol.2
, Issue.3
, pp. 181-197
-
-
McKusick, M.K.1
Joy, W.2
Leffler, S.3
Fabry, R.4
-
17
-
-
0003602325
-
-
RFC 1321, Internet Engineering Task Force, Network Working Group, April
-
Rivest, R., “The MD5 Message-Digest Algorithm,” RFC 1321, Internet Engineering Task Force, Network Working Group, April 1992.
-
(1992)
The MD5 Message-Digest Algorithm
-
-
Rivest, R.1
-
18
-
-
85084163097
-
File System Logging versus Clustering: A performance comparison
-
New Orleans, LA, Jan
-
Seltzer, M. I., Smith, K., Balakrishnan, H., Chang, J., McMains, S., Padmanabhan, V. “File System Logging versus Clustering: A Performance Comparison,” Proceedings of the 1995 USENIX Technical Conference, pp. 249-264. New Orleans, LA, Jan. 1995.
-
(1995)
Proceedings of the 1995 USENIX Technical Conference
, pp. 249-264
-
-
Seltzer, M.I.1
Smith, K.2
Balakrishnan, H.3
Chang, J.4
McMains, S.5
Padmanabhan, V.6
-
19
-
-
85084160229
-
Journaling vs. Soft updates: Asynchronous metadata protection in file systems
-
San Diego, CA, June
-
Seltzer, M. I., Ganger, G. R., McKusick, M. K., Smith, K. A., Soules, C. A. N., Stein, C. A., "Journaling vs. Soft Updates: Asynchronous Metadata Protection in File Systems," USENIX Annual Technical Conference, San Diego, CA, June 2000.
-
(2000)
USENIX Annual Technical Conference
-
-
Seltzer, M.I.1
Ganger, G.R.2
McKusick, M.K.3
Smith, K.A.4
Soules, C.A.N.5
Stein, C.A.6
-
20
-
-
11144278210
-
The write-ahead file system: Integrating kernel and application logging
-
Cambridge, MA, Apr
-
Stein, C. A., "The Write-Ahead File System: Integrating Kernel and Application Logging," Harvard CS Technical Report TR-02-2000, Cambridge, MA, Apr. 2000.
-
(2000)
Harvard CS Technical Report TR-02-2000
-
-
Stein, C.A.1
-
21
-
-
85084164692
-
SSH-Secure login connections over the internet
-
San Jose, CA, Jul
-
Ylonen, T. “SSH-Secure Login Connections Over the Internet,” 6th USENIX Security Symposium, pp. 37-42. San Jose, CA, Jul. 1996.
-
(1996)
6th USENIX Security Symposium
, pp. 37-42
-
-
Ylonen, T.1
|