Self-securing storage: protecting data in compromised systems
- 8 July 2004
- conference paper
- Published by Institute of Electrical and Electronics Engineers (IEEE)
Abstract
No abstract availableKeywords
This publication has 15 references indexed in Scilit:
- File system usage in Windows NT 4.0Published by Association for Computing Machinery (ACM) ,1999
- Deciding when to forget in the Elephant file systemPublished by Association for Computing Machinery (ACM) ,1999
- A case for intelligent disks (IDISKs)ACM SIGMOD Record, 1998
- PetalPublished by Association for Computing Machinery (ACM) ,1996
- An empirical study of a wide-area distributed file systemACM Transactions on Computer Systems, 1996
- The design and implementation of tripwirePublished by Association for Computing Machinery (ACM) ,1994
- On-line data compression in a log-structured file systemPublished by Association for Computing Machinery (ACM) ,1992
- The design and implementation of a log-structured file systemACM Transactions on Computer Systems, 1992
- Scale and performance in a distributed file systemACM Transactions on Computer Systems, 1988
- Reimplementing the Cedar file system using logging and group commitPublished by Association for Computing Machinery (ACM) ,1987