default search action
StorageSS 2006: Alexandria, VA, USA
- Ethan L. Miller, Erez Zadok:
Proceedings of the 2006 ACM Workshop On Storage Security And Survivability, StorageSS 2006, Alexandria, VA, USA, October 30, 2006. ACM 2006, ISBN 1-59593-552-5
Studies and surveys
- Ragib Hasan, William Yurcik:
A statistical analysis of disclosed storage security breaches. 1-8 - Mark W. Storer, Kevin M. Greenan, Ethan L. Miller:
Long-term threats to secure archives. 9-16
Scaling security
- Shiva Chaitanya, Kevin R. B. Butler, Anand Sivasubramaniam, Patrick D. McDaniel, Murali Vilayannur:
Design, implementation and evaluation of security in iSCSI-based network storage systems. 17-28 - Andrew W. Leung, Ethan L. Miller:
Scalable security for large, high performance storage systems. 29-40
Protection and trust
- Justin M. Wozniak, Paul R. Brenner, Douglas Thain:
Access control for a replica management database. 41-46 - Jehan-François Pâris, Darrell D. E. Long:
Using device diversity to protect data against batch-correlated disk failures. 47-52 - Lakshmi N. Bairavasundaram, Meenali Rungta, Andrea C. Arpaci-Dusseau, Remzi H. Arpaci-Dusseau:
Limiting trust in the storage stack. 53-60
Secure deletion
- Nikolai Joukov, Harry Papaxenopoulos, Erez Zadok:
Secure deletion myths, issues, and solutions. 61-66 - Soumyadeb Mitra, Marianne Winslett:
Secure deletion from inverted indexes on compliance storage. 67-72
Redundancy
- Avishay Traeger, Nikolai Joukov, Josef Sipek, Erez Zadok:
Using free web storage for data backup. 73-78 - Xiaotao Liu, Gal Niv, Prashant J. Shenoy, K. K. Ramakrishnan, Jacobus E. van der Merwe:
The case for semantic aware remote replication. 79-84
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.