Sciweavers

170 search results - page 7 / 34
» Implementing and Evaluating Security Controls for an Object-...
Sort
View
STORAGESS
2005
ACM
14 years 1 months ago
Secure capabilities for a petabyte-scale object-based distributed file system
Recently, the Network-Attached Secure Disk (NASD) model has become a more widely used technique for constructing large-scale storage systems. However, the security system proposed...
Christopher Olson, Ethan L. Miller
ICDE
2005
IEEE
109views Database» more  ICDE 2005»
14 years 1 months ago
TCP Congestion Window Controlling Algorithms on iSCSI Sequential Read Access
iSCSI is one of the most promising technologies in IPSAN, which decreases a storage management cost. Congestion Window, one of TCP parameters, has a close relationship with system...
Machiko Toyoda, Masato Oguchi, Saneyasu Yamaguchi
IPPS
2005
IEEE
14 years 1 months ago
Speculative Security Checks in Sandboxing Systems
Sandboxing systems are extremely useful for secure execution of untrusted applications. Many of the sandboxing systems proposed so far provide security by intercepting system call...
Yoshihiro Oyama, Koichi Onoue, Akinori Yonezawa
ACSAC
2002
IEEE
14 years 20 days ago
Thirty Years Later: Lessons from the Multics Security Evaluation
Almost thirty years ago a vulnerability assessment of Multics identified significant vulnerabilities, despite the fact that Multics was more secure than other contemporary (and cu...
Paul A. Karger, Roger R. Schell
SIGMETRICS
2004
ACM
124views Hardware» more  SIGMETRICS 2004»
14 years 1 months ago
Interposed proportional sharing for a storage service utility
This paper develops and evaluates new share-based scheduling algorithms for differentiated service quality in network services, such as network storage servers. This form of resou...
Wei Jin, Jeffrey S. Chase, Jasleen Kaur