Sciweavers

286 search results - page 12 / 58
» Requirements of Secure Storage Systems for Healthcare Record...
Sort
View
ICALP
2000
Springer
13 years 11 months ago
Scalable Secure Storage when Half the System Is Faulty
In this paper, we provide a method to safely store a document in perhaps the most challenging settings, a highly decentralized replicated storage system where up to half of the st...
Noga Alon, Haim Kaplan, Michael Krivelevich, Dahli...
ASPLOS
2006
ACM
14 years 1 months ago
ExecRecorder: VM-based full-system replay for attack analysis and system recovery
Log-based recovery and replay systems are important for system reliability, debugging and postmortem analysis/recovery of malware attacks. These systems must incur low space and p...
Daniela A. S. de Oliveira, Jedidiah R. Crandall, G...
MSS
2000
IEEE
96views Hardware» more  MSS 2000»
13 years 12 months ago
High Density Holographic Data Storage
The demand for increases in the capacity and speed of data storage tests the limits of conventional technologies and drives the search for new approaches. Optical holography has l...
Lisa Dhar, Kevin Curtis, Arturo Hale, Melinda Schn...
DBSEC
2004
97views Database» more  DBSEC 2004»
13 years 9 months ago
Configuring Storage Area Networks for Mandatory Security
Storage-area networks are a popular and efficient way of building large storage systems both in an enterprise environment and for multi-domain storage service providers. In both en...
Benjamin Aziz, Simon N. Foley, John Herbert, Garre...
ESORICS
2008
Springer
13 years 9 months ago
Remote Integrity Check with Dishonest Storage Server
We are interested in this problem: a verifier, with a small and reliable storage, wants to periodically check whether a remote server is keeping a large file x. A dishonest server,...
Ee-Chien Chang, Jia Xu