Sciweavers

3451 search results - page 15 / 691
» Security of Backup Data
Sort
View
ICDE
2004
IEEE
120views Database» more  ICDE 2004»
14 years 8 months ago
Algebraic Signatures for Scalable Distributed Data Structures
Signatures detect changes to the data objects. Numerous schemes a known, e.g., the popular hash based SHA-1 standard. We propose a nov scheme we call algebraic signatures. We use ...
Witold Litwin, Thomas J. E. Schwarz
DSN
2004
IEEE
13 years 11 months ago
A Framework for Evaluating Storage System Dependability
Designing storage systems to provide business continuity in the face of failures requires the use of various data protection techniques, such as backup, remote mirroring, point-in-...
Kimberly Keeton, Arif Merchant
PRDC
1999
IEEE
13 years 11 months ago
FBD: A Fault-tolerant Buffering Disk System for Improving Write Performance of RAID5 Systems
The parity calculation technique of the RAID5 provides high reliability, efficient disk space usage, and good read performance for parallel-disk-array configurations. However, it ...
Haruo Yokota, Masanori Goto
DICS
2006
13 years 11 months ago
Fault-Tolerant Parallel Applications with Dynamic Parallel Schedules: A Programmer's Perspective
Dynamic Parallel Schedules (DPS) is a flow graph based framework for developing parallel applications on clusters of workstations. The DPS flow graph execution model enables automa...
Sebastian Gerlach, Basile Schaeli, Roger D. Hersch
SECURWARE
2008
IEEE
14 years 1 months ago
Security Patterns for Capturing Encryption-Based Access Control to Sensor Data
—A security pattern describes a particular recurring security problem that arises in specific contexts, and presents a well-proven generic solution for it [1]. This paper descri...
Ángel Cuevas, Paul El Khoury, Laurent Gomez...