Over the last twenty years the interfaces for accessing persistent storage within a computer system have remained essentially unchanged. Simply put, seek, read and write have deļ¬...
Xiangyong Ouyang, David W. Nellans, Robert Wipfel,...
Portable storage devices, such as key-chain USB devices, are ubiquitous. These devices are often used with impunity, with users repeatedly using the same storage device in open co...
Kevin R. B. Butler, Stephen E. McLaughlin, Patrick...
Inexpensive portable storage devices that are available in the market today have made it easier for users to carry data and programs with them and borrow computing platforms when ...
Nishkam Ravi, Chandra Narayanaswami, Mandayam T. R...
Cyber-crime has reached unprecedented proportions in this day and age. In addition, the internet has created a world with seemingly no barriers while making a countless number of ...
Consider an abstract storage device (G) that can hold a single element x from a fixed, publicly known finite group G. Storage is private in the sense that an adversary does not hav...
Ronald Cramer, Yevgeniy Dodis, Serge Fehr, Carles ...
This paper introduces a new concept of information that can exist in a mobile environment with no fixed infrastructure and centralized servers, which we call the Hovering Informati...
People now have available to them a diversity of digital storage devices, including palmtops, cell phone address books, laptops, desktop computers and web-based services. Unfortun...
Edward Swierk, Emre Kiciman, Vince Laviano, Mary B...
Computer forensic analysis, intrusion detection and disaster recovery are all dependent on the existence of trustworthy log ļ¬les. Current storage systems for such log ļ¬les are...