Sciweavers

USENIX
2008
13 years 6 months ago
A Comparative Experimental Study of Parallel File Systems for Large-Scale Data Processing
Large-scale scientific and business applications require data processing of ever-increasing amounts of data, fueling a demand for scalable parallel file systems comprising hundred...
Zoe Sebepou, Kostas Magoutis, Manolis Marazakis, A...
FAST
2008
13 years 6 months ago
EIO: Error Handling is Occasionally Correct
The reliability of file systems depends in part on how well they propagate errors. We develop a static analysis technique, EDP, that analyzes how file systems and storage device d...
Haryadi S. Gunawi, Cindy Rubio-González, An...
FAST
2010
13 years 6 months ago
Membrane: Operating System Support for Restartable File Systems
We introduce Membrane, a set of changes to the operating system to support restartable file systems. Membrane allows an operating system to tolerate a broad class of file system f...
Swaminathan Sundararaman, Sriram Subramanian, Abhi...
FAST
2010
13 years 6 months ago
Tracking Back References in a Write-Anywhere File System
Many file systems reorganize data on disk, for example to defragment storage, shrink volumes, or migrate data between different classes of storage. Advanced file system features s...
Peter Macko, Margo I. Seltzer, Keith A. Smith
MSS
2000
IEEE
130views Hardware» more  MSS 2000»
13 years 8 months ago
Design for a Decentralized Security System For Network Attached Storage
T This paper describes an architecture for a secure file system based on network-attached storage that guarantees end-to-end encryption for all user data. We describe the design of...
William E. Freeman, Ethan L. Miller
FC
2006
Springer
96views Cryptology» more  FC 2006»
13 years 8 months ago
Privacy in Encrypted Content Distribution Using Private Broadcast Encryption
In many content distribution systems it is important both to restrict access to content to authorized users and to protect the identities of these users. We discover that current s...
Adam Barth, Dan Boneh, Brent Waters
ESORICS
2006
Springer
13 years 8 months ago
Secure Key-Updating for Lazy Revocation
Abstract. We consider the problem of efficient key management and user revocation in cryptographic file systems that allow shared access to files. A performanceefficient solution t...
Michael Backes, Christian Cachin, Alina Oprea
DSN
2007
IEEE
13 years 8 months ago
Portable and Efficient Continuous Data Protection for Network File Servers
Continuous data protection, which logs every update to a file system, is an enabling technology to protect file systems against malicious attacks and/or user mistakes, because it ...
Ningning Zhu, Tzi-cker Chiueh
CCS
1994
ACM
13 years 8 months ago
The Design and Implementation of Tripwire: A File System Integrity Checker
At the heart of most computer systems is a file system. The file system contains user data, executable programs, configuration and authorization information, and (usually) the bas...
Gene H. Kim, Eugene H. Spafford
PDIS
1993
IEEE
13 years 8 months ago
Log-Based Directory Resolution in the Coda File System
semantic knowledge all concurrent partitionedAbstract updates to an object must be treated as conflicting, andOptimistic replication is an important technique for merged manually b...
Puneet Kumar, Mahadev Satyanarayanan