Sciweavers

988 search results - page 22 / 198
» Cryptographic access control in a distributed file system
Sort
View
KES
2005
Springer
15 years 5 months ago
A Preliminary Design for a Privacy-Friendly Free P2P Media File Distribution System
In most P2P business models, in which users purchase the media, it is necessary to securely identify the user in order to facilitate payment. In this paper, we present a technique ...
Ron G. van Schyndel
SIGMOD
2000
ACM
159views Database» more  SIGMOD 2000»
15 years 4 months ago
DLFM: A Transactional Resource Manager
The DataLinks technology developed at IBM Almaden Research Center and now available in DB2 UDB 5.2 introduces a new data type called DATALINK for a database to reference and manag...
Hui-I Hsiao, Inderpal Narang
ICDCS
2002
IEEE
15 years 4 months ago
Group-Based Management of Distributed File Caches
We describe how to manage distributed file system caches based upon groups of files that are accessed together. We use file access patterns to automatically construct dynamic g...
Ahmed Amer, Darrell D. E. Long, Randal C. Burns
ACSAC
1999
IEEE
15 years 4 months ago
Adding Availability to Log Services of Untrusted Machines
Uncorrupted log files are the critical system component for computer forensics in case of intrusion and for real time system monitoring and auditing. Protection from tampering wit...
Arianna Arona, Danilo Bruschi, Emilia Rosti
IPPS
2006
IEEE
15 years 5 months ago
Dual-layered file cache on cc-NUMA system
CC-NUMA is a widely adopted and deployed architecture of high performance computers. These machines are attractive for their transparent access to local and remote memory. However...
Zhou Yingchao, Meng Dan, Ma Jie