Sciweavers

1717 search results - page 25 / 344
» Data Integrity in a Distributed Storage System
Sort
View
108
Voted
ACSAC
2010
IEEE
14 years 10 months ago
A multi-user steganographic file system on untrusted shared storage
Existing steganographic file systems enable a user to hide the existence of his secret data by claiming that they are (static) dummy data created during disk initialization. Such ...
Jin Han, Meng Pan, Debin Gao, HweeHwa Pang
93
Voted
PVLDB
2010
120views more  PVLDB 2010»
14 years 11 months ago
Cloudy: A Modular Cloud Storage System
This demonstration presents Cloudy, a modular cloud storage system. Cloudy provides a highly flexible architecture for distributed data storage and is designed to operate with mu...
Donald Kossmann, Tim Kraska, Simon Loesing, Stepha...
EDBT
2008
ACM
147views Database» more  EDBT 2008»
16 years 17 days ago
iDataGuard: middleware providing a secure network drive interface to untrusted internet data storage
In this demonstration, we present the design and features of iDataGuard. iDataGuard is an interoperable security middleware that allows users to outsource their file systems to he...
Ravi Chandra Jammalamadaka, Roberto Gamboni, Shara...
90
Voted
OSDI
2000
ACM
15 years 1 months ago
How to Build a Trusted Database System on Untrusted Storage
Some emerging applications require programs to maintain sensitive state on untrusted hosts. This paper presents the architecture and implementation of a trusted database system, T...
Umesh Maheshwari, Radek Vingralek, William Shapiro
103
Voted
IC
2003
15 years 1 months ago
An Architecture for Efficient, Flexible Enterprise System Integration
Integrating complex enterprise systems is challenging and reliability and performance of the integrated systems can be problematic when using typical solutions of distributed tran...
John C. Grundy, Jun Bai, John Blackham, John G. Ho...