Sciweavers

1717 search results - page 70 / 344
» Data Integrity in a Distributed Storage System
Sort
View
ADBIS
2000
Springer
97views Database» more  ADBIS 2000»
15 years 7 months ago
An Efficient Storage Manager
When dealing with large quantities of clauses, the use of persistent knowledge is inevitable, and indexing methods are essential to answer queries efficiently. We introduce PerKMan...
Dimitris G. Kapopoulos, Michael Hatzopoulos, Panag...
VLDB
2005
ACM
132views Database» more  VLDB 2005»
16 years 3 months ago
Hash-based labeling techniques for storage scaling
Scalable storage architectures allow for the addition or removal of storage devices to increase storage capacity and bandwidth or retire older devices. Assuming random placement of...
Shu-Yuen Didi Yao, Cyrus Shahabi, Per-Åke Larson
GSEM
2007
Springer
15 years 9 months ago
A Policy Language for Integrating Heterogeneous Authorization Policies
In order to manage and enforce multiple heterogeneous authorization policies in distributed authorization environment, we defined the root policy specification language and its cor...
Wei Zhou, Christoph Meinel
MSS
1999
IEEE
121views Hardware» more  MSS 1999»
15 years 7 months ago
Device Locks: Mutual Exclusion for Storage Area Networks
Device Locks are mechanisms used in distributed environments to facilitate mutual exclusion of shared resources. They can further be used to maintain coherence of data that is cac...
Kenneth W. Preslan, Steven R. Soltis, Christopher ...
VLDB
2007
ACM
119views Database» more  VLDB 2007»
15 years 9 months ago
Integrity Auditing of Outsourced Data
An increasing number of enterprises outsource their IT services to third parties who can offer these services for a much lower cost due to economy of scale. Quality of service is ...
Min Xie, Haixun Wang, Jian Yin, Xiaofeng Meng