Sciweavers

1222 search results - page 99 / 245
» Verifying a File System Implementation
Sort
View
120
Voted
COMPSEC
2004
104views more  COMPSEC 2004»
15 years 2 months ago
Formal support for certificate management policies
Traditionally, creation and revocation of certificates are governed by policies that are carried manually, off-line, by trusted agents. This approach to certificate management is ...
Victoria Ungureanu
131
Voted
USENIX
2008
15 years 5 months ago
Idle Read After Write - IRAW
Despite a low occurrence rate, silent data corruption represents a growing concern for storage systems designers. Throughout the storage hierarchy, from the file system down to th...
Alma Riska, Erik Riedel
122
Voted
SRDS
1998
IEEE
15 years 6 months ago
View Consistency for Optimistic Replication
Optimistically replicated systems provide highly available data even when communication between data replicas is unreliable or unavailable. The high availability comes at the cost...
Ashvin Goel, Calton Pu, Gerald J. Popek
126
Voted
CRITIS
2007
15 years 4 months ago
Managing Critical Infrastructures through Virtual Network Communities
Abstract. Virtual Interacting Network CommunIty (Vinci) is an abstract architecture to share in a secure way an ICT infrastructure among several user communities, each with its own...
Fabrizio Baiardi, Gaspare Sala, Daniele Sgandurra
109
Voted
CORR
2008
Springer
102views Education» more  CORR 2008»
15 years 2 months ago
SAFIUS - A secure and accountable filesystem over untrusted storage
We describe SAFIUS, a secure accountable file system that resides over an untrusted storage. SAFIUS provides strong security guarantees like confidentiality, integrity, prevention ...
V. Sriram, Ganesh M. Narayan, K. Gopinath