Sciweavers

10 search results - page 1 / 2
» storagess 2006
Sort
View
76
Voted
STORAGESS
2006
ACM
15 years 4 months ago
A statistical analysis of disclosed storage security breaches
Ragib Hasan, William Yurcik
68
Voted
STORAGESS
2006
ACM
15 years 4 months ago
Design, implementation and evaluation of security in iSCSI-based network storage systems
Shiva Chaitanya, Kevin R. B. Butler, Anand Sivasub...
68
Voted
STORAGESS
2006
ACM
15 years 4 months ago
Access control for a replica management database
Distributed computation systems have become an important tool for scientific simulation, and a similarly distributed replica management system may be employed to increase the loc...
Justin M. Wozniak, Paul Brenner, Douglas Thain
81
Voted
STORAGESS
2006
ACM
15 years 4 months ago
Secure deletion myths, issues, and solutions
This paper has three goals. (1) We try to debunk several held misconceptions about secure deletion: that encryption is an ideal solution for everybody, that existing data-overwrit...
Nikolai Joukov, Harry Papaxenopoulos, Erez Zadok
100
Voted
STORAGESS
2006
ACM
15 years 4 months ago
Using device diversity to protect data against batch-correlated disk failures
Batch-correlated failures result from the manifestation of a common defect in most, if not all, disk drives belonging to the same production batch. They are much less frequent tha...
Jehan-François Pâris, Darrell D. E. L...