ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
Proceedings of the second ACM workshop on Storage security and survivability - StorageSS '06
Latest Publications
TOTAL DOCUMENTS
11
(FIVE YEARS 0)
H-INDEX
6
(FIVE YEARS 0)
Published By ACM Press
1595935525
Latest Documents
Most Cited Documents
Contributed Authors
Related Sources
Related Keywords
Latest Documents
Most Cited Documents
Contributed Authors
Related Sources
Related Keywords
Using device diversity to protect data against batch-correlated disk failures
Proceedings of the second ACM workshop on Storage security and survivability - StorageSS '06
◽
10.1145/1179559.1179568
◽
2006
◽
Cited By ~ 9
Author(s):
Jehan-François Pâris
◽
Darrell D. E. Long
Keyword(s):
Disk Failures
Download Full-text
Scalable security for large, high performance storage systems
Proceedings of the second ACM workshop on Storage security and survivability - StorageSS '06
◽
10.1145/1179559.1179565
◽
2006
◽
Cited By ~ 10
Author(s):
Andrew W. Leung
◽
Ethan L. Miller
Keyword(s):
High Performance
◽
Storage Systems
Download Full-text
Long-term threats to secure archives
Proceedings of the second ACM workshop on Storage security and survivability - StorageSS '06
◽
10.1145/1179559.1179562
◽
2006
◽
Cited By ~ 17
Author(s):
Mark W. Storer
◽
Kevin Greenan
◽
Ethan L. Miller
Download Full-text
A statistical analysis of disclosed storage security breaches
Proceedings of the second ACM workshop on Storage security and survivability - StorageSS '06
◽
10.1145/1179559.1179561
◽
2006
◽
Cited By ~ 8
Author(s):
Ragib Hasan
◽
William Yurcik
Keyword(s):
Statistical Analysis
◽
Storage Security
◽
Security Breaches
Download Full-text
The case for semantic aware remote replication
Proceedings of the second ACM workshop on Storage security and survivability - StorageSS '06
◽
10.1145/1179559.1179575
◽
2006
◽
Cited By ~ 1
Author(s):
Xiaotao Liu
◽
Gal Niv
◽
Prashant Shenoy
◽
K.K. Ramakrishnan
◽
Jacobus Van der Merwe
Download Full-text
Secure deletion from inverted indexes on compliance storage
Proceedings of the second ACM workshop on Storage security and survivability - StorageSS '06
◽
10.1145/1179559.1179572
◽
2006
◽
Cited By ~ 7
Author(s):
Soumyadeb Mitra
◽
Marianne Winslett
Keyword(s):
Secure Deletion
◽
Inverted Indexes
Download Full-text
Design, implementation and evaluation of security in iSCSI-based network storage systems
Proceedings of the second ACM workshop on Storage security and survivability - StorageSS '06
◽
10.1145/1179559.1179564
◽
2006
◽
Cited By ~ 4
Author(s):
Shiva Chaitanya
◽
Kevin Butler
◽
Anand Sivasubramaniam
◽
Patrick McDaniel
◽
Murali Vilayannur
Keyword(s):
Storage Systems
◽
Network Storage
Download Full-text
Using free web storage for data backup
Proceedings of the second ACM workshop on Storage security and survivability - StorageSS '06
◽
10.1145/1179559.1179574
◽
2006
◽
Cited By ~ 6
Author(s):
Avishay Traeger
◽
Nikolai Joukov
◽
Josef Sipek
◽
Erez Zadok
Keyword(s):
Data Backup
Download Full-text
Limiting trust in the storage stack
Proceedings of the second ACM workshop on Storage security and survivability - StorageSS '06
◽
10.1145/1179559.1179569
◽
2006
◽
Cited By ~ 1
Author(s):
Lakshmi N. Bairavasundaram
◽
Meenali Rungta
◽
Andrea C. Arpaci-Dusseau
◽
Remzi H. Arpaci-Dusseau
Download Full-text
Access control for a replica management database
Proceedings of the second ACM workshop on Storage security and survivability - StorageSS '06
◽
10.1145/1179559.1179567
◽
2006
◽
Cited By ~ 4
Author(s):
Justin M. Wozniak
◽
Paul Brenner
◽
Douglas Thain
Keyword(s):
Access Control
◽
Replica Management
◽
Management Database
Download Full-text
Load More ...
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close