Documents Related by Co-Citation

127 Self-securing Storage: Protecting Data in Compromised Systems – John D. Strunk, Garth R. Goodson, Michael L. Scheinholtz, Craig A. N. Soules, Gregory R. Ganger - 2000
816 Scale and performance in a distributed file system – John H. Howard, Michael L. Kazar, Sherri G. Menees, A. Nichols, M. Satyanarayanan, Robert N. Sidebotham, Michael J. West - 1988
388 FARSITE: Federated, Available, and Reliable Storage for an Incompletely Trusted Environment – Atul Adya, William J. Bolosky, Miguel Castro, Gerald Cermak, Ronnie Chaiken, John R. Douceur, Jon, Jon Howell, Jacob R. Lorch, Marvin Theimer, Roger P. Wattenhofer - 2002
16 Feedback control applied to survivability: a host-based autonomic defense system – O. Patrick Kreidl, Student Member, Tiffany M. Frazier - 2002
282 Internet Quarantine: Requirements for Containing Self-Propagating Code – David Moore, Colleen Shannon, Geoffrey M. Voelker, Stefan Savage - 2003
90 Metadata efficiency in versioning file systems – Craig A. N. Soules, Garth R. Goodson, John D. Strunk, Gregory R. Ganger - 2003
5 Concurrent Versions System. – D Grune, B Berliner, J Polk
26 File System Internals – K VMS MCCOY - 1990
171 Deciding when to forget in the Elephant file system – Douglas S. Santry, Michael J. Feeley, Norman C. Hutchinson, Alistair C. Veitch, Ross W. Carton, Jacob Ofir - 1999
22 Software Development Control Based on System Structure Description – Walter E Tichy - 1980
275 File System Design for an NFS File Server Appliance – Dave Hitz, James Lau, Michael Malcolm - 1994
269 The Zebra striped network file system – John H. Hartman, John K. Ousterhout - 1995
254 Venti: A New Approach to Archival Storage – Sean Quinlan, Sean Dorward - 2002
338 PostMark: a new filesystem benchmark – J Katcher - 1997
74 Heuristic cleaning algorithms in log-structured file systems – Trevor Blackwell, Jeffrey Harris, Margo Seltzer - 1995
315 A Low-bandwidth Network File System – Athicha Muthitacharoen, Benjie Chen, David Mazieres - 2001
428 Serverless Network File Systems – Thomas E. Anderson, Michael D. Dahlin, Jeanna M. Neefe, David A. Patterson, Drew S. Roselli, Randolph Y. Wang - 1995
215 Address obfuscation: an efficient approach to combat a broad range of memory error exploits – Eep Bhatkar, Daniel C. Duvarney, R. Sekar - 2003
18 A Holistic Approach to Service Survivability – Angelos D. Keromytis, Janak Parekh, Philip N. Gross, Gail Kaiser, Vishal Misra, ason Nieh, Dan Rubenstein, Sal Stolfo - 2003