Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
RAID
biblio
Secure RAID schemes for distributed storage
Submitted by K_Hooper on Fri, 02/02/2018 - 10:04am
Logic gates
B codes
Complexity theory
computational complexity
computer architecture
Decoding
decoding complexities
Distributed databases
distributed storage
eavesdropping nodes
encoding
EVENODD codes
Generators
information theory
information-theoretic security
XOR-based systematic secure RAID schemes
low-complexity schemes
node failures
optimal encoding complexities
practical high rate regime
pubcrawl
RAID
RAID architecture
random access
Reed-Solomon codes
Reliability
Resiliency
Resilient Security Architectures
Systematics
biblio
Towards robust, scalable and secure network storage in Cloud Computing
Submitted by BrandonB on Wed, 05/06/2015 - 1:11pm
security of data
networking
on-demand access
operating system
pay per use model
privacy
proactive security
RAID
remote application access
remote service access
robust scalable secure network storage
network storage architecture
server
Servers
service availability
service outsourcing
storage management
ubiquitous computing
ubiquitous next generation information technology architecture
virtualisation
Virtualization
data integrity
authentication
Availability
built in security
client overhead
Cloud Computing
cloud computing environment
cloud service provider
Compliance
computer architecture
confidentiality
adaptive security
data privacy
Data Security
data sharing
data storage
Distributed databases
information centric security
integrity
internet
middleware
biblio
Towards robust, scalable and secure network storage in Cloud Computing
Submitted by BrandonB on Thu, 04/30/2015 - 1:38pm
security of data
networking
on-demand access
operating system
pay per use model
privacy
proactive security
RAID
remote application access
remote service access
robust scalable secure network storage
network storage architecture
server
Servers
service availability
service outsourcing
storage management
ubiquitous computing
ubiquitous next generation information technology architecture
virtualisation
Virtualization
data integrity
authentication
Availability
built in security
client overhead
Cloud Computing
cloud computing environment
cloud service provider
Compliance
computer architecture
confidentiality
adaptive security
data privacy
Data Security
data sharing
data storage
Distributed databases
information centric security
integrity
internet
middleware
biblio
Toward I/O-efficient protection against silent data corruptions in RAID arrays
Submitted by BrandonB on Thu, 04/30/2015 - 1:11pm
RAID
user write sizes
trace-driven simulation
taxonomy
Systematics
storage workloads
silent data corruptions
security of data
Redundancy
read-write characteristics
RAID arrays
arrays
IO-efficient protection
IO-efficient integrity checking mechanisms
integrity protection schemes
integrity checking model
input-output programs
I/O overhead
disk errors
disk drives
Data models
data integrity