Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
RAID
biblio
Secure RAID schemes for distributed storage
Submitted by K_Hooper on Fri, 02/02/2018 - 11:04am
XOR-based systematic secure RAID schemes
Systematics
Resilient Security Architectures
Resiliency
Reliability
Reed-Solomon codes
random access
RAID architecture
RAID
pubcrawl
practical high rate regime
optimal encoding complexities
node failures
low-complexity schemes
Logic gates
information-theoretic security
information theory
Generators
EVENODD codes
encoding
eavesdropping nodes
distributed storage
Distributed databases
decoding complexities
Decoding
computer architecture
computational complexity
Complexity theory
B codes
biblio
Towards robust, scalable and secure network storage in Cloud Computing
Submitted by BrandonB on Wed, 05/06/2015 - 2:11pm
adaptive security
authentication
Availability
built in security
client overhead
Cloud Computing
cloud computing environment
cloud service provider
Compliance
computer architecture
confidentiality
data integrity
data privacy
Data Security
data sharing
data storage
Distributed databases
information centric security
integrity
internet
middleware
network storage architecture
networking
on-demand access
operating system
pay per use model
privacy
proactive security
RAID
remote application access
remote service access
robust scalable secure network storage
security of data
server
Servers
service availability
service outsourcing
storage management
ubiquitous computing
ubiquitous next generation information technology architecture
virtualisation
Virtualization
biblio
Towards robust, scalable and secure network storage in Cloud Computing
Submitted by BrandonB on Thu, 04/30/2015 - 2:38pm
adaptive security
authentication
Availability
built in security
client overhead
Cloud Computing
cloud computing environment
cloud service provider
Compliance
computer architecture
confidentiality
data integrity
data privacy
Data Security
data sharing
data storage
Distributed databases
information centric security
integrity
internet
middleware
network storage architecture
networking
on-demand access
operating system
pay per use model
privacy
proactive security
RAID
remote application access
remote service access
robust scalable secure network storage
security of data
server
Servers
service availability
service outsourcing
storage management
ubiquitous computing
ubiquitous next generation information technology architecture
virtualisation
Virtualization
biblio
Toward I/O-efficient protection against silent data corruptions in RAID arrays
Submitted by BrandonB on Thu, 04/30/2015 - 2:11pm
arrays
data integrity
Data models
disk drives
disk errors
I/O overhead
input-output programs
integrity checking model
integrity protection schemes
IO-efficient integrity checking mechanisms
IO-efficient protection
RAID
RAID arrays
read-write characteristics
Redundancy
security of data
silent data corruptions
storage workloads
Systematics
taxonomy
trace-driven simulation
user write sizes