The SCEAS System
Navigation Menu

Conferences in DBLP

(storagess)
2006 (conf/storagess/2006)


  1. A statistical analysis of disclosed storage security breaches. [Citation Graph (, )][DBLP]


  2. Long-term threats to secure archives. [Citation Graph (, )][DBLP]


  3. Design, implementation and evaluation of security in iSCSI-based network storage systems. [Citation Graph (, )][DBLP]


  4. Scalable security for large, high performance storage systems. [Citation Graph (, )][DBLP]


  5. Access control for a replica management database. [Citation Graph (, )][DBLP]


  6. Using device diversity to protect data against batch-correlated disk failures. [Citation Graph (, )][DBLP]


  7. Limiting trust in the storage stack. [Citation Graph (, )][DBLP]


  8. Secure deletion myths, issues, and solutions. [Citation Graph (, )][DBLP]


  9. Secure deletion from inverted indexes on compliance storage. [Citation Graph (, )][DBLP]


  10. Using free web storage for data backup. [Citation Graph (, )][DBLP]


  11. The case for semantic aware remote replication. [Citation Graph (, )][DBLP]

NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002