How to share a secret with cheaters
Journal of Cryptology
Efficient dispersal of information for security, load balancing, and fault tolerance
Journal of the ACM (JACM)
RAID: high-performance, reliable secondary storage
ACM Computing Surveys (CSUR)
Secure agreement protocols: reliable and atomic group multicast in rampart
CCS '94 Proceedings of the 2nd ACM Conference on Computer and communications security
Serverless network file systems
ACM Transactions on Computer Systems (TOCS) - Special issue on operating system principles
Petal: distributed virtual disks
Proceedings of the seventh international conference on Architectural support for programming languages and operating systems
A cost-effective, high-bandwidth storage architecture
Proceedings of the eighth international conference on Architectural support for programming languages and operating systems
Practical Byzantine fault tolerance
OSDI '99 Proceedings of the third symposium on Operating systems design and implementation
Communications of the ACM
CRYPTO '93 Proceedings of the 13th Annual International Cryptology Conference on Advances in Cryptology
Towards an Archival Intermemory
ADL '98 Proceedings of the Advances in Digital Libraries Conference
IEEE Transactions on Information Theory
COCA: A secure distributed online certification authority
ACM Transactions on Computer Systems (TOCS)
IPTPS '01 Revised Papers from the First International Workshop on Peer-to-Peer Systems
Farsite: federated, available, and reliable storage for an incompletely trusted environment
ACM SIGOPS Operating Systems Review - OSDI '02: Proceedings of the 5th symposium on Operating systems design and implementation
Responsive Security for Stored Data
ICDCS '03 Proceedings of the 23rd International Conference on Distributed Computing Systems
ITRA: Inter-Tier Relationship Architecture for End-to-end QoS
The Journal of Supercomputing
Information Security on the Logistical Network: An End-to-End Approach
SISW '03 Proceedings of the Second IEEE International Security in Storage Workshop
An intrusion tolerant architecture for dynamic content internet servers
Proceedings of the 2003 ACM workshop on Survivable and self-regenerative systems: in association with 10th ACM Conference on Computer and Communications Security
ICDE '05 Proceedings of the 21st International Conference on Data Engineering
Design, Implementation, and Evaluation of a Repairable Database Management System
ICDE '05 Proceedings of the 21st International Conference on Data Engineering
Farsite: federated, available, and reliable storage for an incompletely trusted environment
OSDI '02 Proceedings of the 5th symposium on Operating systems design and implementationCopyright restrictions prevent ACM from being able to make the PDFs for this conference available for downloading
Journal of Parallel and Distributed Computing
A Framework for Evaluating Storage System Security
FAST '02 Proceedings of the 1st USENIX Conference on File and Storage Technologies
Awarded Best Student Paper! - Pond: The OceanStore Prototype
FAST '03 Proceedings of the 2nd USENIX Conference on File and Storage Technologies
Implementing Trustworthy Services Using Replicated State Machines
IEEE Security and Privacy
An approach for fault tolerant and secure data storage in collaborative work environments
Proceedings of the 2005 ACM workshop on Storage security and survivability
Toward a threat model for storage systems
Proceedings of the 2005 ACM workshop on Storage security and survivability
Hydra: a platform for survivable and secure data storage systems
Proceedings of the 2005 ACM workshop on Storage security and survivability
The design and implementation of a self-healing database system
Journal of Intelligent Information Systems - Special issue: Database and applications security
Long-term threats to secure archives
Proceedings of the second ACM workshop on Storage security and survivability
Design, implementation and evaluation of security in iSCSI-based network storage systems
Proceedings of the second ACM workshop on Storage security and survivability
On the road to recovery: restoring data after disasters
Proceedings of the 1st ACM SIGOPS/EuroSys European Conference on Computer Systems 2006
Specifying and using intrusion masking models to process distributed operations
Journal of Computer Security
Ursa minor: versatile cluster-based storage
FAST'05 Proceedings of the 4th conference on USENIX Conference on File and Storage Technologies - Volume 4
STAR: an efficient coding scheme for correcting triple storage node failures
FAST'05 Proceedings of the 4th conference on USENIX Conference on File and Storage Technologies - Volume 4
Total recall: system support for automated availability management
NSDI'04 Proceedings of the 1st conference on Symposium on Networked Systems Design and Implementation - Volume 1
Glacier: highly durable, decentralized storage despite massive correlated failures
NSDI'05 Proceedings of the 2nd conference on Symposium on Networked Systems Design & Implementation - Volume 2
Robust computational secret sharing and a unified account of classical secret-sharing goals
Proceedings of the 14th ACM conference on Computer and communications security
International Journal of Information and Computer Security
SafeStore: a durable and practical storage system
ATC'07 2007 USENIX Annual Technical Conference on Proceedings of the USENIX Annual Technical Conference
POTSHARDS: secure long-term storage without encryption
ATC'07 2007 USENIX Annual Technical Conference on Proceedings of the USENIX Annual Technical Conference
The implementation and evaluation of a recovery system for workflows
Journal of Network and Computer Applications
A three-tier information management architecture for mobile grid environments
Proceedings of the 6th International Conference on Advances in Mobile Computing and Multimedia
POTSHARDS—a secure, recoverable, long-term archival storage system
ACM Transactions on Storage (TOS)
Tashi: location-aware cluster management
ACDC '09 Proceedings of the 1st workshop on Automated control for datacenters and clouds
Challenges to long term digital preservation a glimpse of the Italian experience
DSP'09 Proceedings of the 16th international conference on Digital Signal Processing
An efficient dispersal and encryption scheme for secure distributed information storage
ICCS'03 Proceedings of the 2003 international conference on Computational science
Subquery allocation problem and heuristics for secret sharing distributed database system
Journal of Computer Systems, Networks, and Communications
Quality of security adaptation in parallel disk systems
Journal of Parallel and Distributed Computing
A framework for evaluating storage system security
FAST'02 Proceedings of the 1st USENIX conference on File and storage technologies
Pond: the oceanstore prototype
FAST'03 Proceedings of the 2nd USENIX conference on File and storage technologies
Middleware for a re-configurable distributed archival store based on secret sharing
Proceedings of the ACM/IFIP/USENIX 11th International Conference on Middleware
A holistic approach to survivable distributed information system for critical applications
ISPA'05 Proceedings of the Third international conference on Parallel and Distributed Processing and Applications
Protecting secret data from insider attacks
FC'05 Proceedings of the 9th international conference on Financial Cryptography and Data Security
On the limits of cyber-insurance
TrustBus'06 Proceedings of the Third international conference on Trust, Privacy, and Security in Digital Business
Hi-index | 4.10 |
As society increasingly relies on digitally stored and accessed information, supporting the availability, integrity, and confidentiality of this information is crucial. Systems need to help users securely store critical information, ensuring that it persists, is continuously accessible, cannot be destroyed, and is kept confidential. The authors show why they believe a survivable storage system would provide these guarantees, despite malicious compromises of storage node subsets.This article describes the PASIS architecture, which combines decentralized storage system technologies, data redundancy and encoding, and dynamic self-maintenance to create survivable information storage.The authors explain how the PASIS architecture flexibly and efficiently combines technologies for constructing in-formation storage systems whose availability, confidentiality, and integrity policies can survive component failures and malicious attacks.