In a distributed le system built on network attached storage, client computers access data directly from shared storage, rather than submitting I/O requests through a server. Without a server marshaling access to data, if a computer fails or becomes isolated in a network partition while holding locks on cached data objects, those objects become inaccessible to other computers until a locking au-thority can guarantee that the lock holder will not again directly access these data. We describe a server that acts as the locking authority and implements a lease-based proto-col for revoking access to data objects locked by an isolated or failed computer. When a lease expires, the server can be assured that the client no longer acts on locked data...
A Distributed Lock Manager (DLM) provides advisory locking services to applications such as database...
We propose a practical and efficient method for adding security to network-attached disks (NADs). In...
Remote Data Checking (RDC) is a technique by which clients can establish that data outsourced at unt...
In a distributed file system built on network attached storage, client computers access data directl...
In a distributed file system built on network attached storage, client computers access data directl...
Many applications require the ability to obtain ex-clusive access to data, where an application is g...
Many applications require the ability to obtain exclu-sive access to data, where an application is g...
We present an architecture for network authenticated disks that can be used to implement distributed...
File systems provide an interface for applications to obtain exclusive access to files, in which a p...
File systems provide an interface for applications to obtain exclusive access to files, in which a p...
We propose light-weight lease primitives to leverage fault-tolerant coordination among clients acces...
An architecture for network-authenticated disks that implements distributed file systems without fil...
We have developed a scheme to secure networkattached storage systems against many types of attacks. ...
We describe a system for caching of files in a distributed file system where a locking protocol is u...
Abstract: “proxy servers ” are the important thing we are using here to secure the data from untrust...
A Distributed Lock Manager (DLM) provides advisory locking services to applications such as database...
We propose a practical and efficient method for adding security to network-attached disks (NADs). In...
Remote Data Checking (RDC) is a technique by which clients can establish that data outsourced at unt...
In a distributed file system built on network attached storage, client computers access data directl...
In a distributed file system built on network attached storage, client computers access data directl...
Many applications require the ability to obtain ex-clusive access to data, where an application is g...
Many applications require the ability to obtain exclu-sive access to data, where an application is g...
We present an architecture for network authenticated disks that can be used to implement distributed...
File systems provide an interface for applications to obtain exclusive access to files, in which a p...
File systems provide an interface for applications to obtain exclusive access to files, in which a p...
We propose light-weight lease primitives to leverage fault-tolerant coordination among clients acces...
An architecture for network-authenticated disks that implements distributed file systems without fil...
We have developed a scheme to secure networkattached storage systems against many types of attacks. ...
We describe a system for caching of files in a distributed file system where a locking protocol is u...
Abstract: “proxy servers ” are the important thing we are using here to secure the data from untrust...
A Distributed Lock Manager (DLM) provides advisory locking services to applications such as database...
We propose a practical and efficient method for adding security to network-attached disks (NADs). In...
Remote Data Checking (RDC) is a technique by which clients can establish that data outsourced at unt...