Many applications require the ability to obtain exclu-sive access to data, where an application is granted privi-leges to an object that cannot be preempted and limits the actions of other processes. Local file systems support ex-clusive access to files by maintaining information about the access rights of current open file instances, and check-ing subsequent opens for compatibility. Implementing ex-clusive access in this manner for distributed file systems degrades performance by requiring every open file to be registered with a server that maintains global open state. We introduce a distributed lock for managing file ac-cess, called a semi-preemptible lock, that avoids this performance limitation. Clients locally grant open re-quests for ...
Abstract. We model networked storage systems with distributed, cryptographically enforced file-acces...
Distributed file systems have become popular because they allow information to be shared be between ...
Traditional access control mechanisms rely on a reference monitor to mediate access to protected res...
Many applications require the ability to obtain exclu-sive access to data, where an application is g...
Many applications require the ability to obtain ex-clusive access to data, where an application is g...
File systems provide an interface for applications to obtain exclusive access to files, in which a p...
File systems provide an interface for applications to obtain exclusive access to files, in which a p...
In a distributed file system built on network attached storage, client computers access data directl...
In a distributed file system built on network attached storage, client computers access data directl...
Technological trends such as the availability of mobile computers and the expanding network infrastr...
We have developed a scheme to secure networkattached storage systems against many types of attacks. ...
We describe a system for caching of files in a distributed file system where a locking protocol is u...
Effective file system caching reduces local disk accesses and remote file server accesses significan...
Parallel file systems offer improved performance over traditional file systems by allowing processes...
International audienceThis paper investigate a mutual exclusion algorithm on distributed systems. We...
Abstract. We model networked storage systems with distributed, cryptographically enforced file-acces...
Distributed file systems have become popular because they allow information to be shared be between ...
Traditional access control mechanisms rely on a reference monitor to mediate access to protected res...
Many applications require the ability to obtain exclu-sive access to data, where an application is g...
Many applications require the ability to obtain ex-clusive access to data, where an application is g...
File systems provide an interface for applications to obtain exclusive access to files, in which a p...
File systems provide an interface for applications to obtain exclusive access to files, in which a p...
In a distributed file system built on network attached storage, client computers access data directl...
In a distributed file system built on network attached storage, client computers access data directl...
Technological trends such as the availability of mobile computers and the expanding network infrastr...
We have developed a scheme to secure networkattached storage systems against many types of attacks. ...
We describe a system for caching of files in a distributed file system where a locking protocol is u...
Effective file system caching reduces local disk accesses and remote file server accesses significan...
Parallel file systems offer improved performance over traditional file systems by allowing processes...
International audienceThis paper investigate a mutual exclusion algorithm on distributed systems. We...
Abstract. We model networked storage systems with distributed, cryptographically enforced file-acces...
Distributed file systems have become popular because they allow information to be shared be between ...
Traditional access control mechanisms rely on a reference monitor to mediate access to protected res...