In a distributed file system built on network attached storage, client computers access data directly from shared storage, rather than submitting I/O requests through a server. Without a server marshaling access to data, if a computer fails or becomes isolated in a network partition while holding locks on cached data objects, those objects become inaccessible to other computers until a locking au-thority can guarantee that the lock holder will not again directly access these data. We describe a server that acts as the locking authority and implements a lease-based proto-col for revoking access to data objects locked by an isolated or failed computer. When a lease expires, the server can be assured that the client no longer acts on locked da...
This paper presents a novel cryptographic capability system addressing the security and performance ...
We propose a practical and efficient method for adding security to network-attached disks (NADs). In...
This paper presents a novel cryptographic capability system addressing the security and performance ...
In a distributed le system built on network attached storage, client computers access data directly ...
In a distributed file system built on network attached storage, client computers access data directl...
Many applications require the ability to obtain exclu-sive access to data, where an application is g...
We present an architecture for network authenticated disks that can be used to implement distributed...
Many applications require the ability to obtain ex-clusive access to data, where an application is g...
File systems provide an interface for applications to obtain exclusive access to files, in which a p...
File systems provide an interface for applications to obtain exclusive access to files, in which a p...
An architecture for network-authenticated disks that implements distributed file systems without fil...
We have developed a scheme to secure networkattached storage systems against many types of attacks. ...
We propose light-weight lease primitives to leverage fault-tolerant coordination among clients acces...
We describe a system for caching of files in a distributed file system where a locking protocol is u...
Abstract: “proxy servers ” are the important thing we are using here to secure the data from untrust...
This paper presents a novel cryptographic capability system addressing the security and performance ...
We propose a practical and efficient method for adding security to network-attached disks (NADs). In...
This paper presents a novel cryptographic capability system addressing the security and performance ...
In a distributed le system built on network attached storage, client computers access data directly ...
In a distributed file system built on network attached storage, client computers access data directl...
Many applications require the ability to obtain exclu-sive access to data, where an application is g...
We present an architecture for network authenticated disks that can be used to implement distributed...
Many applications require the ability to obtain ex-clusive access to data, where an application is g...
File systems provide an interface for applications to obtain exclusive access to files, in which a p...
File systems provide an interface for applications to obtain exclusive access to files, in which a p...
An architecture for network-authenticated disks that implements distributed file systems without fil...
We have developed a scheme to secure networkattached storage systems against many types of attacks. ...
We propose light-weight lease primitives to leverage fault-tolerant coordination among clients acces...
We describe a system for caching of files in a distributed file system where a locking protocol is u...
Abstract: “proxy servers ” are the important thing we are using here to secure the data from untrust...
This paper presents a novel cryptographic capability system addressing the security and performance ...
We propose a practical and efficient method for adding security to network-attached disks (NADs). In...
This paper presents a novel cryptographic capability system addressing the security and performance ...