Venti: A New Approach to Archival Storage
暂无分享,去创建一个
[1] Abraham Lempel,et al. A universal algorithm for sequential data compression , 1977, IEEE Trans. Inf. Theory.
[2] Ralph C. Merkle,et al. Protocols for Public Key Cryptosystems , 1980, 1980 IEEE Symposium on Security and Privacy.
[3] Mahadev Satyanarayanan,et al. Scale and performance in a distributed file system , 1987, SOSP '87.
[4] Sean Quinlan,et al. A cached WORM file system , 1991, Softw. Pract. Exp..
[5] James Lau,et al. File System Design for an NFS File Server Appliance , 1994, USENIX Winter.
[6] Udi Manber,et al. Finding Similar Files in a Large File System , 1994, USENIX Winter.
[7] Evi Nemeth. UNIX system administration handbook, 2nd Edition , 1995 .
[8] Ken Thompson,et al. Plan 9 from Bell Labs , 1995 .
[9] Alfred Menezes,et al. Handbook of Applied Cryptography , 2018 .
[10] Ethan L. Miller,et al. Using content-derived names for configuration management , 1997, SSR '97.
[11] Hector Garcia-Molina,et al. Archival storage for digital libraries , 1998, DL '98.
[12] A. Chervenak,et al. Protecting File Systems : A Survey of Backup Techniques , 1998 .
[13] Ethan L. Miller,et al. Long-term File Activity and Inter-Reference Patterns (CMG Paper # 2041) , 1998 .
[14] Norman C. Hutchinson,et al. Deciding when to forget in the Elephant file system , 1999, SOSP.
[15] Norman C. Hutchinson,et al. Logical vs. physical file system backup , 1999, OSDI '99.
[16] D. A. Thompson,et al. The Future of Magnetic Data Storage Technology , 2000 .
[17] MaziéresDavid,et al. A low-bandwidth network file system , 2001 .
[18] 尚弘 島影. National Institute of Standards and Technologyにおける超伝導研究及び生活 , 2001 .
[19] David Mazières,et al. Fast and secure distributed read-only file system , 2000, TOCS.
[20] Craig A. N. Soules,et al. Self-securing storage: protecting data in compromised systems , 2000, Foundations of Intrusion Tolerant Systems, 2003 [Organically Assured and Survivable Information Systems].