Abstract is missing.
- A statistical analysis of disclosed storage security breachesRagib Hasan, William Yurcik. 1-8 [doi]
- Long-term threats to secure archivesMark W. Storer, Kevin M. Greenan, Ethan L. Miller. 9-16 [doi]
- Design, implementation and evaluation of security in iSCSI-based network storage systemsShiva Chaitanya, Kevin R. B. Butler, Anand Sivasubramaniam, Patrick McDaniel, Murali Vilayannur. 17-28 [doi]
- Scalable security for large, high performance storage systemsAndrew W. Leung, Ethan L. Miller. 29-40 [doi]
- Access control for a replica management databaseJustin M. Wozniak, Paul Brenner, Douglas Thain. 41-46 [doi]
- Using device diversity to protect data against batch-correlated disk failuresJehan-François Pâris, Darrell D. E. Long. 47-52 [doi]
- Limiting trust in the storage stackLakshmi N. Bairavasundaram, Meenali Rungta, Andrea C. Arpaci-Dusseau, Remzi H. Arpaci-Dusseau. 53-60 [doi]
- Secure deletion myths, issues, and solutionsNikolai Joukov, Harry Papaxenopoulos, Erez Zadok. 61-66 [doi]
- Secure deletion from inverted indexes on compliance storageSoumyadeb Mitra, Marianne Winslett. 67-72 [doi]
- Using free web storage for data backupAvishay Traeger, Nikolai Joukov, Josef Sipek, Erez Zadok. 73-78 [doi]
- The case for semantic aware remote replicationXiaotao Liu, Gal Niv, Prashant J. Shenoy, K. K. Ramakrishnan, Jacobus E. van der Merwe. 79-84 [doi]