Back to Results
First PageMeta Content
Data deduplication / Data management / Steganographic file system / Crypt / Freenet / Backup / Public-key cryptography / Key size / Secure communication / Cryptography / Disk file systems / Data compression


Secure Data Deduplication Mark W. Storer Kevin Greenan Darrell D. E. Long Ethan L. Miller Storage Systems Research Center
Add to Reading List

Document Date: 2013-09-11 13:26:16


Open Document

File Size: 204,64 KB

Share Result on Facebook

City

Denver / Monterey / Santa Fe / San Francisco / Seattle / Fairfax / Boston / Tokyo / Chunk / Portland / Alexandria / Vienna / Tampa / San Diego / /

Company

LSI Logic / Distributed Computing Systems / E. L. Miller D. D. / K. Pollack D. D. / Hitachi / Cluster File Systems Inc. / S. A. Weil S. A. / NetApp / Needham / Data Domain / Symantec / /

Country

Japan / Austria / United States / /

Currency

USD / /

/

Facility

Chunk Store / Deep Store / E. Long Ethan L. Miller Storage Systems Research Center University of California / Windows Single Instance Store / Harvard University / /

IndustryTerm

large-scale deduplication systems / secure systems / chunk server / communications path / correct storage device / secure communications techniques / deterministic placement algorithms / file server / in many systems / data mining / file systems / steganographic systems / correct storage devices / object-based storage devices / secure protocol / metadata server / storage systems / hierarchical storage solution / archival systems / distributed storage systems / media files / certificate server / petascale parallel file systems / backup solutions / censorship resistant web publishing platform / censorship-resistant web publishing system / software distribution / /

OperatingSystem

Windows 2000 / Microsoft Windows / /

Organization

Center for Research / Harvard University / Department of Energy / U.S. Securities and Exchange Commission / USENIX Association / University of California / Santa Cruz / Storage Systems Research Center / /

Person

O. Rabin / Mark W. Storer Kevin Greenan Darrell / Ethan L. Miller / /

Position

malicious administrator / Retrieval General / system administrator / guard / root level administrator / player / writer / C e o / /

ProvinceOrState

Virginia / Oregon / Washington / New Mexico / Florida / California / Massachusetts / Colorado / /

PublishedMedium

Communications of the ACM / Lecture Notes in Computer Science / /

Technology

Peer-to-peer / Data encryption / deterministic placement algorithms / private key / Operating Systems / network file system / web publishing / encryption / cryptography / public key / file encryption / file sharing / data mining / caching / Simulation / secure protocol / server side encryption / web publishing system / /

URL

http /

SocialTag