Abstract | ||
---|---|---|
Storage systems are more distributed and more subject to attacks. Cryptographic file system gives a promising way to mitigate the danger of exposing data by using encryption and integrity protection methods and guarantee end-to-end security to clients. ... |
Year | DOI | Venue |
---|---|---|
2008 | 10.1109/NAS.2008.52 | NAS |
Keywords | Field | DocType |
bloom filters,storage system,end-to-end security,peer-to-peer systems,integrity protection method,cryptographic file system,system performance,system analysis and design,data structure,side effect,bloom filter,resource management,bandwidth,filtering,approximation theory,databases,space exploration,data structures | Resource management,Data science,Data structure,Bloom filter,Structured systems analysis and design method,Peer-to-peer,Computer science,Filter (signal processing),Computer network,Theoretical computer science,Space exploration,Bandwidth (signal processing) | Conference |
Citations | PageRank | References |
7 | 0.52 | 10 |
Authors | ||
3 |
Name | Order | Citations | PageRank |
---|---|---|---|
Hailong Cai | 1 | 61 | 4.78 |
Ping Ge | 2 | 7 | 0.52 |
Jun Wang | 3 | 144 | 15.26 |