Login / Signup
A control point for reducing root abuse of file-system privileges.
Glenn Wurster
Paul C. van Oorschot
Published in:
CCS (2010)
Keyphrases
</>
file system
access patterns
naming conventions
continuous media
flash memory
data acquisition
data transfer
storage devices
access control
database
storage systems
scalable distributed
control system
control method
metadata management
distributed database systems
data storage
database systems
metadata