Login / Signup
User-level secure deletion on log-structured file systems.
Joel Reardon
Claudio Marforio
Srdjan Capkun
David A. Basin
Published in:
AsiaCCS (2012)
Keyphrases
</>
file system
unauthorized access
user privacy
user interaction
user interface
distributed data
flash memory
user authentication
user preferences
continuous media
data transfer
multi tiered
data structure
access patterns
log files
data management
end users