Login / Signup
Secure Deletion on Log-structured File Systems
Joel Reardon
Claudio Marforio
Srdjan Capkun
David A. Basin
Published in:
CoRR (2011)
Keyphrases
</>
file system
unauthorized access
access patterns
storage systems
search tools
structured data
data transfer
flash memory
storage devices
multi tiered
distributed data
security issues
security requirements
scalable distributed
access control
security protocols
sensor networks
application specific