Login / Signup
Protecting File systems Against Corruption Using Checksums.
Daniel Barbará
Rajni Goel
Sushil Jajodia
Published in:
DBSec (2000)
Keyphrases
</>
file system
unauthorized access
access patterns
data transfer
access control
continuous media
multi tiered
flash memory
search tools
scientific computing
distributed data
storage devices
data corruption
database
scalable distributed
high availability
application specific