Protecting the Integrity of an Entire File System.
Fujita TomonoriOgawara MasanoriPublished in: IWIA (2003)
Keyphrases
- file system
- unauthorized access
- access patterns
- storage systems
- data transfer
- data protection
- naming conventions
- multi tiered
- search tools
- scalable distributed
- continuous media
- metadata management
- storage devices
- data integrity
- flash memory
- web services
- privacy preservation
- distributed databases
- smart card
- integrity constraints
- open source