Centralized authentication system with safe private data storage and method
M Vysogorets, E Shablygin - US Patent 8,327,141, 2012 - Google Patents
5,408.633 A 4, 1995 Katsumura et al. 5,485.474. A 1, 1996 Rabin 5,864,854 A 1/1999 Boyle
7,058,817 B1 6, 2006 Ellmore 7,089,224 B1 8/2006 Kluget al. 7,140,036 B2 11/2006 …
7,058,817 B1 6, 2006 Ellmore 7,089,224 B1 8/2006 Kluget al. 7,140,036 B2 11/2006 …
[PDF][PDF] SD codes: erasure codes designed for how storage systems really fail.
Internet Backplane Protocol API and Applications Page 1 SD Codes: Erasure Codes Designed
for How Storage Systems Really Fail James S. Plank University of Tennessee USENIX FAST …
for How Storage Systems Really Fail James S. Plank University of Tennessee USENIX FAST …
Sector-disk (SD) erasure codes for mixed failure modes in RAID systems
Traditionally, when storage systems employ erasure codes, they are designed to tolerate the
failures of entire disks. However, the most common types of failures are latent sector failures …
failures of entire disks. However, the most common types of failures are latent sector failures …
Centralized authentication system with safe private data storage and method
E Shablygin, M Vysogorets - US Patent 8,826,019, 2014 - Google Patents
A token-based centralized authentication method for providing access to a service provider
to user information associated with a user's relationship with the service provider includes …
to user information associated with a user's relationship with the service provider includes …
PeerVote: a decentralized voting mechanism for P2P collaboration systems
Abstract Peer-to-peer (P2P) systems achieve scalability, fault tolerance, and load balancing
with a low-cost infrastructure, characteristics from which collaboration systems, such as …
with a low-cost infrastructure, characteristics from which collaboration systems, such as …
Analysis and Optimization of Peer-to-Peer Storage and Backup Systems
A Dandoush - 2010 - theses.hal.science
This thesis characterizes the performance of peer-to-peer storage systems in terms of the
delivered data lifetime and data availability. Two schemes for recovering lost data are …
delivered data lifetime and data availability. Two schemes for recovering lost data are …
[PDF][PDF] Towards a Decentralized Voting Mechanism for P2P Collaboration Systems
Peer-to-peer (P2P) systems achieve scalability, fault tolerance, and load balancing with a
lower-cost infrastructure, from which collaboration systems, such as Wikipedia, could benefit …
lower-cost infrastructure, from which collaboration systems, such as Wikipedia, could benefit …
[PDF][PDF] Efficient Data Retrieval from a Secure, Durable, Append-Only Log
S Kumar, AM Chen, PR Bramsen… - CS262A …, 2016 - people.eecs.berkeley.edu
ABSTRACT The Global Data Plane (GDP)[1] provides a secure, verifiable, append-only,
single-writer log interface where logs are replicated across a range of possibly untrusted …
single-writer log interface where logs are replicated across a range of possibly untrusted …
Autonomous and Robust Components for Security in Network Domains
H Kinkelin - 2013 - mediatum.ub.tum.de
Computer networks and networked services are essential enabling technologies of many
aspects of modern societies today. One necessary requirement to guarantee their correct …
aspects of modern societies today. One necessary requirement to guarantee their correct …
[PDF][PDF] Exploring a New IoT Infrastructure
P Bramsen, S Kumar, A Chen, D Majumdar - 2017 - digicoll.lib.berkeley.edu
Over the course of the last decade, the number of devices connected to the Internet has
exploded, surpassing the global population in 2012 and doubling over the next few years …
exploded, surpassing the global population in 2012 and doubling over the next few years …