Techniques to audit and certify the long-term integrity of digital archives
Tóm tắt
Từ khóa
Tài liệu tham khảo
Bairavasundaram, L.N., Arpaci-Dusseau, A.C., Arpaci-Dusseau, R.H., Goodson, G.R., Schroeder, B.: An analysis of data corruption in the storage stack. ACM Trans. Storage 4(3), 1–28 (2008). http://doi.acm.org/10.1145/1416944.1416947
Desmedt, Y.G., Frankel, Y.: Threshold cryptosystems. In: CRYPTO ’89: Proceedings on advances in cryptology, pp. 307–315. Springer-Verlag, New York, Inc., New York, NY, USA (1989)
Diffie W., Hellman M.E.: New directions in cryptography. IEEE Trans. Inf. Theory IT-22(6), 644–654 (1976)
Farquhar, A., Martin, S., Boulderstone, R., Dooher, V., Masters, R., Wilson, C.: Design for the long term: Authenticity and object representation. In: Proceedings of Archiving 2005. IS&T, pp. 104–108 (2005)
Giuli, T.J., Maniatis, P., Baker, M., Rosenthal, D.S.H., Roussopoulos, M.: Attrition defenses for a peer-to-peer digital preservation system. In: ATEC’05: Proceedings of the USENIX Annual Technical Conference 2005, pp. 163–178. USENIX Association, Berkeley, CA, USA (2005)
Haber, S., Kamat, P.: Content integrity service for long-term digital archives. In: Proceedings of Archiving 2006. IS&T, pp. 159–164 (2006)
Kaufman C., Perlman R., Speciner M.: Network Security: Private Communication in a Public World. 2nd edn. Prentice-Hall, Inc., Upper Saddle River, NJ, USA (2002)
Lamport, L., Shostak, R., Pease, M.: The Byzantine generals problem. ACM Trans. Program Lang. Syst. 4(3), 382–401 (1982). http://doi.acm.org/10.1145/357172.357176
Maniatis, P., Baker, M.: Enabling the archival storage of signed documents. In: FAST ’02: Proceedings of the 1st USENIX Conference on File and Storage Technologies, p 3. USENIX Association, Berkeley, CA, USA (2002)
Maniatis, P., Giuli, T., Baker, M.: Enabling the long-term archival of signed documents through time stamping. Technical Report arXiv:cs.DC/0106058, Computer Science Department, Stanford University, Stanford, CA, USA (2001)
Maniatis, P., Roussopoulos, M., Giuli, T.J., Rosenthal, D.S.H., Baker, M.: The LOCKSS peer-to-peer digital preservation system. ACM Trans. Comput. Syst. 23(1), 2–50 (2005). http://doi.acm.org/10.1145/1047915.1047917
Menezes A.J., Vanstone S.A., Oorschot P.C.V.: Handbook of Applied Cryptography. CRC Press, Inc., Boca Raton, FL, USA (1996)
Merkle, R.C.: Protocols for public key cryptosystems. In: IEEE Symposium on Security and Privacy, pp. 122–134. (1980)
Patterson, D.A., Gibson, G., Katz, R.H.: A case for redundant arrays of inexpensive disks (RAID). In: SIGMOD ’88: Proceedings of the 1988 ACM SIGMOD international conference on Management of data, pp. 109–116. ACM Press, New York, NY, USA (1988). http://doi.acm.org/10.1145/50202.50214
Plank J.S.: A tutorial on Reed-Solomon coding for fault-tolerance in RAID-like systems. Softw. Pract. Exp. 27(9), 995–1012 (1997)
Sivathanu, G., Wright, C.P., Zadok, E.: Ensuring data integrity in storage: techniques and applications. In: StorageSS ’05: Proceedings of the 2005 ACM workshop on Storage security and survivability, pp. 26–36. ACM Press, New York, NY, USA (2005). http://doi.acm.org/10.1145/1103780.1103784
Song, S., JaJa, J.: Ace: a novel software platform to ensure the integrity of long term archives. In: Proceedings of Archiving 2007, pp. 90–93. IS&T (2007)
