Configuring storage-area networks using mandatory security

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Configuring storage-area networks using mandatory security

Storage-area networks are a popular and efficient way of building large storage systems both in an enterprise environment and for multi-domain storage service providers. In both environments the network and the storage has to be configured to ensure that the data is maintained securely and can be delivered efficiently. In this paper, we describe a model of mandatory security for SAN services th...

متن کامل

Configuring Storage Area Networks for Mandatory Security

Storage-area networks are a popular and efficient way of building large storage systems both in an enterprise environment and for multi-domain storage service providers. In both environments the network and the storage has to be configured to ensure that the data is maintained securely and can be delivered efficiently. In this paper we describe a model of mandatory security for multi-domain sto...

متن کامل

Storage Area Networks (SANs)

Introduction 1 SAN Fundamentals 1 What Is a SAN? 1 Benefits of SANs 3 SAN Applications 3 SAN Architecture 4 SAN Operating System Software Components 5 SAN Technologies and Solutions 5 Fiber-Channel-Arbitrated Loop Transport Protocol (FC-AL) 5 InfiniBand Solutions 6 Crossroads Systems With a Storage Router 6 Brocade’s Configurations 6 Other Storage Networking Technologies 6 VI (Virtual Interface...

متن کامل

On Configuring Hierarchical Storage Structures

The rapid progress in mass storage technology is enabling designers to implement large databases for a variety of applications. The possible configurations of the hierarchical storage structures (HSS) are numerous and result in various tradeoffs, e.g., storage cost, throughput, initial latency, etc. A naive design might waste system resources and result in high cost. For example, one naive desi...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Journal of Computer Security

سال: 2009

ISSN: 1875-8924,0926-227X

DOI: 10.3233/jcs-2009-0337