Configuring storage-area networks using mandatory security
نویسندگان
چکیده
منابع مشابه
Configuring storage-area networks using mandatory security
Storage-area networks are a popular and efficient way of building large storage systems both in an enterprise environment and for multi-domain storage service providers. In both environments the network and the storage has to be configured to ensure that the data is maintained securely and can be delivered efficiently. In this paper, we describe a model of mandatory security for SAN services th...
متن کاملConfiguring Storage Area Networks for Mandatory Security
Storage-area networks are a popular and efficient way of building large storage systems both in an enterprise environment and for multi-domain storage service providers. In both environments the network and the storage has to be configured to ensure that the data is maintained securely and can be delivered efficiently. In this paper we describe a model of mandatory security for multi-domain sto...
متن کاملStorage Area Networks (SANs)
Introduction 1 SAN Fundamentals 1 What Is a SAN? 1 Benefits of SANs 3 SAN Applications 3 SAN Architecture 4 SAN Operating System Software Components 5 SAN Technologies and Solutions 5 Fiber-Channel-Arbitrated Loop Transport Protocol (FC-AL) 5 InfiniBand Solutions 6 Crossroads Systems With a Storage Router 6 Brocade’s Configurations 6 Other Storage Networking Technologies 6 VI (Virtual Interface...
متن کاملOn Configuring Hierarchical Storage Structures
The rapid progress in mass storage technology is enabling designers to implement large databases for a variety of applications. The possible configurations of the hierarchical storage structures (HSS) are numerous and result in various tradeoffs, e.g., storage cost, throughput, initial latency, etc. A naive design might waste system resources and result in high cost. For example, one naive desi...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Journal of Computer Security
سال: 2009
ISSN: 1875-8924,0926-227X
DOI: 10.3233/jcs-2009-0337