Sanitization of Open-Source Based Deduplicated Filesystem
نویسندگان
چکیده
منابع مشابه
Memory efficient sanitization of a deduplicated storage system
Sanitization is the process of securely erasing sensitive data from a storage system, effectively restoring the system to a state as if the sensitive data had never been stored. Depending on the threat model, sanitization could require erasing all unreferenced blocks. This is particularly challenging in deduplicated storage systems because each piece of data on the physical media could be refer...
متن کاملOpen Source Text Based Biovigilance
−Timely detection of disease outbreak events is of paramount importance for the defense against infectious diseases and biological threats. Internet-based communications can provide good situational awareness for countries where public data collection is inadequate, unreliable or missing. The key challenge is to sift through this vast amount of unstructured text to identify relevant reports and...
متن کاملA Pageable Memory Based Filesystem
This paper describes the motivations for memory-based filesystems. It compares techniques used to implement them and describes the drawbacks of using dedicated memory to support such filesystems. To avoid the drawbacks of using dedicated memory, it discusses building a simple memory-based filesystem in pageable memory. It details the performance characteristics of this filesystem and concludes ...
متن کاملAgent-based simulation of open source evolution
We present an agent-based simulation model developed to study how size, complexity and effort relate to each other in the development of open source software (OSS). In the model, many developer agents generate, extend, and refactor code modules independently and in parallel. This accords with empirical observations of OSS development. To our knowledge, this is the first model of OSS evolution t...
متن کاملBEAT: An Open-Source Web-Based Open-Science Platform
With the increased interest in computational sciences, machine learning (ML), pattern recognition (PR) and big data, governmental agencies, academia and manufacturers are overwhelmed by the constant influx of new algorithms and techniques promising improved performance, generalization and robustness. Sadly, result reproducibility is often an overlooked feature accompanying original research pub...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Journal of the Korea Institute of Information Security and Cryptology
سال: 2016
ISSN: 1598-3986
DOI: 10.13089/jkiisc.2016.26.5.1141