共 57 条
[41]
Peterson Z.N.J., Burns R., Ateniese G., Bono S., Design and implementation of verifiable audit trails for a versioning file system, Proceedings of the 5th USENIX Conference on File and Storage Technologies (FAST), pp. 20-20, (2007)
[42]
Pugh W., Skip lists: A probabilistic alternative to balanced trees, Comm. ACM, 33, 6, pp. 668-676, (1990)
[43]
Roselli D., Lorch J.R., Anderson T.E., A comparison of file system workloads, Proceedings of the USENIX Annual Technical Conference, (2000)
[44]
Sandler D., Wallach D.S., Casting votes in the auditorium, Proceedings of the USENIX Workshop on Accurate Electronic Voting Technology, (2007)
[45]
Sar C., Cao P., Lineage File System, (2005)
[46]
Schneier B., Kelsey J., Secure audit logs to support computer forensics, ACM Trans. Inform. Syst. Secur., 2, 2, pp. 159-176, (1999)
[47]
Seltzer M., Smith K.A., Balakrishnan H., Chang J., McMains S., Padmanabhan V., File system logging versus clustering: A performance comparison, Proceedings of the USENIX Annual Technical Conference, pp. 21-21, (1995)
[48]
Shamir A., How to share a secret, Comm. ACM, 22, 11, pp. 612-613, (1979)
[49]
Simmhany. L., Plale B., Andgannon D., Asurvey of data provenance in e-science, SIGMOD Rec, 34, 3, pp. 31-36, (2005)
[50]
Snodgrass R.T., Yao S.S., Collberg C., Tamper detection in audit logs, Proceedings of the 30th International Conference on Very Large Data Bases (VLDB), pp. 504-515, (2004)