Dalit Naor

According to our database1, Dalit Naor authored at least 39 papers between 1990 and 2017.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2017
Too Big to Eat: Boosting Analytics Data Ingestion from Object Stores with Scoop.
Proceedings of the 33rd IEEE International Conference on Data Engineering, 2017

2016
IOStack: Software-Defined Object Storage.
IEEE Internet Comput., 2016

Security intelligence for cloud management infrastructures.
IBM J. Res. Dev., 2016

2015
SDGen: Mimicking Datasets for Content Generation in Storage Benchmarks.
Proceedings of the 13th USENIX Conference on File and Storage Technologies, 2015

2012
Estimation of deduplication ratios in large data sets.
Proceedings of the IEEE 28th Symposium on Mass Storage Systems and Technologies, 2012

2011
Broadcast Encryption.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011


2009
Storage modeling for power estimation.
Proceedings of of SYSTOR 2009: The Israeli Experimental Systems Conference 2009, 2009

Low power mode in cloud storage systems.
Proceedings of the 23rd IEEE International Symposium on Parallel and Distributed Processing, 2009

Authenticity and Provenance in Long Term Digital Preservation: Modeling and Implementation in Preservation Aware Storage.
Proceedings of the First Workshop on the Theory and Practice of Provenance, 2009

2008
Preservation DataStores: New storage paradigm for preservation environments.
IBM J. Res. Dev., 2008

The ANSI T10 object-based storage standard and current implementations.
IBM J. Res. Dev., 2008


2007
The need for preservation aware storage: a position paper.
ACM SIGOPS Oper. Syst. Rev., 2007

Capability based Secure Access Control to Networked Storage Devices.
Proceedings of the 24th IEEE Conference on Mass Storage Systems and Technologies (MSST 2007), 2007

Preservation DataStores: Architecture for Preservation Aware Storage.
Proceedings of the 24th IEEE Conference on Mass Storage Systems and Technologies (MSST 2007), 2007

2005
Broadcast Encryption.
Proceedings of the Encyclopedia of Cryptography and Security, 2005

One-Time Signatures Revisited: Have They Become Practical?
IACR Cryptol. ePrint Arch., 2005

Enforcing Confinement in Distributed Storage and a Cryptographic Model for Access Control.
IACR Cryptol. ePrint Arch., 2005

Toward securing untrusted storage without public-key operations.
Proceedings of the 2005 ACM Workshop On Storage Security And Survivability, 2005

The OSD Security Protocol.
Proceedings of the 3rd International IEEE Security in Storage Workshop (SISW 2005), 2005

Benchmarking and Testing OSD for Correctness and Compliance.
Proceedings of the Hardware and Software Verification and Testing, 2005

2003
Protecting Cryptographic Keys: The Trace-and-Revoke Approach.
IEEE Computer, 2003

Towards an Object Stor.
Proceedings of the 20th IEEE/11th NASA Goddard Conference on Mass Storage Systems and Technologies, 2003

2002
Revocation and Tracing Schemes for Stateless Receivers
Electronic Colloquium on Computational Complexity (ECCC), 2002

A Two Layered Approach for Securing an Object Store Network.
Proceedings of the First International IEEE Security in Storage Workshop, 2002

2000
Access Control Meets Public Key Infrastructure, Or: Assigning Roles to Strangers.
Proceedings of the 2000 IEEE Symposium on Security and Privacy, 2000

Clock synchronization with faults and recoveries (extended abstract).
Proceedings of the Nineteenth Annual ACM Symposium on Principles of Distributed Computing, 2000

1999
The Proactive Security Toolkit and Applications.
Proceedings of the CCS '99, 1999

1998
Surf'N'Sign: Client Signatures on Web Documents.
IBM Syst. J., 1998

1997
A Fast Algorithm for Optimally Increasing the Edge Connectivity.
SIAM J. Comput., 1997

1994
On Near-Optimal Alignments of Biological Sequences.
J. Comput. Biol., 1994

Parametric Optimization of Sequence Alignment.
Algorithmica, 1994

1993
Extracting Maximal Information About Sets of Minimum Cuts.
Algorithmica, 1993

On Suboptimal Alignments of Biological Sequences.
Proceedings of the Combinatorial Pattern Matching, 4th Annual Symposium, 1993

1991
Efficient algorithms for generalized cut-trees.
Networks, 1991

Performance of Priority Queue Structures in a Virtual Memory Environment.
Comput. J., 1991

Representing and Enumerating Edge Connectivity Cuts in RNC.
Proceedings of the Algorithms and Data Structures, 1991

1990
Deductive Databases for Genomic Mapping (Extended Abstract).
Proceedings of the Workshop on Deductive Databases held in conjunction with the North American Conference on Logic Programming, 1990


  Loading...