Dalit Naor

According to our database1, Dalit Naor authored at least 43 papers between 1990 and 2017.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2017
Too Big to Eat: Boosting Analytics Data Ingestion from Object Stores with Scoop.
Proceedings of the 33rd IEEE International Conference on Data Engineering, 2017

2016
IOStack: Software-Defined Object Storage.
IEEE Internet Computing, 2016

Security intelligence for cloud management infrastructures.
IBM Journal of Research and Development, 2016

2015
SDGen: Mimicking Datasets for Content Generation in Storage Benchmarks.
Proceedings of the 13th USENIX Conference on File and Storage Technologies, 2015

2012
Estimation of deduplication ratios in large data sets.
Proceedings of the IEEE 28th Symposium on Mass Storage Systems and Technologies, 2012

2011
Broadcast Encryption.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011


2009
Storage modeling for power estimation.
Proceedings of of SYSTOR 2009: The Israeli Experimental Systems Conference 2009, 2009

Low power mode in cloud storage systems.
Proceedings of the 23rd IEEE International Symposium on Parallel and Distributed Processing, 2009

Authenticity and Provenance in Long Term Digital Preservation: Modeling and Implementation in Preservation Aware Storage.
Proceedings of the First Workshop on the Theory and Practice of Provenance, 2009

2008
Preservation DataStores: New storage paradigm for preservation environments.
IBM Journal of Research and Development, 2008

The ANSI T10 object-based storage standard and current implementations.
IBM Journal of Research and Development, 2008

Towards Knowledge in the Cloud.
Proceedings of the On the Move to Meaningful Internet Systems: OTM 2008 Workshops, 2008

2007
The need for preservation aware storage: a position paper.
Operating Systems Review, 2007

Capability based Secure Access Control to Networked Storage Devices.
Proceedings of the 24th IEEE Conference on Mass Storage Systems and Technologies (MSST 2007), 2007

Preservation DataStores: Architecture for Preservation Aware Storage.
Proceedings of the 24th IEEE Conference on Mass Storage Systems and Technologies (MSST 2007), 2007

2005
One-Time Signatures Revisited: Have They Become Practical?
IACR Cryptology ePrint Archive, 2005

Enforcing Confinement in Distributed Storage and a Cryptographic Model for Access Control.
IACR Cryptology ePrint Archive, 2005

Toward securing untrusted storage without public-key operations.
Proceedings of the 2005 ACM Workshop On Storage Security And Survivability, 2005

The OSD Security Protocol.
Proceedings of the 3rd International IEEE Security in Storage Workshop (SISW 2005), 2005

Benchmarking and Testing OSD for Correctness and Compliance.
Proceedings of the Hardware and Software Verification and Testing, 2005

2003
Protecting Cryptographic Keys: The Trace-and-Revoke Approach.
IEEE Computer, 2003

Towards an Object Stor.
Proceedings of the 20th IEEE/11th NASA Goddard Conference on Mass Storage Systems and Technologies, 2003

2002
Revocation and Tracing Schemes for Stateless Receivers
Electronic Colloquium on Computational Complexity (ECCC), 2002

A Two Layered Approach for Securing an Object Store Network.
Proceedings of the First International IEEE Security in Storage Workshop, 2002

2001
Revocation and Tracing Schemes for Stateless Receivers.
IACR Cryptology ePrint Archive, 2001

Revocation and Tracing Schemes for Stateless Receivers.
Proceedings of the Advances in Cryptology, 2001

2000
Access Control Meets Public Key Infrastructure, Or: Assigning Roles to Strangers.
Proceedings of the 2000 IEEE Symposium on Security and Privacy, 2000

Clock synchronization with faults and recoveries (extended abstract).
Proceedings of the Nineteenth Annual ACM Symposium on Principles of Distributed Computing, 2000

1999
The Proactive Security Toolkit and Applications.
Proceedings of the CCS '99, 1999

1998
Surf'N'Sign: Client Signatures on Web Documents.
IBM Systems Journal, 1998

1997
A Fast Algorithm for Optimally Increasing the Edge Connectivity.
SIAM J. Comput., 1997

1994
On Near-Optimal Alignments of Biological Sequences.
Journal of Computational Biology, 1994

Parametric Optimization of Sequence Alignment.
Algorithmica, 1994

1993
Extracting Maximal Information About Sets of Minimum Cuts.
Algorithmica, 1993

On Suboptimal Alignments of Biological Sequences.
Proceedings of the Combinatorial Pattern Matching, 4th Annual Symposium, 1993

1992
Parametric Optimization of Sequence Alignment.
Proceedings of the Third Annual ACM/SIGACT-SIAM Symposium on Discrete Algorithms, 1992

1991
Efficient algorithms for generalized cut-trees.
Networks, 1991

Performance of Priority Queue Structures in a Virtual Memory Environment.
Comput. J., 1991

Representing and Enumerating Edge Connectivity Cuts in RNC.
Proceedings of the Algorithms and Data Structures, 1991

1990
Efficient Algorithms for Generalized Cut Trees.
Proceedings of the First Annual ACM-SIAM Symposium on Discrete Algorithms, 1990

A Fast Algorithm for Optimally Increasing the Edge-Connectivity
Proceedings of the 31st Annual Symposium on Foundations of Computer Science, 1990

Deductive Databases for Genomic Mapping (Extended Abstract).
Proceedings of the Workshop on Deductive Databases held in conjunction with the North American Conference on Logic Programming, 1990


  Loading...