{"id":"https://openalex.org/W2110464544","doi":"https://doi.org/10.1145/1103780.1103791","title":"Secure capabilities for a petabyte-scale object-based distributed file system","display_name":"Secure capabilities for a petabyte-scale object-based distributed file system","publication_year":2005,"publication_date":"2005-11-11","ids":{"openalex":"https://openalex.org/W2110464544","doi":"https://doi.org/10.1145/1103780.1103791","mag":"2110464544"},"language":"en","primary_location":{"id":"doi:10.1145/1103780.1103791","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1103780.1103791","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2005 ACM workshop on Storage security and survivability","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5109870249","display_name":"Christopher Olson","orcid":null},"institutions":[{"id":"https://openalex.org/I185103710","display_name":"University of California, Santa Cruz","ror":"https://ror.org/03s65by71","country_code":"US","type":"education","lineage":["https://openalex.org/I185103710"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Christopher Olson","raw_affiliation_strings":["University of California, Santa Cruz","University of California/Santa Cruz"],"affiliations":[{"raw_affiliation_string":"University of California, Santa Cruz","institution_ids":["https://openalex.org/I185103710"]},{"raw_affiliation_string":"University of California/Santa Cruz","institution_ids":["https://openalex.org/I185103710"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5026954004","display_name":"Ethan L. Miller","orcid":"https://orcid.org/0000-0003-2994-9060"},"institutions":[{"id":"https://openalex.org/I185103710","display_name":"University of California, Santa Cruz","ror":"https://ror.org/03s65by71","country_code":"US","type":"education","lineage":["https://openalex.org/I185103710"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Ethan L. Miller","raw_affiliation_strings":["University of California, Santa Cruz","University of California/Santa Cruz"],"affiliations":[{"raw_affiliation_string":"University of California, Santa Cruz","institution_ids":["https://openalex.org/I185103710"]},{"raw_affiliation_string":"University of California/Santa Cruz","institution_ids":["https://openalex.org/I185103710"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5109870249"],"corresponding_institution_ids":["https://openalex.org/I185103710"],"apc_list":null,"apc_paid":null,"fwci":2.3359,"has_fulltext":false,"cited_by_count":20,"citation_normalized_percentile":{"value":0.90152477,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"64","last_page":"73"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11181","display_name":"Advanced Data Storage Technologies","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11181","display_name":"Advanced Data Storage Technologies","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10742","display_name":"Peer-to-Peer Network Technologies","score":0.9977999925613403,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11478","display_name":"Caching and Content Delivery","score":0.9973999857902527,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8587621450424194},{"id":"https://openalex.org/keywords/ssh-file-transfer-protocol","display_name":"SSH File Transfer Protocol","score":0.7410667538642883},{"id":"https://openalex.org/keywords/network-file-system","display_name":"Network File System","score":0.6870325803756714},{"id":"https://openalex.org/keywords/torrent-file","display_name":"Torrent file","score":0.6003190279006958},{"id":"https://openalex.org/keywords/file-system","display_name":"File system","score":0.5955042839050293},{"id":"https://openalex.org/keywords/self-certifying-file-system","display_name":"Self-certifying File System","score":0.5897232890129089},{"id":"https://openalex.org/keywords/file-server","display_name":"File server","score":0.5432270169258118},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.5369211435317993},{"id":"https://openalex.org/keywords/object-storage","display_name":"Object storage","score":0.5368455052375793},{"id":"https://openalex.org/keywords/bottleneck","display_name":"Bottleneck","score":0.49665313959121704},{"id":"https://openalex.org/keywords/file-system-fragmentation","display_name":"File system fragmentation","score":0.48095980286598206},{"id":"https://openalex.org/keywords/server","display_name":"Server","score":0.4590747058391571},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.4552002549171448},{"id":"https://openalex.org/keywords/bittorrent-tracker","display_name":"BitTorrent tracker","score":0.4406145215034485},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.4311002194881439},{"id":"https://openalex.org/keywords/distributed-file-system","display_name":"Distributed File System","score":0.42670416831970215},{"id":"https://openalex.org/keywords/file-transfer","display_name":"File transfer","score":0.42379218339920044},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.41637110710144043},{"id":"https://openalex.org/keywords/journaling-file-system","display_name":"Journaling file system","score":0.39699652791023254},{"id":"https://openalex.org/keywords/computer-file","display_name":"Computer file","score":0.3885931074619293},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3750282824039459},{"id":"https://openalex.org/keywords/computer-data-storage","display_name":"Computer data storage","score":0.1859273910522461},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.11944401264190674},{"id":"https://openalex.org/keywords/transfer","display_name":"Transfer (computing)","score":0.10253462195396423}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8587621450424194},{"id":"https://openalex.org/C88520388","wikidata":"https://www.wikidata.org/wiki/Q1126823","display_name":"SSH File Transfer Protocol","level":4,"score":0.7410667538642883},{"id":"https://openalex.org/C64448361","wikidata":"https://www.wikidata.org/wiki/Q623494","display_name":"Network File System","level":5,"score":0.6870325803756714},{"id":"https://openalex.org/C40350719","wikidata":"https://www.wikidata.org/wiki/Q2451637","display_name":"Torrent file","level":4,"score":0.6003190279006958},{"id":"https://openalex.org/C2780940931","wikidata":"https://www.wikidata.org/wiki/Q174989","display_name":"File system","level":2,"score":0.5955042839050293},{"id":"https://openalex.org/C82820731","wikidata":"https://www.wikidata.org/wiki/Q2640620","display_name":"Self-certifying File System","level":3,"score":0.5897232890129089},{"id":"https://openalex.org/C4373008","wikidata":"https://www.wikidata.org/wiki/Q513349","display_name":"File server","level":2,"score":0.5432270169258118},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.5369211435317993},{"id":"https://openalex.org/C56640594","wikidata":"https://www.wikidata.org/wiki/Q7075068","display_name":"Object storage","level":3,"score":0.5368455052375793},{"id":"https://openalex.org/C2780513914","wikidata":"https://www.wikidata.org/wiki/Q18210350","display_name":"Bottleneck","level":2,"score":0.49665313959121704},{"id":"https://openalex.org/C26656859","wikidata":"https://www.wikidata.org/wiki/Q4089244","display_name":"File system fragmentation","level":4,"score":0.48095980286598206},{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.4590747058391571},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.4552002549171448},{"id":"https://openalex.org/C57501372","wikidata":"https://www.wikidata.org/wiki/Q2021268","display_name":"BitTorrent tracker","level":3,"score":0.4406145215034485},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.4311002194881439},{"id":"https://openalex.org/C152043487","wikidata":"https://www.wikidata.org/wiki/Q1229600","display_name":"Distributed File System","level":2,"score":0.42670416831970215},{"id":"https://openalex.org/C2776162994","wikidata":"https://www.wikidata.org/wiki/Q534400","display_name":"File transfer","level":3,"score":0.42379218339920044},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.41637110710144043},{"id":"https://openalex.org/C2225880","wikidata":"https://www.wikidata.org/wiki/Q579047","display_name":"Journaling file system","level":3,"score":0.39699652791023254},{"id":"https://openalex.org/C95637964","wikidata":"https://www.wikidata.org/wiki/Q82753","display_name":"Computer file","level":2,"score":0.3885931074619293},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3750282824039459},{"id":"https://openalex.org/C194739806","wikidata":"https://www.wikidata.org/wiki/Q66221","display_name":"Computer data storage","level":2,"score":0.1859273910522461},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.11944401264190674},{"id":"https://openalex.org/C2776175482","wikidata":"https://www.wikidata.org/wiki/Q1195816","display_name":"Transfer (computing)","level":2,"score":0.10253462195396423},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.0},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0},{"id":"https://openalex.org/C56461940","wikidata":"https://www.wikidata.org/wiki/Q970687","display_name":"Eye tracking","level":2,"score":0.0},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/1103780.1103791","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1103780.1103791","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2005 ACM workshop on Storage security and survivability","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":30,"referenced_works":["https://openalex.org/W29033842","https://openalex.org/W100863554","https://openalex.org/W1506798342","https://openalex.org/W1530504482","https://openalex.org/W1546459331","https://openalex.org/W1572593068","https://openalex.org/W1782674917","https://openalex.org/W1972234887","https://openalex.org/W1976666123","https://openalex.org/W2005373714","https://openalex.org/W2084445812","https://openalex.org/W2101871993","https://openalex.org/W2104112849","https://openalex.org/W2114167330","https://openalex.org/W2114349788","https://openalex.org/W2123438830","https://openalex.org/W2131287008","https://openalex.org/W2137808089","https://openalex.org/W2146749986","https://openalex.org/W2157737097","https://openalex.org/W2166030019","https://openalex.org/W2167263255","https://openalex.org/W4225591807","https://openalex.org/W4232342695","https://openalex.org/W4254234063","https://openalex.org/W6604066429","https://openalex.org/W6631545697","https://openalex.org/W6671597114","https://openalex.org/W6675151456","https://openalex.org/W6677228968"],"related_works":["https://openalex.org/W1572832495","https://openalex.org/W1519208733","https://openalex.org/W4308748977","https://openalex.org/W2581854274","https://openalex.org/W2078994842","https://openalex.org/W2156231852","https://openalex.org/W4389858212","https://openalex.org/W2081559811","https://openalex.org/W2159709327","https://openalex.org/W2124165114"],"abstract_inverted_index":{"Recently,":[0],"the":[1,20,32,113,125,161,176],"Network-Attached":[2],"Secure":[3],"Disk":[4],"(NASD)":[5],"model":[6],"has":[7],"become":[8],"a":[9,36,43,60,76,111,145,151,172,185,200],"more":[10],"widely":[11],"used":[12],"technique":[13],"for":[14,24,65,124,139],"constructing":[15],"large-scale":[16,66],"storage":[17,141],"systems.":[18],"However,":[19],"security":[21,162,198],"system":[22,91],"proposed":[23],"NASD":[25],"assumes":[26],"that":[27],"each":[28,55,166,179],"client":[29],"will":[30,117],"contact":[31],"server":[33,115],"to":[34,38,75,103],"get":[35],"capability":[37],"access":[39],"one":[40],"object":[41],"on":[42],"server.":[44],"While":[45],"this":[46,132],"approach":[47],"works":[48],"well":[49],"in":[50,53,68,143],"smaller-scale":[51],"systems":[52,67,142],"which":[54,69,144],"file":[56,78,90,127,152],"is":[57],"composed":[58,79],"of":[59,71,80,82,87,121,147,165,171,178],"few":[61],"objects,":[62],"it":[63],"fails":[64],"thousands":[70,81,86,120],"clients":[72],"make":[73],"accesses":[74],"single":[77],"objects":[83,100,149],"spread":[84],"across":[85,98],"disks.":[88],"The":[89],"we":[92,134],"are":[93,156],"building,":[94],"Ceph,":[95],"distributes":[96],"files":[97],"many":[99],"and":[101,106,153,163],"disks":[102],"distribute":[104],"load":[105],"improve":[107],"reliability.":[108],"In":[109],"such":[110],"system,":[112],"metadata":[114],"cluster":[116],"sometimes":[118],"see":[119],"open":[122],"requests":[123],"same":[126],"within":[128],"seconds.":[129],"To":[130],"address":[131],"bottleneck,":[133],"propose":[135],"new":[136],"authentication":[137],"protocols":[138],"object-based":[140],"sequence":[146],"fixed-size":[148],"comprise":[150],"flash":[154],"crowds":[155],"likely.":[157],"We":[158,181],"qualitatively":[159],"evaluated":[160],"risks":[164],"protocol,":[167],"and,":[168],"using":[169,187,202],"traces":[170],"scientific":[173],"application,":[174],"compared":[175],"overhead":[177],"protocol.":[180],"found":[182],"that,":[183],"surprisingly,":[184],"protocol":[186,201],"public":[188],"key":[189,205],"cryptography":[190],"incurred":[191],"little":[192],"extra":[193],"cost":[194],"while":[195],"providing":[196],"greater":[197],"than":[199],"only":[203],"symmetric":[204],"cryptography.":[206]},"counts_by_year":[{"year":2017,"cited_by_count":1},{"year":2015,"cited_by_count":1},{"year":2012,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
