{"id":"https://openalex.org/W2142117893","doi":"https://doi.org/10.1145/1456469.1456480","title":"Configurable security for scavenged storage systems","display_name":"Configurable security for scavenged storage systems","publication_year":2008,"publication_date":"2008-10-31","ids":{"openalex":"https://openalex.org/W2142117893","doi":"https://doi.org/10.1145/1456469.1456480","mag":"2142117893"},"language":"en","primary_location":{"id":"doi:10.1145/1456469.1456480","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1456469.1456480","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 4th ACM international workshop on Storage security and survivability","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5050450044","display_name":"Abdullah Gharaibeh","orcid":null},"institutions":[{"id":"https://openalex.org/I141945490","display_name":"University of British Columbia","ror":"https://ror.org/03rmrcq20","country_code":"CA","type":"education","lineage":["https://openalex.org/I141945490"]}],"countries":["CA"],"is_corresponding":true,"raw_author_name":"Abdullah Gharaibeh","raw_affiliation_strings":["The University of British Columbia, Vancouver, BC, Canada",", The University of British Columbia, Vancouver, BC, Canada"],"affiliations":[{"raw_affiliation_string":"The University of British Columbia, Vancouver, BC, Canada","institution_ids":["https://openalex.org/I141945490"]},{"raw_affiliation_string":", The University of British Columbia, Vancouver, BC, Canada","institution_ids":["https://openalex.org/I141945490"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5086918800","display_name":"Samer Al-Kiswany","orcid":"https://orcid.org/0000-0002-6429-9983"},"institutions":[{"id":"https://openalex.org/I141945490","display_name":"University of British Columbia","ror":"https://ror.org/03rmrcq20","country_code":"CA","type":"education","lineage":["https://openalex.org/I141945490"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Samer Al-Kiswany","raw_affiliation_strings":["The University of British Columbia, Vancouver, BC, Canada",", The University of British Columbia, Vancouver, BC, Canada"],"affiliations":[{"raw_affiliation_string":"The University of British Columbia, Vancouver, BC, Canada","institution_ids":["https://openalex.org/I141945490"]},{"raw_affiliation_string":", The University of British Columbia, Vancouver, BC, Canada","institution_ids":["https://openalex.org/I141945490"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5088755273","display_name":"Matei Ripeanu","orcid":"https://orcid.org/0000-0001-9839-3866"},"institutions":[{"id":"https://openalex.org/I141945490","display_name":"University of British Columbia","ror":"https://ror.org/03rmrcq20","country_code":"CA","type":"education","lineage":["https://openalex.org/I141945490"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Matei Ripeanu","raw_affiliation_strings":["The University of British Columbia, Vancouver, BC, Canada",", The University of British Columbia, Vancouver, BC, Canada"],"affiliations":[{"raw_affiliation_string":"The University of British Columbia, Vancouver, BC, Canada","institution_ids":["https://openalex.org/I141945490"]},{"raw_affiliation_string":", The University of British Columbia, Vancouver, BC, Canada","institution_ids":["https://openalex.org/I141945490"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5050450044"],"corresponding_institution_ids":["https://openalex.org/I141945490"],"apc_list":null,"apc_paid":null,"fwci":0.7624,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.78322631,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":94,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"55","last_page":"62"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11181","display_name":"Advanced Data Storage Technologies","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11181","display_name":"Advanced Data Storage Technologies","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10715","display_name":"Distributed and Parallel Computing Systems","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10772","display_name":"Distributed systems and fault tolerance","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7756547331809998},{"id":"https://openalex.org/keywords/scalability","display_name":"Scalability","score":0.7313644886016846},{"id":"https://openalex.org/keywords/throughput","display_name":"Throughput","score":0.46124476194381714},{"id":"https://openalex.org/keywords/computer-data-storage","display_name":"Computer data storage","score":0.4610122740268707},{"id":"https://openalex.org/keywords/idle","display_name":"Idle","score":0.45982933044433594},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.4469274878501892},{"id":"https://openalex.org/keywords/cryptographic-protocol","display_name":"Cryptographic protocol","score":0.42180371284484863},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.3725288510322571},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.3512954115867615},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.3383399248123169},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3223380446434021},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.31644105911254883},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.15221834182739258},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.08044818043708801}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7756547331809998},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.7313644886016846},{"id":"https://openalex.org/C157764524","wikidata":"https://www.wikidata.org/wiki/Q1383412","display_name":"Throughput","level":3,"score":0.46124476194381714},{"id":"https://openalex.org/C194739806","wikidata":"https://www.wikidata.org/wiki/Q66221","display_name":"Computer data storage","level":2,"score":0.4610122740268707},{"id":"https://openalex.org/C16320812","wikidata":"https://www.wikidata.org/wiki/Q1812200","display_name":"Idle","level":2,"score":0.45982933044433594},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.4469274878501892},{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.42180371284484863},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3725288510322571},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.3512954115867615},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.3383399248123169},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3223380446434021},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.31644105911254883},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.15221834182739258},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.08044818043708801},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1145/1456469.1456480","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1456469.1456480","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 4th ACM international workshop on Storage security and survivability","raw_type":"proceedings-article"},{"id":"pmh:oai:CiteSeerX.psu:10.1.1.380.7915","is_oa":false,"landing_page_url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.380.7915","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"http://www.ece.ubc.ca/~samera/papers/MosaStoreSec_StorageSS08.pdf","raw_type":"text"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":20,"referenced_works":["https://openalex.org/W1572593068","https://openalex.org/W1994726066","https://openalex.org/W1999984505","https://openalex.org/W2033422105","https://openalex.org/W2104210894","https://openalex.org/W2106539366","https://openalex.org/W2110298485","https://openalex.org/W2111996486","https://openalex.org/W2113959882","https://openalex.org/W2115599946","https://openalex.org/W2117002327","https://openalex.org/W2119565742","https://openalex.org/W2123290358","https://openalex.org/W2139921445","https://openalex.org/W2144554431","https://openalex.org/W2157689518","https://openalex.org/W3023044772","https://openalex.org/W4236672313","https://openalex.org/W4236944670","https://openalex.org/W4238584892"],"related_works":["https://openalex.org/W2974485871","https://openalex.org/W1577119738","https://openalex.org/W2908872315","https://openalex.org/W1600399803","https://openalex.org/W4235210722","https://openalex.org/W4388633481","https://openalex.org/W2994960476","https://openalex.org/W2049601620","https://openalex.org/W2070778588","https://openalex.org/W2109122284"],"abstract_inverted_index":{"Scavenged":[0],"storage":[1,33,58,68],"systems":[2,26,52,69,99],"harness":[3],"unused":[4],"disk":[5],"space":[6],"from":[7],"individual":[8],"workstations":[9],"the":[10,42,47,60,85,105,121,125],"same":[11],"way":[12],"idle":[13,57],"CPU":[14],"cycles":[15],"are":[16],"harnessed":[17],"by":[18,124],"desktop":[19],"grid":[20],"applications":[21],"like":[22],"[email":[23],"protected]":[24],"These":[25],"provide":[27,132],"a":[28,75,94,108,133],"promising":[29],"low":[30],"cost,":[31],"high-performance":[32],"solution":[34],"in":[35,66],"certain":[36],"high-end":[37],"computing":[38],"scenarios.":[39],"However,":[40],"selecting":[41],"security":[43,48,63,81,127,137],"level":[44],"and":[45,89,114,119],"designing":[46],"mechanisms":[49],"for":[50,62,98,117],"such":[51],"is":[53,115],"challenging":[54],"as":[55],"scavenging":[56],"opens":[59],"door":[61],"threats":[64,113],"absent":[65],"traditional":[67],"that":[70,100,110],"use":[71,101],"dedicated":[72],"nodes":[73],"under":[74],"single":[76],"administrative":[77],"domain.":[78],"Moreover,":[79],"increased":[80],"often":[82],"comes":[83],"at":[84],"price":[86],"of":[87,107,135],"performance":[88],"scalability.":[90],"This":[91],"paper":[92],"develops":[93],"general":[95],"threat":[96],"model":[97],"scavenged":[102],"storage,":[103],"presents":[104],"design":[106],"protocol":[109,128],"addresses":[111],"these":[112],"optimized":[116],"throughput,":[118],"evaluates":[120],"overheads":[122],"brought":[123],"new":[126],"when":[129],"configured":[130],"to":[131],"number":[134],"different":[136],"properties.":[138]},"counts_by_year":[{"year":2013,"cited_by_count":2}],"updated_date":"2026-04-04T16:13:02.066488","created_date":"2025-10-10T00:00:00"}
