Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Naor, Dalit
add a person with the name Naor, Dalit
 

Other publications of authors with the same name

Extracting Maximal Information About Sets of Minimum Cuts., and . Algorithmica, 10 (1): 64-89 (1993)The ANSI T10 object-based storage standard and current implementations., , , , , , and . IBM Journal of Research and Development, 52 (4-5): 401-412 (2008)Preservation DataStores: New storage paradigm for preservation environments., , , , , , , and . IBM Journal of Research and Development, 52 (4-5): 389-400 (2008)Efficient algorithms for generalized cut-trees., and . Networks, 21 (5): 505-520 (1991)A Two Layered Approach for Securing an Object Store Network., , , , , , , , and . IEEE Security in Storage Workshop, page 10-23. IEEE Computer Society, (2002)Security intelligence for cloud management infrastructures., , , , , , , , and . IBM Journal of Research and Development, 60 (4): 11 (2016)IOStack: Software-Defined Object Storage., , , , , , , , , and 1 other author(s). IEEE Internet Comput., 20 (3): 10-18 (2016)SDGen: Mimicking Datasets for Content Generation in Storage Benchmarks., , , , , and . FAST, page 317-330. USENIX Association, (2015)Access Control Meets Public Key Infrastructure, Or: Assigning Roles to Strangers., , , , and . IEEE Symposium on Security and Privacy, page 2-14. IEEE Computer Society, (2000)Preservation DataStores: Architecture for Preservation Aware Storage., , , , , , and . MSST, page 3-15. IEEE Computer Society, (2007)