Author of the publication

POTSHARDS: Secure Long-Term Storage Without Encryption.

, , , and . USENIX Annual Technical Conference, page 142-156. USENIX, (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Voruganti, Kaladhar
add a person with the name Voruganti, Kaladhar
 

Other publications of authors with the same name

A Hybrid Access Model for Storage Area Networks., , , , and . MSST, page 181-188. IEEE Computer Society, (2005)Fido: Fast Inter-Virtual-Machine Communication for Enterprise Appliances., , , , and . USENIX Annual Technical Conference, USENIX Association, (2009)POTSHARDS: Secure Long-Term Storage Without Encryption., , , and . USENIX Annual Technical Conference, page 142-156. USENIX, (2007)Policy-Based Validation of SAN Configuration., , , , and . POLICY, page 77-86. IEEE Computer Society, (2004)Storage Over IP: When Does Hardware Support Help?, , and . FAST, USENIX, (2003)Zodiac: Efficient Impact Analysis for Storage Area Networks., , and . FAST, USENIX, (2005)SWEEPER: An Efficient Disaster Recovery Point Identification Mechanism., , , and . FAST, page 297-312. USENIX, (2008)Cooperative Storage-Level De-duplication for I/O Reduction in Virtualized Data Centers., , , , and . MASCOTS, page 209-218. IEEE Computer Society, (2012)Responding rapidly to service level violations using virtual appliances., , , , and . Operating Systems Review, 46 (3): 32-40 (2012)Storage Access Models.. Encyclopedia of Database Systems (2nd ed.), Springer, (2018)