期刊文献+

基于文件的软件快照的实现 被引量:1

The Implementation of Software Snapshot Based on File
下载PDF
导出
摘要 快照技术是当今非常流行的一种备份技术,可以很好地保证数据的完整性,但目前常用的快照技术存在一定的问题,笔者通过研究,提出了一种基于文件的软件快照算法,对快照的实现进行了改进。该算法将所有的快照指针信息集中到一个指针树上进行集中管理,实现了文件级的快照。 The snapshot is a popular backup technique,which can assure the data's integrity,but there are some questions in the technique.From study,the author suggests a new algorithm which is based file to realize snapshot.Tile algorithm use pointer tree to centralized manage all pointer so it has realized the snapshot based on file.
出处 《计算机工程与应用》 CSCD 北大核心 2006年第8期168-169,共2页 Computer Engineering and Applications
关键词 快照 备份 算法 snapshot, backup, algorithm
  • 相关文献

参考文献4

  • 1Tom Clark.IP SANs:a Guide to iSCSI,iFCP,and FCIP Protocols for Storage Area Networks[M].Pearson Education,2003-08
  • 2Richard Barker,Paul Massiglia.Storage Area Network Essentials[M].John Wiley&Sons,2004-07
  • 3Marc Farley.Building Storage Network[M].Second Edition,McGrawHill,2002-04
  • 4Robert Spalding.Storage Networks:the Complete Reference[M].McGrawHill,2004-05

同被引文献18

  • 1莫翾晟,林和,蔡万景,刘芳,李永礼.基于RSA算法与自修改机制的软件保护[J].计算机研究与发展,2006,43(z2):140-144. 被引量:3
  • 2沈海波,史毓达.软件代码的防篡改技术[J].武汉科技学院学报,2004,17(5):64-67. 被引量:7
  • 3孙玉霞,陈火炎.UNIX主机文件完整性校验工具的原理与实现[J].计算机应用与软件,2006,23(6):119-120. 被引量:3
  • 4徐海银,董九山,李丹.一种改进的软件加密自检测防篡改技术[J].信息安全与通信保密,2007,29(3):87-88. 被引量:4
  • 5Hoi Chang, Mikhail J Atallah. Protecting software code by guards[ C]//Revised Papers from the ACM CCS-8 Workshop on Security and Privacy in Digital Rights Management. 2002 : 160-175.
  • 6Dong Zhang. Checking Primitives with Guards [ D ]. University of Auckland,2005.
  • 7Sudeep Ghosh, Jason D Hiser, Jack W Davidson. A secure and robust approach to software tamper resistance [ C ]// Proceedings of the 12th International Conference on Information Hiding. 2010:33-47.
  • 8Homing James J, Sibert W Olin, Tarjan Robert E, et al. Software Self-defense Systems and Methods: USA, 7430670 [ P]. 2008-09-30.
  • 9Eric D Bryant, Avni H Rambhia, Mikhail J Atallah, et al. Software Trusted Platform Module and Application Securitr Wrapper: USA,7870399 [ P ]. 2011-01-11.
  • 10Moti Yung. How to guard the guards themselves [ C ]//Proceedings of the 17th International Conference on Fundamentals of Computation Theory. 2009 : 1-2.

引证文献1

二级引证文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部