1 |
R. Kissel, M. Scholl, S. Skolochenko, and X. Li, "Guidelines for Media Sanitization," September 2006, National Institute of Standards and Technology, 2006.
|
2 |
M. Y. C. Wei, L. M. Grupp, F. E. Spada, and S. Swanson, "Reliably Erasing Data From Flash-Based Solid State Drives", 9th USENIX Conference on File and Storage Technologies, Berkeley, CA, USA, pp. 105-117, 2011.
|
3 |
F. C. Botelho, P. Shilane, N. Garg, and W. Hsu, "Memory efficient Sanitization of a Deduplicated Storage System", 11th USENIX Conference on File and Storage Technologies, San Jose, CA, USA, pp. 81-94, 2013.
|
4 |
D. Bhagwat, K. Eshghi, D. D. Long, and M. Lillibridge, "Extreme binning: scalable, parallel deduplication for chunk-based file backup", In Proceedings of the 17th IEEE International Symposium on Modeling, Analysis, and Simulation of Computer and Telecommunication Systems, pp. 1-9, 2009.
|
5 |
Detecting duplicate and near-duplicate files, US Patent 6658423 Issued on December 2, 2003.
|
6 |
D. Harnik, E. Khaitzin, and D. Sotnikov (2016), "Estimating Unseen Deduplication-from Theory to Practice", 14th USENIX Conference on File and Storage Technologies, Santa Clara, CA, USA, pp. 277-290, 2016.
|
7 |
Sung-ouk Jung, and, Hoon Choi, "Performance Analysis of Open Source BasedDistributed Deduplication File System", KIISE Transactions on Computing Practices, Vol.20, No. 12, pp. 623-631, 2014.
DOI
|
8 |
Val Henson, An analysis of compare-by-hash, 9th Workshop on Hot Topics in Operating Systems (HotOS IX), 2003.
|
9 |
D. Meister and A. Brinkmann, "Multi-level Comparison of Data Deduplication in a Backup Scenario", In Proceedings of the 2nd Israeli Experimental Systems Conference (SYSTOR), pp. 8:1-8:12, (2009).
|
10 |
P. Gutmann, "Secure Deletion of Data from Magnetic and Solid-State Memory," USENIX Security Symposium, pp. 77-89, 1996,
|
11 |
D. T. Meyer, and W. J. Bolosky (2011), "A Study of Practical Deduplication", 9th USENIX Conference on File and Storage Technologies, Berkeley, CA, USA, pp. 1-14, 2011.
|