Compliance in a network memory architecture

作者: David Hughes

DOI:

关键词: Store instructionComputer hardwareMemory architectureProcess (computing)Computer scienceEncryption

摘要: A network memory system for ensuring compliance is disclosed. The comprises a first appliance configured to encrypt data, store the encrypted data in device. also determines whether exists second and transmits instruction comprising based on determination that does not exist receive from further retrieve an index at which stored, process obtain response decrypt data.

参考文章(94)
Doron Ben-Yehezkel, Scalable server clustering ,(2001)
Shiwen Chen, Wing Yuen, Harumine Yoshiba, King Huang, Link duration based routing protocol for multihop ad hoc networks ,(2006)
Alan Kavanagh, Mathieu Giguere, Secure signature in GPRS tunnelling protocol (GTP) ,(2003)
Amod Prabhakar Bodas, David Allan Higgen, Peter Kingsley Craft, Tarun Kumar Tripathy, Clive Mathew Philbrick, Edward John Row, Murali Sundaramoorthy Repakula, Daniel Murray Jones, Paul Popelka, Leslie Thomas McCutcheon, Richard Allen Walter, Donald Wayne Sterk, Lakshman Narayanaswamy, Paul Brian Del Fante, Processing system with dynamically allocatable buffer memory ,(1997)
Mark E. Crovella, Lynne M. Murach, Azer Bestavros, Vitaly S. Revsin, Vijay R. Basani, Leroy R. Karge, Domenic J. Larosa, Krishna Mangiapudi, Method and apparatus for reliable and scalable distribution of data files in distributed networks ,(2001)