Skip to main content

Showing 1–10 of 10 results for author: Rosenthal, D S H

.
  1. arXiv:1605.06154  [pdf, other

    cs.DL

    Web Infrastructure to Support e-Journal Preservation (and More)

    Authors: Herbert Van de Sompel, David S. H. Rosenthal, Michael L. Nelson

    Abstract: E-journal preservation systems have to ingest millions of articles each year. Ingest, especially of the "long tail" of journals from small publishers, is the largest element of their cost. Cost is the major reason that archives contain less than half the content they should. Automation is essential to minimize these costs. This paper examines the potential for automation beyond the status quo base… ▽ More

    Submitted 19 May, 2016; originally announced May 2016.

    Comments: 23 pages, 5 figures

    ACM Class: H.3.7

  2. arXiv:cs/0509018  [pdf, ps, other

    cs.DL

    Requirements for Digital Preservation Systems: A Bottom-Up Approach

    Authors: David S. H. Rosenthal, Thomas S. Robertson, Tom Lipkis, Vicky Reich, Seth Morabito

    Abstract: The field of digital preservation is being defined by a set of standards developed top-down, starting with an abstract reference model (OAIS) and gradually adding more specific detail. Systems claiming conformance to these standards are entering production use. Work is underway to certify that systems conform to requirements derived from OAIS. We complement these requirements derived top-down… ▽ More

    Submitted 6 September, 2005; v1 submitted 6 September, 2005; originally announced September 2005.

    ACM Class: H.3.7

  3. arXiv:cs/0508130  [pdf, ps, other

    cs.DL cs.DB cs.OS

    A Fresh Look at the Reliability of Long-term Digital Storage

    Authors: Mary Baker, Mehul Shah, David S. H. Rosenthal, Mema Roussopoulos, Petros Maniatis, TJ Giuli, Prashanth Bungale

    Abstract: Many emerging Web services, such as email, photo sharing, and web site archives, need to preserve large amounts of quickly-accessible data indefinitely into the future. In this paper, we make the case that these applications' demands on large scale storage systems over long time horizons require us to re-evaluate traditional storage system designs. We examine threats to long-lived data from an e… ▽ More

    Submitted 30 August, 2005; originally announced August 2005.

  4. arXiv:cs/0411078  [pdf, ps, other

    cs.DL

    Notes On The Design Of An Internet Adversary

    Authors: David S. H. Rosenthal, Petros Maniatis, Mema Roussopoulos, T. J. Giuli, Mary Baker

    Abstract: The design of the defenses Internet systems can deploy against attack, especially adaptive and resilient defenses, must start from a realistic model of the threat. This requires an assessment of the capabilities of the adversary. The design typically evolves through a process of simulating both the system and the adversary. This requires the design and implementation of a simulated adversary bas… ▽ More

    Submitted 21 November, 2004; originally announced November 2004.

    ACM Class: H.3.7

    Journal ref: Second Annual Adaptive and Resilient Computing Security Workshop, Santa Fe, 2003

  5. arXiv:cs/0411077  [pdf, ps, other

    cs.DL

    Transparent Format Migration of Preserved Web Content

    Authors: David S. H. Rosenthal, Thomas Lipkis, Thomas Robertson, Seth Morabito

    Abstract: The LOCKSS digital preservation system collects content by crawling the web and preserves it in the format supplied by the publisher. Eventually, browsers will no longer understand that format. A process called format migration converts it to a newer format that the browsers do understand. The LOCKSS program has designed and tested an initial implementation of format migration for Web content th… ▽ More

    Submitted 21 November, 2004; originally announced November 2004.

    Comments: 6 pages, 2 figures

    ACM Class: H.5.4; H.3.7

  6. arXiv:cs/0405111  [pdf, ps, other

    cs.CR

    Attrition Defenses for a Peer-to-Peer Digital Preservation System

    Authors: T. J. Giuli, Petros Maniatis, Mary Baker, David S. H. Rosenthal, Mema Roussopoulos

    Abstract: In peer-to-peer systems, attrition attacks include both traditional, network-level denial of service attacks as well as application-level attacks in which malign peers conspire to waste loyal peers' resources. We describe several defenses for LOCKSS, a peer-to-peer digital preservation system, that help ensure that application-level attacks even from powerful adversaries are less effective than… ▽ More

    Submitted 27 November, 2004; v1 submitted 28 May, 2004; originally announced May 2004.

    Comments: 14 pages, 8 figures. version 2: Reworked the paper according to reviews. Expanded the evaluation section with experiments with more AUs

    ACM Class: C.2.4; D.4.6

  7. arXiv:cs/0311017  [pdf, ps, other

    cs.NI cs.AR

    2 P2P or Not 2 P2P?

    Authors: Mema Roussopoulos, Mary Baker, David S. H. Rosenthal, TJ Giuli, Petros Maniatis, Jeff Mogul

    Abstract: In the hope of stimulating discussion, we present a heuristic decision tree that designers can use to judge the likely suitability of a P2P architecture for their applications. It is based on the characteristics of a wide range of P2P systems from the literature, both proposed and deployed.

    Submitted 14 November, 2003; originally announced November 2003.

    Comments: 6 pages, 1 figure

    ACM Class: C.2.4

  8. arXiv:cs/0311005  [pdf, ps, other

    cs.CR cs.DL

    On The Cost Distribution of a Memory Bound Function

    Authors: David S. H. Rosenthal

    Abstract: Memory Bound Functions have been proposed for fighting spam, resisting Sybil attacks and other purposes. A particular implementation of such functions has been proposed in which the average effort required to generate a proof of effort is set by parameters E and l to E * l. The distribution of effort required to generate an individual proof about this average is fairly broad. When particular use… ▽ More

    Submitted 6 November, 2003; originally announced November 2003.

    Comments: 8 pages

    Report number: LOCKSS TR2003-02 ACM Class: D.4.6

  9. arXiv:cs/0303033  [pdf, ps, other

    cs.DC cs.DL

    A Digital Preservation Appliance Based on OpenBSD

    Authors: David S. H. Rosenthal

    Abstract: The LOCKSS program has developed and deployed in a world-wide test a system for preserving access to academic journals published on the Web. The fundamental problem for any digital preservation system is that it must be affordable for the long term. To reduce the cost of ownership, the LOCKSS system uses generic PC hardware, open source software, and peer-to-peer technology. It is packaged as a… ▽ More

    Submitted 21 November, 2004; v1 submitted 30 March, 2003; originally announced March 2003.

    Comments: 12 pages

    ACM Class: D.4.5

    Journal ref: Proceedings of BSDcon, 2003

  10. arXiv:cs/0303026  [pdf, ps, other

    cs.DC cs.DL

    Preserving Peer Replicas By Rate-Limited Sampled Voting in LOCKSS

    Authors: Petros Maniatis, Mema Roussopoulos, TJ Giuli, David S. H. Rosenthal, Mary Baker, Yanto Muliadi

    Abstract: The LOCKSS project has developed and deployed in a world-wide test a peer-to-peer system for preserving access to journals and other archival information published on the Web. It consists of a large number of independent, low-cost, persistent web caches that cooperate to detect and repair damage to their content by voting in "opinion polls." Based on this experience, we present a design for and… ▽ More

    Submitted 17 October, 2003; v1 submitted 25 March, 2003; originally announced March 2003.

    Comments: 25 Pages, 10 figures. Extended version of conference paper

    ACM Class: C.2.4; H.3.7; D.4.5