skip to main content
article

Complete delete vs. time machine computing

Published:01 January 2007Publication History
Skip Abstract Section

Abstract

Users are increasingly demanding two contradictory system properties - the ability to absolutely, positively erase information so that it cannot be recovered, and the ability to recover information that was inadvertently or intentionally altered or deleted. Storage system designers now need to resolve the tension between complete delete and time machine computing.

References

  1. Boneh, D. and Lipton, R., "A Revocable Backup System," Department of Computer Science, Princeton University, Princeton, NJ.Google ScholarGoogle Scholar
  2. Decru, Inc., "Decru Ships Decru DataFort T520 Security Appliances to Secure Data for Tape Backup," Decru Press Release, December 8, 2003.Google ScholarGoogle Scholar
  3. Garfinkel, S. "Design Principles and Patterns for Computer Systems That Are Simultaneously Secure and Usable," PhD Thesis, Massachusetts Institute of Technology, June 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Garfinkel, S., and Shelat, A., "Remembrance of Data Passed: A Study of Disk Sanitization Practices," IEEE Security and Privacy, January/February 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Hartman, P., Bezos, J., Kaphan, S., Spiegel, J., "Method and System for Placing A Purchase Order Via a Communications Network," US Patent 5,960,441, filed September 12, 1997, granted September 28, 1999.Google ScholarGoogle Scholar
  6. Kissel, R., Scholl, M., Skolochenko, S. and Li, X., "Guidelines for Media Sanitization," NIST Special Publication 800--88, September 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Norman, D. "Design rules based on analyses of human error." Communications of the ACM, 26(4), April 1983. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Rekimoto, J., "Time-machine computing: a time-centric approach for the information environment," 12th ACM Symposium on User Interface Software and Technology, Asheville, NC, 1999, pp. 45--54. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Seagate, "DriveTrust --- FAQs," October 31, 2006.Google ScholarGoogle Scholar

Index Terms

  1. Complete delete vs. time machine computing

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in

        Full Access

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader