Larry Brumbaugh

Learn More
Application-level survivability, the ability to reconfigure an application to transparently maintain services when part of a system becomes unavailable, is the most flexible and comprehensive approach to supporting mission fulfillment since it can provide assurance over all lower layers within a networked system. We have developed Resumable FTP, an(More)
The popularity of distributed file systems continues to grow. Reasons they are preferred over traditional centralized file systems include fault tolerance, availability, scalability and performance. In addition, peer-to-peer (P2P) system concepts and scalable functions are being incorporated into the domain of file systems. This survey paper explores the(More)
Despite increasingly sophisticated security measures, attackers have continued to find ways to gain access to stored data with impacts including data disclosure, modification, or deletion. There currently exist no tools independent of the operating system to monitor storage status. The authors introduced FABS as a comprehensive tool to monitor storage for(More)
Tamper-resistant storage techniques provide varying degrees of authenticity and integrity for data. This paper surveys five implemented tamper-resistant storage systems that use encryption, cryptographic hashes, digital signatures and error-correction primitives to provide varying levels of data protection. Five key evaluation points for such systems are:(More)
Protecting multimedia data from malicious computer users continues to grow in importance. Whether preventing unauthorized access to digital photographs, ensuring compliance with copyright regulations, or guaranteeing the integrity of a video teleconference, all multimedia applications require increased security in the presence of talented intruders.(More)
Periodic data backup is a system administration requirement that has changed as wireless machines have altered the fundamental structure of networks. These changes necessitate a complete rethinking of modern network backup strategies. The approaches of the 1980's and 1990's are no longer sufficient and must be updated. In addition to standard backup(More)
Modern storage systems are responsible for increasing amounts of data and the value of the data itself is growing in importance. Several primary storage system solutions have emerged for the protection of data: (1) Secure Storage through Cryptography, (2) Backup and Versioning Systems, (3) Immutable and Tamper-Proof Storage, and (4) Redundant Storage. Using(More)
PingTV generates a logical map of a network that is used as an overlay on a physical geographical image of the location from the user perspective (buildings, floors within buildings, etc.). PingTV is used at Illinois State University as a visualization tool to communicate real-time network conditions to the university community via a dedicated channel on(More)
Security of storage and archival systems has become increasingly important in recent years. Due to the increased vulnerability of the existing systems and the need to comply with government regulations, different methods have been explored to create a secure storage system. One of the primary problems to ensuring the integrity of storage systems is to make(More)