Call for Papers - Ongoing round of submission, notification and publication.
    
  
Home    |    Login or Register    |    Contact CSC
By Title/Keywords/Abstract   By Author
Browse CSC-OpenAccess Library.
  • HOME
  • LIST OF JOURNALS
  • AUTHORS
  • EDITORS & REVIEWERS
  • LIBRARIANS & BOOK SELLERS
  • PARTNERSHIP & COLLABORATION
Home   >   CSC-OpenAccess Library   >    Manuscript Information
Full Text Available
(no registration required)

(289.31KB)


-- CSC-OpenAccess Policy
-- Creative Commons Attribution NonCommercial 4.0 International License
>> COMPLETE LIST OF JOURNALS

EXPLORE PUBLICATIONS BY COUNTRIES

EUROPE
MIDDLE EAST
ASIA
AFRICA
.............................
United States of America
United Kingdom
Canada
Australia
Italy
France
Brazil
Germany
Malaysia
Turkey
China
Taiwan
Japan
Saudi Arabia
Jordan
Egypt
United Arab Emirates
India
Nigeria
Black Box Backup System
iyad Ahmad Aldasouqi, Arafat Awajan
Pages - 368 - 375     |    Revised - 01-07-2011     |    Published - 05-08-2011
Published in International Journal of Computer Science and Security (IJCSS)
Volume - 5   Issue - 3    |    Publication Date - July / August 2011  Table of Contents
MORE INFORMATION
References   |   Abstracting & Indexing
KEYWORDS
Black Box, Backup, Network Backup System, Mirroring, RAID
ABSTRACT
Modern organizations from different sizes (Small, , Medium and Large) consider information as one of the most important of their assets that need to be secured against increasing number of threats. The importance of the information comes from its impacts on the main tasks performed by the organization. The evolution of Information Technology and Information Systems is changing permanently the characteristics and the components of such systems and the ways needed to protect them against any security risk. Periodic data backup is a system administration task that has changed as new technologies have altered the fundamental structure of networks. These changes encourage rethinking of modern backup strategies and techniques. In addition, standard backup programs and specialized tools are often needed. This paper provides an overview of issues to be considered for a long term, stable and secure backup system. A new approach (Hardware) called Black Box backup system is proposed based on current risk management plans and procedures used mainly in the aerospace industry.
ABSTRACTING & INDEXING
1 Google Scholar 
2 Academic Journals Database 
3 CiteSeerX 
4 refSeek 
5 Libsearch 
6 Bielefeld Academic Search Engine (BASE) 
7 Scribd 
8 SlideShare 
9 PdfSR 
REFERENCES
A. Fox, S. D. Gribble, Y. Chawathe, E. A. Brewer, and P. Gauthier. Cluster-based scalable network services. Symposium on Operating Systems Principles, pages 78–91, 1997.
D. A. Patterson, G. Gibson, and R. H. Katz. A case for redundant arrays of inexpensive disks (raid). Proceedings of the 1988 ACM SIGMOD international conference on Management of data, pages 109–116, jun 1988.
da Silva, J., and O. Guomundsson, ‘‘The Amanda Network Backup Manager,’’ Proceedings of the Seventh Large Installation Systems Administration Conference (LISA), November 1993.
Dantz, Dantz Retrospect – Intelligent Backup and Restore, http://www.nwfusion.com/whitepapers/dantz/whitepaper.html , June 2004.
Frisch, Æleen, Essential System Administration Third Edition, O’Reilly & Associates, 2002.
Frisch, Æleen, Essential System Administration Third Edition, O’Reilly & Associates, 2002.
IBM Software, IBM Storage Management Solutions, http://www.nasi.com/tivoli_backuprecovery.htm , 2004.
Iyad Aldasouqi, Adnan Shaout, Earthquake Monitoring System Using Ranger Seismometer Sensor, INTERNATIONAL JOURNAL of GEOLOGY, Issue 1, Volume 3, 2009
Iyad Aldasouqi, Jalal Atoum, Stream Processing Environmental Applications in Jordan Valley, Computer Science Journals, 2010.
Legato Software, Legato Networker, http://www. legato.com/products/networker/
M. Rosenblum and J. K. Ousterhout. The design and implementation of a log-structured file system. ACM Trans. Comput. Syst., pages 26–52, 1992.
NISHIMURA Satoshi, SANO Mutsuo, IKEDA Katsuo, The design and implementation of an extensible network backup system in real-time, Proceeding ICUIMC '09 Proceedings of the 3rd International Conference on Ubiquitous Information Management and Communication
Preston, W. Curtis, Unix Backup and Recovery, O’Reilly and Associates, 1999.
S. Shim, W. Lee, and C. Park. An efficient snapshot technique for ext3 file system in linux 2.6. realtime linux foundation(RTLW), Nov. 2005.
Spafford, Eugene H., ‘‘An Analysis of the Internet Worm,’’ Proc. European Software Engineering Conference, September 1989.
Staniford, Stuart, Vern Paxson, and Nicholas Weaver, ‘‘How to Own the Internet in Your Spare Time,’’ USENIX Security Symposium, August 2002.
The AMANDA Homepage, http://www.amanda.org .
V. S. Pai, M. Aron, G. Banga, M. Svendsen, P. Druschel, W. Zwaenepoel, and E. Nahum. Locality-aware request distribution in cluster-based network servers. SIGOPS Oper. Syst. Rev., pages 205–216, 1998.
www.adaptec.com
www.ni.com/dataacquisition/
MANUSCRIPT AUTHORS
Mr. iyad Ahmad Aldasouqi
RSS - Jordan
iyad@rss.gov.jo
Dr. Arafat Awajan
PSUT - Jordan


CREATE AUTHOR ACCOUNT
 
LAUNCH YOUR SPECIAL ISSUE
View all special issues >>
 
PUBLICATION VIDEOS
 
You can contact us anytime since we have 24 x 7 support.
Join Us|List of Journals|
    
Copyrights © 2025 Computer Science Journals (CSC Journals). All rights reserved. Privacy Policy | Terms of Conditions