[1] | Wheatman Vic, Scott Donna, Witty Roberta. Aftermath: business continuity planning . 2001.
|
[2] | 国务院信息化工作办公室. 重要信息系统灾难恢复指南[Z]. 北京: 国务院信息化办公室, 2005.
|
[3] | GB/T 20988—2007. 信息安全技术——信息系统灾难恢复规范[S]. 北京: 中国标准出版社, 2007.
|
[4] | H Garcia-Molina, CA Polyzois. Issues in disaster recovery // Thirty-Fifth IEEE Computer Society International Conference. San Francisco: IEEE Press, 1990:573-577.
|
[5] | 中国人民银行总行. 中国人民银行关于加强银行数据集中安全工作的指导意见[Z]. 北京: 中国人民银行总行, 2002.
|
[6] | Wiboonrat M, Kosavisutte K. Optimization strategy for disaster recovery //Fourth IEEE International Conference on Management of Innovation and Technology. Bangkok:IEEE Press, 2008: 675-680.
|
[7] | Wiboonrat M. An empirical IT contingency planning model for disaster recovery strategy selection // IEEE International Engineering Management Conference. Estoril:IEEE Press, 2008: 1-5.
|
[8] | 袁晓铭, 林安. 几种主流快照技术的分析比较[J]. 微处理机, 2008(1): 127-130. Yuan Xiaoming, Lin An. Research on the snapshot technology in storage systems[J]. Micro Processors, 2008(1): 127-130.
|
[9] | Minwen Ji, Alistair Veitch, John Wilkes. Seneca: remote mirroring done write //Proceedings of USENIX Technical Conference. Berkeley: USENIX, 2003: 253-268.
|
[10] | EMC Corporation. Using EMC snapview and mirrorview for remote backup [Z]. Hopkinton:EMC Corporation, 2002.
|
[11] | IBM中国信息支持中心. 容灾白皮书[Z]. 北京:IBM中国信息支持中心, 2006.
|
[12] | 郭天杰, 曹强, 谢长生. 远程镜像技术和方法研究[J]. 计算机工程与科学, 2006(10):38-41, 49. Guo Tianjie, Cao Qiang, Xie Changsheng. Research on the techniques and methods of remote mirroring [J]. Computer Engineering and Science, 2006(10): 38-41, 49.
|
[13] | Hewlett-Packard Company. HP disk array xp1024 [Z]. USA: Hewlett-Packard Company, 2002.
|
[14] | IBM Corporation. DFSMS/MVS version 1 remote copy administrator’s guide and reference [M]. New York: IBM Corporation, 1997.
|
[15] | Veritas Software Corp. VERITAS volume replicator 3.5: administrator’s guide (solaris) [M]. USA: Veritas Software Corp , 2002.
|
[16] | Greg Schuweiler. Building a SAN backup solution[M]. San Francisco: Miller Freeman, Inc, 2000:8-14.
|
[17] | Hewlett-Packard Company. HP open view continuous access storage appliance[Z]. USA: Hewlett-Packard Company, 2002.
|
[18] | Minwen Ji, Alistair Veitch, John Wilkes. Seneca: remote mirroring done write //Proceedings of USENIX Technical Conference. Berkeley: USENIX, 2003:253-268.
|
[19] | Oracle. Oracle data guard: ensuring disaster recovery for the enterprise[Z]. Oracle: Oracle Corporation, 2002.
|
[20] | Quinlan, Dorward. Venti: a new approach to archival storage//Proceedings of the USENIX Conference on File and Storage Technologies (FAST). California: USENIX, 2002.
|
[21] | Athicha Muthitacharoen, Benjie Chen, David Mazières. A low-bandwidth network file system//Proceedings of the ACM 18th Symposium on Operating Systems Principles. Banff:, 2001.
|
[22] | Kulkarni, Douglis, LaVoie, Tracey. Redundancy elimination within large collections of files // Proceedings of USENIX Annual Technical Conference. : USENIX, 2004:59-72.
|
[23] | Data Domain. Data domain appliance series: high-speed inline deduplication storage . 2005.
|
[24] | Jain, Dahlin, Tewari. TAPER: tiered approach for eliminating redundancy in replica synchronization //Proceedings of USENIX File And Storage Systems (FAST). :USENIX, 2005.
|
[25] | Clark Elizabeth. Storage virtualization . 2003.
|
[26] | Mark Blunden, Mik Berx-Debeys, Deaseop Sim. Storage networking virtualization: what’s it all about [M]. New York: IBM Corporation, 2000:154-192.
|
[27] | Banikazemi M, Poff D, Abali B. Storage-based intrusion detection for storage area networks (SANs) // 22nd IEEE / 13th NASA Goddard Conference on Mass Storage Systems and Technologies.: IEEE Press, 2005: 118-127.
|
[28] | Roselinda R Schulman. Disaster recovery issues and solutions [M]. USA: HITACHI Corporation, 2004.
|
[29] | Kubiatowicz J, Bindel D, Chen Y. OceanStore: an architecture for global-scale persistent storage [J]. ACM SIGOPS Operationg Systems Review, 2000, 34(5):190-201.
|
[30] | Druschel P, Rowstron A. PAST: a large-scale persistent peer-to-peer storage utility // Proceedings of the 8th Workshop on Hot Topics in Operating Systems. :IEEE Press, 2001:65-70.
|
[31] | Cox L P, Murray C D, Noble B D. Pastiche: making backup cheap and easy //Proceedings of 5th USENIX Symposium on Operating Systems Design and Implementation. : USENIX, 2002: 285-298
|
[32] | Dabek F, Kaashoek M F, Karger D. Wide-area cooperative storage with CFS [J]. Proceedings of 18th ACM Symposium on Operating Systems Principles, 2001: 202-215.
|
[33] | Kamvar Sepandar D, Schlosser Mario T, Hector Garcia-Molina. The eigentrust algorithm for reputation management in P2P networks // Proceedings of 12th International Conference on World Wide Web. Hungary: ACM Press, 2003: 640-651.
|
[34] | 冯国富, 张金城, 姜玉泉, 等. 无结构P2P覆盖网络的拓扑优化[J]. 软件学报, 2007, 18(11): 2819-2829. Feng Guofu, Zhang Jincheng, Jiang Yuquan, et al. Optimization of overlay topology for unstructured peer-to-peer [J]. Journal of Software, 2007, 18(11): 2819-2829.
|