[1] Wheatman Vic, Scott Donna, Witty Roberta. Aftermath: business continuity planning . 2001. http://www.gartner.com/Display Document?doc_cd=101098& ref=g_SiteLink. [2] 国务院信息化工作办公室. 重要信息系统灾难恢复指南[Z]. 北京: 国务院信息化办公室, 2005. [3] GB/T 20988—2007. 信息安全技术——信息系统灾难恢复规范[S]. 北京: 中国标准出版社, 2007. [4] H Garcia-Molina, CA Polyzois. Issues in disaster recovery // Thirty-Fifth IEEE Computer Society International Conference. San Francisco: IEEE Press, 1990:573-577. [5] 中国人民银行总行. 中国人民银行关于加强银行数据集中安全工作的指导意见[Z]. 北京: 中国人民银行总行, 2002. [6] Wiboonrat M, Kosavisutte K. Optimization strategy for disaster recovery //Fourth IEEE International Conference on Management of Innovation and Technology. Bangkok:IEEE Press, 2008: 675-680. [7] Wiboonrat M. An empirical IT contingency planning model for disaster recovery strategy selection // IEEE International Engineering Management Conference. Estoril:IEEE Press, 2008: 1-5. [8] 袁晓铭, 林安. 几种主流快照技术的分析比较[J]. 微处理机, 2008(1): 127-130. Yuan Xiaoming, Lin An. Research on the snapshot technology in storage systems[J]. Micro Processors, 2008(1): 127-130. [9] Minwen Ji, Alistair Veitch, John Wilkes. Seneca: remote mirroring done write //Proceedings of USENIX Technical Conference. Berkeley: USENIX, 2003: 253-268. [10] EMC Corporation. Using EMC snapview and mirrorview for remote backup [Z]. Hopkinton:EMC Corporation, 2002. [11] IBM中国信息支持中心. 容灾白皮书[Z]. 北京:IBM中国信息支持中心, 2006. [12] 郭天杰, 曹强, 谢长生. 远程镜像技术和方法研究[J]. 计算机工程与科学, 2006(10):38-41, 49. Guo Tianjie, Cao Qiang, Xie Changsheng. Research on the techniques and methods of remote mirroring [J]. Computer Engineering and Science, 2006(10): 38-41, 49. [13] Hewlett-Packard Company. HP disk array xp1024 [Z]. USA: Hewlett-Packard Company, 2002. [14] IBM Corporation. DFSMS/MVS version 1 remote copy administrator’s guide and reference [M]. New York: IBM Corporation, 1997. [15] Veritas Software Corp. VERITAS volume replicator 3.5: administrator’s guide (solaris) [M]. USA: Veritas Software Corp , 2002. [16] Greg Schuweiler. Building a SAN backup solution[M]. San Francisco: Miller Freeman, Inc, 2000:8-14. [17] Hewlett-Packard Company. HP open view continuous access storage appliance[Z]. USA: Hewlett-Packard Company, 2002. [18] Minwen Ji, Alistair Veitch, John Wilkes. Seneca: remote mirroring done write //Proceedings of USENIX Technical Conference. Berkeley: USENIX, 2003:253-268. [19] Oracle. Oracle data guard: ensuring disaster recovery for the enterprise[Z]. Oracle: Oracle Corporation, 2002. [20] Quinlan, Dorward. Venti: a new approach to archival storage//Proceedings of the USENIX Conference on File and Storage Technologies (FAST). California: USENIX, 2002. [21] Athicha Muthitacharoen, Benjie Chen, David Mazières. A low-bandwidth network file system//Proceedings of the ACM 18th Symposium on Operating Systems Principles. Banff:, 2001. [22] Kulkarni, Douglis, LaVoie, Tracey. Redundancy elimination within large collections of files // Proceedings of USENIX Annual Technical Conference. : USENIX, 2004:59-72. [23] Data Domain. Data domain appliance series: high-speed inline deduplication storage . 2005. http://www.datadomain.com/products/appliances.html. [24] Jain, Dahlin, Tewari. TAPER: tiered approach for eliminating redundancy in replica synchronization //Proceedings of USENIX File And Storage Systems (FAST). :USENIX, 2005. [25] Clark Elizabeth. Storage virtualization . 2003. http://callcentermagazine.com/shared/article/showArticle.jhtml;jsessionid=0P3IB2P5SSBURQE1-GHRSKH4ATMY32JVN?articleId=10300147. [26] Mark Blunden, Mik Berx-Debeys, Deaseop Sim. Storage networking virtualization: what’s it all about [M]. New York: IBM Corporation, 2000:154-192. [27] Banikazemi M, Poff D, Abali B. Storage-based intrusion detection for storage area networks (SANs) // 22nd IEEE / 13th NASA Goddard Conference on Mass Storage Systems and Technologies.: IEEE Press, 2005: 118-127. [28] Roselinda R Schulman. Disaster recovery issues and solutions [M]. USA: HITACHI Corporation, 2004. [29] Kubiatowicz J, Bindel D, Chen Y. OceanStore: an architecture for global-scale persistent storage [J]. ACM SIGOPS Operationg Systems Review, 2000, 34(5):190-201. [30] Druschel P, Rowstron A. PAST: a large-scale persistent peer-to-peer storage utility // Proceedings of the 8th Workshop on Hot Topics in Operating Systems. :IEEE Press, 2001:65-70. [31] Cox L P, Murray C D, Noble B D. Pastiche: making backup cheap and easy //Proceedings of 5th USENIX Symposium on Operating Systems Design and Implementation. : USENIX, 2002: 285-298 [32] Dabek F, Kaashoek M F, Karger D. Wide-area cooperative storage with CFS [J]. Proceedings of 18th ACM Symposium on Operating Systems Principles, 2001: 202-215. [33] Kamvar Sepandar D, Schlosser Mario T, Hector Garcia-Molina. The eigentrust algorithm for reputation management in P2P networks // Proceedings of 12th International Conference on World Wide Web. Hungary: ACM Press, 2003: 640-651. [34] 冯国富, 张金城, 姜玉泉, 等. 无结构P2P覆盖网络的拓扑优化[J]. 软件学报, 2007, 18(11): 2819-2829. Feng Guofu, Zhang Jincheng, Jiang Yuquan, et al. Optimization of overlay topology for unstructured peer-to-peer [J]. Journal of Software, 2007, 18(11): 2819-2829. |