Dalit Naor  Dalit Naor photo         

contact information

Senior Technical Staff Member and Senior Manager - Cloud Platforms
IBM Research, Haifa


Professional Associations

Professional Associations:  ACM

more information

More information:  Cloud Platforms

A. General Storage and Secure Storage

  • SDGen: Mimicking Datasets for Content Generation in Storage Benchmarks, by Raúl Gracia Tinedo, Danny Harnik, Dalit Naor, Dmitry Sotnikov, Sivan Toledo, Aviad Zuck. FAST 2015: 317-330
  • Estimation of deduplication ratios in large data sets, by Danny Harnik, Oded Margalit, Dalit Naor, Dmitry Sotnikov and Gil Vernik. MSST 2012: 1-11.
  • A Cloud Environment for Data-intensive Storage Services, by E.K. Kolodner et al. CloudCom 2011: 357-366
  • Low Power Mode in Cloud Storage Systems, by Danny Harnik, Dalit Naor and Itai Segall, The Fifth International Workshop on System Management Techniques, Processes, and Services (SMTPS 2009), Special Focus on Cloud Computing.
  • Storage Modeling for Power Estimation, by Miriam Allalouf, Yuriy Arbitman, Michael Factor, Ronen Kat, Kalman Meth and Dalit Naor, SYSTOR 2009.
  • Preservation DataStores: New storage paradigm for preservation environments. Simona Rabinovici-Cohen, Michael Factor, Dalit Naor, Leeat Ramati, Petra Reshef, Shahar Ronen, Julian Satran, David L. Giaretta. IBM Journal of Research and Development 52(4-5): 389-400 (2008)
  • Capability based Secure Access Control to Networked Storage Devices. Michael Factor, Dalit Naor, Eran Rom, Julian Satran, Sivan Tal. MSST 2007: 114-128
  • The need for preservation aware storage: a position paper. Michael Factor, Dalit Naor, Simona Rabinovici-Cohen, Leeat Ramati, Petra Reshef, Julian Satran. Operating Systems Review 41(1): 19-23 (2007)
  • Toward securing untrusted storage without public-key operations. Dalit Naor, Amir Shenhav, Avishai Wool. StorageSS 2005: 51-56
  • The OSD Security Protocol. Michael Factor, David Nagle, Dalit Naor, Erik Riedel, Julian Satran. IEEE Security in Storage Workshop 2005: 29-39

B. Content Protection and Security

  • Revocation and Tracing Schemes for Stateless Receivers. Dalit Naor, Moni Naor, Jeffery Lotspiech. CRYPTO 2001: 41-62
  • Protecting Cryptographic Keys: The Trace-and-Revoke Approach. Dalit Naor, Moni Naor. IEEE Computer 36(7): 47-53 (2003)
  • Clock synchronization with faults and recoveries (extended abstract). Boaz Barak, Shai Halevi, Amir Herzberg, and Dalit Naor. PODC, pp. 133-142, 2000
  • The Proactive Security Toolkit and Applications. Boaz Barak, Amir Herzberg, Dalit Naor, Eldad Shai. ACM Conference on Computer and Communications Security 1999: 18-27

C. Bioinformatics

  • On Near-Optimal Alignments of Biological Sequences. Dalit Naor, Douglas L. Brutlag. Journal of Computational Biology 1(4): 349- (1994)
  • Parametric Optimization of Sequence Alignment. Dan Gusfield, K. Balasubramanian, Dalit Naor. Algorithmica 12(4/5): 312-326 (1994)
  • Amino Acid Pair Interchanges at Spatially Conserved Locations. Dalit Naor, Daniel Fischer, Robert L. Jernigan, Haim J. Wolfson and Ruth Nussino. Journal of Molecular Biology, Volume 256, Issue 5, 15 March 1996, Pages 924-938

D. Combinatorial Optimization

  • A Fast Algorithm for Optimally Increasing the Edge Connectivity. Dalit Naor, Dan Gusfield, Charles Martel. FOCS 1990: 698-707. Also, in SIAM J. Comput. 26(4): 1139-1165 (1997)
  • Extracting Maximal Information About Sets of Minimum Cuts. Dan Gusfield, Dalit Naor. Algorithmica 10(1): 64-89 (1993)


Projects and Groups

Technical Areas