-
1
-
-
0004200684
-
Computer security planning study
-
Technical Report 73-51, Air Force Electronic System Division
-
J. P. Anderson. Computer security planning study. Technical Report 73-51, Air Force Electronic System Division, 1972.
-
(1972)
-
-
Anderson, J.P.1
-
2
-
-
0242655729
-
Authentication and security in WebFS
-
January
-
E. Belani, A. Thornton, and M. Zhou. Authentication and security in WebFS, January 1997.
-
(1997)
-
-
Belani, E.1
Thornton, A.2
Zhou, M.3
-
3
-
-
85084162095
-
The crisis wide area security architecture
-
San Antonio, Texas, U.S.A., January
-
E. Belani, A. Vahdat, T. Anderson, and M. Dahlin. The crisis wide area security architecture. In Proceedings of the 7th USENIX Security Symposium, pages 15-29, San Antonio, Texas, U.S.A., January 1998.
-
(1998)
Proceedings of the 7th USENIX Security Symposium
, pp. 15-29
-
-
Belani, E.1
Vahdat, A.2
Anderson, T.3
Dahlin, M.4
-
5
-
-
0039783096
-
Design and implementation of a transparent cryptographic filesystem for Unix
-
Unpublished Technical Report; July
-
G. Cattaneo and G. Persiano. Design and implementation of a transparent cryptographic filesystem for Unix. Unpublished Technical Report, ftp://edu-gw.dia.unisa.it/pub/tcfs/docs/tcfs.ps.gz., July 1997.
-
(1997)
-
-
Cattaneo, G.1
Persiano, G.2
-
7
-
-
0003593599
-
Spki certificate theory
-
Technical Report 2693, Network Working Group, IETF, September
-
C. Ellison, B. Frantz, B. Lampson, R. Rivest, B. Thomas, and T. Ylonen. Spki certificate theory. Technical Report 2693, Network Working Group, IETF, September 1999.
-
(1999)
-
-
Ellison, C.1
Frantz, B.2
Lampson, B.3
Rivest, R.4
Thomas, B.5
Ylonen, T.6
-
8
-
-
0022045868
-
Impossibility of distributed consensus with one faulty process
-
M. Fischer, N. Lynch, and M. Paterson. Impossibility of distributed consensus with one faulty process. Journal of the ACM, 32(2):374-382, 1985.
-
(1985)
Journal of the ACM
, vol.32
, Issue.2
, pp. 374-382
-
-
Fischer, M.1
Lynch, N.2
Paterson, M.3
-
9
-
-
84995657580
-
Fast and secure distributed read-only file system
-
San Diego, California, U.S.A., October
-
K. Fu, M. F. Kaashoek, and D. Mazières. Fast and secure distributed read-only file system. In Proceedings of the 4th Symposium on Operating Systems Design and Implementation, pages 181-196, San Diego, California, U.S.A., October 2000.
-
(2000)
Proceedings of the 4th Symposium on Operating Systems Design and Implementation
, pp. 181-196
-
-
Fu, K.1
Kaashoek, M.F.2
Mazières, D.3
-
10
-
-
24844473422
-
Cryptographic access control for a network file system
-
Master's thesis, Trinity College, Dublin
-
A. Harrington. Cryptographic access control for a network file system. Master's thesis, Trinity College, Dublin, 2001.
-
(2001)
-
-
Harrington, A.1
-
11
-
-
0023964787
-
Scale and performance in a distributed file system
-
J. H. Howard, M. L. Kazar, S. G. Menees, D. A. Nichols, m. Satyanarayanan, R. N. Sidebotham, and M. J. West. Scale and performance in a distributed file system. ACM Transactions on Computer Systems, 6(1):51-81, 1988.
-
(1988)
ACM Transactions on Computer Systems
, vol.6
, Issue.1
, pp. 51-81
-
-
Howard, J.H.1
Kazar, M.L.2
Menees, S.G.3
Nichols, D.A.4
Satyanarayanan, M.5
Sidebotham, R.N.6
West, M.J.7
-
12
-
-
0003899818
-
The kerberos network authentication service (v5)
-
Request for Comments (RFC) 1510, Network Working Group, IETF, September
-
J. Kohl and C. Neuman. The kerberos network authentication service (v5). Request for Comments (RFC) 1510, Network Working Group, IETF, September 1993.
-
(1993)
-
-
Kohl, J.1
Neuman, C.2
-
13
-
-
84976834054
-
Authentication in distributed systems: Theory and practice
-
November
-
B. Lampson, M. Abadi, M. Burrows, and E. Wobber. Authentication in distributed systems: Theory and practice. ACM Transactions on Computer Systems, 10(4):265-310, November 1992.
-
(1992)
ACM Transactions on Computer Systems
, vol.10
, Issue.4
, pp. 265-310
-
-
Lampson, B.1
Abadi, M.2
Burrows, M.3
Wobber, E.4
-
16
-
-
0008054423
-
Security and decentralised control in the SFS distributed file system
-
Master's thesis, MIT Laboratory of Computer Science
-
D. Mazières. Security and decentralised control in the SFS distributed file system. Master's thesis, MIT Laboratory of Computer Science, 1997.
-
(1997)
-
-
Mazières, D.1
-
17
-
-
0042352260
-
Separating key management from file system security
-
Kiawah Island, S.C., U.S.A.
-
D. Mazières, M. Kaminsky, M.F. Kaashoek, and E. Witchel. Separating key management from file system security. In Proceedings of the 17th Symposium on Operating Systems Principles, pages 124-139, Kiawah Island, S.C., U.S.A., 1999.
-
(1999)
Proceedings of the 17th Symposium on Operating Systems Principles
, pp. 124-139
-
-
Mazières, D.1
Kaminsky, M.2
Kaashoek, M.F.3
Witchel, E.4
-
18
-
-
84862953493
-
Deferring trust in fluid replication
-
Kolding, Denmark, September
-
B. D. Noble, B. Fleis, and L. P. Cox. Deferring trust in fluid replication. In Proceedings of the 9th ACM SIGOPS European Workshop, pages 79-84, Kolding, Denmark, September 2000.
-
(2000)
Proceedings of the 9th ACM SIGOPS European Workshop
, pp. 79-84
-
-
Noble, B.D.1
Fleis, B.2
Cox, L.P.3
-
19
-
-
0004309408
-
-
T. S. S. of ITU; Number of X.509 in ITU-T Recomandation. International Telecommunication Union, November 1993. Standard international ISO/IEC 9594-8
-
T. S. S. of ITU. Information Technology - Opens Systems Interconnection - The Directory: Authentication Framework. Number of X.509 in ITU-T Recomandation. International Telecommunication Union, November 1993. Standard international ISO/IEC 9594-8: 1995 (E).
-
(1995)
Information Technology - Opens Systems Interconnection - The Directory: Authentication Framework
-
-
-
20
-
-
85084160341
-
Capability file names: Separating authorisation from user management in an internet file system
-
Washington D.C., U.S.A., August
-
J. T. Regan and C. D. Jensen. Capability file names: Separating authorisation from user management in an internet file system. In Proceedings of the 2001 USENIX Security Symposium, pages 221-234, Washington D.C., U.S.A., August 2001.
-
(2001)
Proceedings of the 2001 USENIX Security Symposium
, pp. 221-234
-
-
Regan, J.T.1
Jensen, C.D.2
-
21
-
-
0002791623
-
Truffles-A secure service for widespread file sharing
-
P. Reiher, T. Page, S. Crocker, J. Cook, and G. Popek. Truffles-a secure service for widespread file sharing, 1993.
-
(1993)
-
-
Reiher, P.1
Page, T.2
Crocker, S.3
Cook, J.4
Popek, G.5
-
22
-
-
0026812659
-
The design and implementation of a log-structured file system
-
M. Rosenblum and J. K. Ousterhout. The design and implementation of a log-structured file system. ACM Transactions on Computer Systems, 10(1):26-52, 1992.
-
(1992)
ACM Transactions on Computer Systems
, vol.10
, Issue.1
, pp. 26-52
-
-
Rosenblum, M.1
Ousterhout, J.K.2
-
23
-
-
84976845043
-
End-to-end arguments in system design
-
Nov.
-
J. H. Saltzer, D. P. Reed, and D. D. Clark. End-to-end arguments in system design. ACM Transactions on Computer Systems, 2(4):277-288, Nov. 1984.
-
(1984)
ACM Transactions on Computer Systems
, vol.2
, Issue.4
, pp. 277-288
-
-
Saltzer, J.H.1
Reed, D.P.2
Clark, D.D.3
-
24
-
-
0000432429
-
Design and implementation of the sun network file system
-
Portland, Oregon, C9 tats-Unis, June
-
R. Sandberg, D. Goldberg, K. S, D. Walsh, and B. Lyon. Design and implementation of the Sun Network File System. In Proceedings of the Summer 1985 USENIX Conference, pages 119-130, Portland, Oregon, C9 tats-Unis, June 1985.
-
(1985)
Proceedings of the Summer 1985 USENIX Conference
, pp. 119-130
-
-
Sandberg, R.1
Goldberg, D.2
Walsh, K.S.D.3
Lyon, B.4
-
25
-
-
0042352263
-
Deciding when to forget in the elephant file system
-
Kiawah Island Resort, South Carolina, U.S.A.
-
D. S. Santry, M. J. Feeley, N. C. Hutchinson, A. C. Veitch, R. W. Carton, and J. Ofir. Deciding when to forget in the elephant file system. In Proceedings of the 17th Symposium on Operating Systems Principles, pages 110-123, Kiawah Island Resort, South Carolina, U.S.A., 1999.
-
(1999)
Proceedings of the 17th Symposium on Operating Systems Principles
, pp. 110-123
-
-
Santry, D.S.1
Feeley, M.J.2
Hutchinson, N.C.3
Veitch, A.C.4
Carton, R.W.5
Ofir, J.6
-
27
-
-
0024714097
-
Integrating security in a large distributed system
-
M. Satyanarayanan. Integrating security in a large distributed system. ACM Transactions on Computer Systems, 7(3):247-280, 1989.
-
(1989)
ACM Transactions on Computer Systems
, vol.7
, Issue.3
, pp. 247-280
-
-
Satyanarayanan, M.1
-
28
-
-
0042985426
-
Scalable, secure and highly available file access in a distributed workstation environment
-
May
-
M. Satyanarayanan. Scalable, secure and highly available file access in a distributed workstation environment. IEEE Computer, pages 9-21, May 1990.
-
(1990)
IEEE Computer
, pp. 9-21
-
-
Satyanarayanan, M.1
-
29
-
-
0003412071
-
Twofish: A 128-bit block cipher
-
B. Schneier, J. Kelsey, D. Whiting, D. Wagner, and C. Hall. Twofish: a 128-bit block cipher, 1998.
-
(1998)
-
-
Schneier, B.1
Kelsey, J.2
Whiting, D.3
Wagner, D.4
Hall, C.5
-
30
-
-
84987208725
-
An implementation of a log-structured file system for UNIX
-
M. I. Seltzer, K. Bostic, M. K. McKusick, and C. Staelin. An implementation of a log-structured file system for UNIX. In USENIX Winter, pages 307-326, 1993.
-
(1993)
USENIX Winter
, pp. 307-326
-
-
Seltzer, M.I.1
Bostic, K.2
McKusick, M.K.3
Staelin, C.4
-
31
-
-
0003863274
-
Nfs: Network file system protocol specification
-
Sun Microsystems Inc.; Request for Comments (RFC) 1094, Network Working Group, March
-
Sun Microsystems Inc. Nfs: Network file system protocol specification. Request for Comments (RFC) 1094, Network Working Group, March 1989.
-
(1989)
-
-
-
33
-
-
0003571629
-
Webfs: A global cache coherent file system
-
Department of Computer Science, UC Berkeley, Technical Draft
-
A. Vahdat, P. Eastham, and T. Anderson. Webfs: A global cache coherent file system. Department of Computer Science, UC Berkeley, Technical Draft, 1996.
-
(1996)
-
-
Vahdat, A.1
Eastham, P.2
Anderson, T.3
-
34
-
-
0024681074
-
The design of a high-performance file server
-
Washington, DC; IEEE Computer Society
-
R. van Renesse, A. S. Tanenbaum, and W. Wilschut. The design of a high-performance file server. In Proceedings of the 9th International Conference on Distributed Computing Systems (ICDCS), pages 22-27, Washington, DC, 1989. IEEE Computer Society.
-
(1989)
Proceedings of the 9th International Conference on Distributed Computing Systems (ICDCS)
, pp. 22-27
-
-
Van Renesse, R.1
Tanenbaum, A.S.2
Wilschut, W.3
-
35
-
-
0028380781
-
Authentication in the Taos operating system
-
E. Wobber, M. Abadi, M. Burrows, and B. Lampson. Authentication in the Taos operating system. ACM Transactions on Computer Systems, 12(1):3-32, 1994.
-
(1994)
ACM Transactions on Computer Systems
, vol.12
, Issue.1
, pp. 3-32
-
-
Wobber, E.1
Abadi, M.2
Burrows, M.3
Lampson, B.4
-
36
-
-
0012579128
-
Cryptfs: A stackable vnode level encryption file system
-
Technical report, Computer Science Department, Columbia University
-
E. Zadok, I. Badulescu, and A. Shender. Cryptfs: a stackable vnode level encryption file system. Technical report, Computer Science Department, Columbia University, 1998.
-
(1998)
-
-
Zadok, E.1
Badulescu, I.2
Shender, A.3
|