-
2
-
-
21844468546
-
Tamper-resistant storage techniques for multimedia systems
-
San Jose CA USA, January
-
E. Haubert, J. Tucek, L. Brumbaugh, and W. Yurcik, "Tamper-Resistant Storage Techniques for Multimedia Systems," IS&T/SPIE International Symposium Electronic Imaging / Storage and Retrieval Methods and Applications for Multimedia (EI121), San Jose CA USA, January 2005.
-
(2005)
IS&T/SPIE International Symposium Electronic Imaging / Storage and Retrieval Methods and Applications for Multimedia (EI121)
-
-
Haubert, E.1
Tucek, J.2
Brumbaugh, L.3
Yurcik, W.4
-
3
-
-
33244465495
-
Abridged report: The emerging storage security challenge
-
September
-
J. Gruener and M. Kovar, "Abridged Report: The Emerging Storage Security Challenge," The Yankee Group Report, September 2003.
-
(2003)
The Yankee Group Report
-
-
Gruener, J.1
Kovar, M.2
-
7
-
-
0003262137
-
The inevitability of failure: The flawed assumption of security in modern computing environments
-
Crystal City, VA, October
-
P. A. Loscoco, S. D. Smalley, P. A. Muckelbauer, R. C. Taylor, S. J. Turner and J. F. Farrell. "The Inevitability of Failure: The Flawed Assumption of Security in Modern Computing Environments," In Proceedings of the 21st National Information Systems Security Conference, pp. 303-314, Crystal City, VA, October 1998.
-
(1998)
Proceedings of the 21st National Information Systems Security Conference
, pp. 303-314
-
-
Loscoco, P.A.1
Smalley, S.D.2
Muckelbauer, P.A.3
Taylor, R.C.4
Turner, S.J.5
Farrell, J.F.6
-
9
-
-
21844464524
-
Security and privacy tc
-
March
-
D. Cooper and C. Pfleeger, "Security and Privacy tc," IEEE Computer, pp. 118-119, March 1996.
-
(1996)
IEEE Computer
, pp. 118-119
-
-
Cooper, D.1
Pfleeger, C.2
-
11
-
-
84946201003
-
Fortresses built upon sand
-
Lake Arrowhead, CA, September
-
D. B. Baker, "Fortresses Built Upon Sand," In Proceedings of the 1996 Workshop on New Security Paradigms, pp. 148-153, Lake Arrowhead, CA, September 1996.
-
(1996)
Proceedings of the 1996 Workshop on New Security Paradigms
, pp. 148-153
-
-
Baker, D.B.1
-
12
-
-
84860967596
-
Hacker teams breach powerful research networks
-
April 14
-
A. Desjanun, "Hacker Teams Breach Powerful Research Networks," USA Today, April 14, 2004. http://www.usatoday.com/tech/news/computersecurity/ 2004-04-14-synchronized-hacking_x.htm
-
(2004)
USA Today
-
-
Desjanun, A.1
-
15
-
-
84978374045
-
Self-securing storage: Protecting data in compromised systems
-
San Diego, CA, October
-
th Symposium on Operating Systems Design and Implementation, San Diego, CA, October 2000.
-
(2000)
th Symposium on Operating Systems Design and Implementation
-
-
Strunk, J.D.1
Goodson, G.R.2
Scheinholtz, M.L.3
Soules, C.A.N.4
Ganger, G.R.5
-
16
-
-
21844474776
-
The file motel - An incremental backup system for unix
-
A. Hume, "The File Motel - An Incremental Backup System for Unix," Summer USENIX Conference Proceedings, pp. 61-70, 1988.
-
(1988)
Summer USENIX Conference Proceedings
, pp. 61-70
-
-
Hume, A.1
-
18
-
-
21844435174
-
An operating system independent WORM archival system
-
May
-
G. Russo, S. Russo, and B. Pirenne. "An Operating System Independent WORM Archival System," Software - Practice and Experience, Vol. 25(5), pp. 521-531, May 1995.
-
(1995)
Software - Practice and Experience
, vol.25
, Issue.5
, pp. 521-531
-
-
Russo, G.1
Russo, S.2
Pirenne, B.3
-
19
-
-
0026384886
-
A cached WORM file system
-
S. Quinlan. "A Cached WORM File System," Software-Practice & Experience, Vol. 21, Issue 12, pp. 1289-1299, 1991.
-
(1991)
Software-practice & Experience
, vol.21
, Issue.12
, pp. 1289-1299
-
-
Quinlan, S.1
-
20
-
-
0001300585
-
Plan 9 from bell labs
-
Summer
-
R. Pike, D. Presotto, S. Dorward, R. Flandrena, K. Thompson, H. Trickey and P. Winterbottom, "Plan 9 from Bell Labs," Computing Systems, Vol. 8, 3, pp. 221-254, Summer 1995.
-
(1995)
Computing Systems
, vol.8
, Issue.3
, pp. 221-254
-
-
Pike, R.1
Presotto, D.2
Dorward, S.3
Flandrena, R.4
Thompson, K.5
Trickey, H.6
Winterbottom, P.7
-
25
-
-
21844457876
-
DISP: Practical, efficient, secure and fault tolerant data storage for distributed systems
-
December
-
D. Ellard and J. Megquier, "DISP: Practical, Efficient, Secure and Fault Tolerant Data Storage for Distributed Systems," Harvard Computer Science Technical Report TR-17-03, December 2003.
-
(2003)
Harvard Computer Science Technical Report
, vol.TR-17-03
-
-
Ellard, D.1
Megquier, J.2
-
26
-
-
21844436500
-
The INDIA protocol - Project report
-
December
-
D. Ellard, J. Megquier, L. Park and N. Yuan, "The INDIA Protocol - Project Report", Harvard Computer Science Technical Report TR-25-97, December 1997.
-
(1997)
Harvard Computer Science Technical Report
, vol.TR-25-97
-
-
Ellard, D.1
Megquier, J.2
Park, L.3
Yuan, N.4
-
31
-
-
21844441575
-
WORM storage on magnetic disks using snaplock compliance™ and snaplock enterprise™
-
August
-
C. Lueth, "WORM Storage on Magnetic Disks using Snaplock Compliance™ and Snaplock Enterprise™," Network Appliance Technical Report TR3263, August 2003.
-
(2003)
Network Appliance Technical Report
, vol.TR3263
-
-
Lueth, C.1
-
32
-
-
10044230656
-
-
Unix Man Pages, http://www.rt.com/man.chattr.1.html.
-
Unix Man Pages
-
-
-
33
-
-
84860963525
-
-
Linux Intrusion Detection System, www.lids.org.
-
-
-
|