-
2
-
-
84858536870
-
-
The Directive 2002/58/EC of the European Parliament and of the Council
-
The Directive 2002/58/EC of the European Parliament and of the Council. http://europa.eu.int/eur-lex/pri/en/oj/dat/2002/1_201/1_20120020731en00%370047. pdf.
-
-
-
-
6
-
-
8744256700
-
-
The Sarbanes-Oxley Act of 2002. http://news.findlaw.com/hdocs/docs/ gwbush/sarbanesoxley072302.pdf, 2002.
-
(2002)
The Sarbanes-Oxley Act of 2002
-
-
-
8
-
-
0003516333
-
Intrusion detection systems: A survey and taxonomy
-
Chalmers University, Sweden
-
S. Axelsson. Intrusion detection systems: A survey and taxonomy. White Paper, Chalmers University, Sweden, 2000.
-
(2000)
White Paper
-
-
Axelsson, S.1
-
9
-
-
84962752982
-
A two layered approach for securing an object store network
-
December
-
A. Azagury, R. Canetti, M. Factor, S. Halevi, E. Henis, D. Naor, N. Rinetzky, O. Rodeh, and J. Satran. A two layered approach for securing an object store network. In SISW, December 2002.
-
(2002)
SISW
-
-
Azagury, A.1
Canetti, R.2
Factor, M.3
Halevi, S.4
Henis, E.5
Naor, D.6
Rinetzky, N.7
Rodeh, O.8
Satran, J.9
-
16
-
-
1242295762
-
-
File integrity checkers. http://ww.serverfiles.com/Network-security- software/File-integrity-checkers/date/.
-
File Integrity Checkers
-
-
-
17
-
-
33244475234
-
Encrypting File System for Windows 2000
-
July
-
M. Corporation. Encrypting File System for Windows 2000. White Paper, July 1999.
-
(1999)
White Paper
-
-
-
23
-
-
33244462962
-
LIPKEY - A low infrastructure public key mechanism using SPKM
-
June
-
M. Eisler. LIPKEY - a low infrastructure public key mechanism using SPKM. RFC 2847, June 2000.
-
(2000)
RFC
, vol.2847
-
-
Eisler, M.1
-
24
-
-
1642380692
-
RPCSEC_GSS protocol specification
-
September
-
M. Eisler, A. Chiu, and L. Ling. RPCSEC_GSS protocol specification. RFC 2203, September 1997.
-
(1997)
RFC
, vol.2203
-
-
Eisler, M.1
Chiu, A.2
Ling, L.3
-
25
-
-
0003229196
-
The SSL protocol version 3.0
-
(draft-freier-ssl-version3-02.txt), Networking Group, March
-
A. O. Freier, P. Karlton, and P. C. Kocher. The SSL Protocol Version 3.0. Internet Draft (draft-freier-ssl-version3-02.txt), Networking Group, March 1996. http://wp.netscape.com/eng/ssl3/ssl-toc.html.
-
(1996)
Internet Draft
-
-
Freier, A.O.1
Karlton, P.2
Kocher, P.C.3
-
27
-
-
0346739133
-
Fast and secure distributed read-only file system
-
February
-
K. Fu, F. Kaashoek, and D. Mazières. Fast and secure distributed read-only file system. Proceedings ACM Transactions on Computer Systems, 20(1):1-24, February 2002.
-
(2002)
Proceedings ACM Transactions on Computer Systems
, vol.20
, Issue.1
, pp. 1-24
-
-
Fu, K.1
Kaashoek, F.2
Mazières, D.3
-
31
-
-
4244158697
-
Security for network attached storage devices
-
Carnegie Mellon University
-
H. Gobioff, G. Gibson, and D. Tygar. Security for network attached storage devices. Technical report, Carnegie Mellon University, 1997.
-
(1997)
Technical Report
-
-
Gobioff, H.1
Gibson, G.2
Tygar, D.3
-
32
-
-
85033498470
-
SiRiUS: Securing Remote Untrusted Storage
-
February
-
E. Goh, H. Shacham, N. Modadugu, and D. Boneh. SiRiUS: Securing Remote Untrusted Storage. In Proceedings of the Tenth Network and Distributed Systems Security (NDSS) Symposium, pages 131-145, February 2003.
-
(2003)
Proceedings of the Tenth Network and Distributed Systems Security (NDSS) Symposium
, pp. 131-145
-
-
Goh, E.1
Shacham, H.2
Modadugu, N.3
Boneh, D.4
-
33
-
-
33244488406
-
-
Cryptology ePrint Archive, Report 2003/216
-
E.-J. Goh. Secure indexes. Cryptology ePrint Archive, Report 2003/216, 2003. http://eprint.iacr.org/2003/216/.
-
(2003)
Secure Indexes
-
-
Goh, E.-J.1
-
38
-
-
84858535249
-
-
Jetico. BestCrypt. http://www.jetico.com/download.htm.
-
BestCrypt
-
-
-
39
-
-
33244456919
-
Evaluating security tools towards usable security: A usability taxonomy for the evaluation of security tools based on a categorization of user errors
-
Usability
-
J. Kaiser and M. Reichenbach. Evaluating security tools towards usable security: A usability taxonomy for the evaluation of security tools based on a categorization of user errors. Technical report, Usability, 2002.
-
(2002)
Technical Report
-
-
Kaiser, J.1
Reichenbach, M.2
-
40
-
-
85033460636
-
Plutus - Scalable secure file sharing on untrusted storage
-
M. Kallahalla, E. Riedel, R. Swaminathan, Q. Wang, and K. Fu. Plutus -scalable secure file sharing on untrusted storage. In USENIX File and Storage Technologies (FAST), 2003.
-
(2003)
USENIX File and Storage Technologies (FAST)
-
-
Kallahalla, M.1
Riedel, E.2
Swaminathan, R.3
Wang, Q.4
Fu, K.5
-
42
-
-
0003068282
-
Security architecture for the Internet protocol
-
Network Working Group, November
-
A. Kent and R. Atkinson. Security architecture for the Internet protocol. RFC 2401, Network Working Group, November 1998. http://www.ietf.org/rfc/ rfc2401.txt.
-
(1998)
RFC
, vol.2401
-
-
Kent, A.1
Atkinson, R.2
-
43
-
-
84948164689
-
Decentralized authentication mechanisms for object-based storage devices
-
October
-
V. Kher and Y. Kim. Decentralized authentication mechanisms for object-based storage devices. In IEEE SISW, October 2003.
-
(2003)
IEEE SISW
-
-
Kher, V.1
Kim, Y.2
-
45
-
-
0039927469
-
Oceanstore: An architecture for global-scale persistent storage
-
ACM, November
-
J. Kubiatowicz, D. Bindel, Y. Chen, P. Eaton, D. Geels, R. Gummadi, S. Rhea, H. Weatherspoon, W. Weimer, C. Wells, and B. Zhao. Oceanstore: An architecture for global-scale persistent storage. In Proceedings of ACM ASPLOS. ACM, November 2000.
-
(2000)
Proceedings of ACM ASPLOS
-
-
Kubiatowicz, J.1
Bindel, D.2
Chen, Y.3
Eaton, P.4
Geels, D.5
Gummadi, R.6
Rhea, S.7
Weatherspoon, H.8
Weimer, W.9
Wells, C.10
Zhao, B.11
-
46
-
-
77952379905
-
Secure untrusted data repository (SUNDR)
-
December
-
J. Li, M. Krohn, D. Mazires, and D. Shasha. Secure untrusted data repository (SUNDR). In OSDI, December 2004.
-
(2004)
OSDI
-
-
Li, J.1
Krohn, M.2
Mazires, D.3
Shasha, D.4
-
47
-
-
0042277157
-
Generic security service application program interface
-
September
-
J. Linn. Generic security service application program interface. Request for Comments 1508, September 1993.
-
(1993)
Request for Comments
, vol.1508
-
-
Linn, J.1
-
48
-
-
0012023903
-
The kerberos version 5 GSS-API mechanism
-
June
-
J. Linn. The kerberos version 5 GSS-API mechanism. RFC 1964, June 1996.
-
(1996)
RFC
, vol.1964
-
-
Linn, J.1
-
51
-
-
0002586876
-
A digital signature based on a conventional encryption function
-
R. Merkle. A digital signature based on a conventional encryption function. In CRYPTO, 1987.
-
(1987)
CRYPTO
-
-
Merkle, R.1
-
52
-
-
33244466412
-
RFC: Remote procedure call
-
April
-
S. Microsystems. RFC: Remote procedure call. Request for Comments 1050, April 1998.
-
(1998)
Request for Comments
, vol.1050
-
-
Microsystems, S.1
-
53
-
-
4644274612
-
Strong security for distributed file systems
-
January
-
E. Miller, D. Long, W. Freeman, and B. Reed. Strong security for distributed file systems. In Proceedings of the Conference on File and Storage Technologies (FAST 2002), pages 1-13, January 2002.
-
(2002)
Proceedings of the Conference on File and Storage Technologies (FAST 2002)
, pp. 1-13
-
-
Miller, E.1
Long, D.2
Freeman, W.3
Reed, B.4
-
54
-
-
21644432386
-
Secure and flexible global file sharing
-
S. Miltchev, V. Prevelakis, S. Ioannidis, J. Ioannidis, A. Keromytis, and J. Smith. Secure and flexible global file sharing. In Proceedings of the USENIX Technical Annual Conference, Freenix Track, 2003.
-
(2003)
Proceedings of the USENIX Technical Annual Conference, Freenix Track
-
-
Miltchev, S.1
Prevelakis, V.2
Ioannidis, S.3
Ioannidis, J.4
Keromytis, A.5
Smith, J.6
-
56
-
-
84880852861
-
Revocation and tracing schemes for stateless receivers
-
August
-
D. Naor, M. Naor, and J. Lotspiech. Revocation and tracing schemes for stateless receivers. In Proceedings of Crypto, volume 2139, pages 41-62, August 2001.
-
(2001)
Proceedings of Crypto
, vol.2139
, pp. 41-62
-
-
Naor, D.1
Naor, M.2
Lotspiech, J.3
-
57
-
-
0028514601
-
Kerberos: An authentication service for computer networks
-
September
-
B. C. Neumann and T. Ts'o. Kerberos: An authentication service for computer networks. IEEE Communications, 32(9):33-38, September 1994.
-
(1994)
IEEE Communications
, vol.32
, Issue.9
, pp. 33-38
-
-
Neumann, B.C.1
Ts'o, T.2
-
59
-
-
84858544236
-
Information technology - SCSI Object-Based Storage Device Commands -2 (OSD-2)
-
October
-
Information technology - SCSI Object-Based Storage Device Commands -2 (OSD-2). T10 Working Draft, October 2004. http://www.t10.org/ftp/t10/drafts/ osd2/osd2r00.pdf.
-
(2004)
T10 Working Draft
-
-
-
60
-
-
29844444147
-
The NFS version 4 protocol
-
May
-
B. Pawlowski, S. Shepler, C. Beame, B. Callaghan, M. Eisler, D. Noveck, D. Robinson, and R. Thurlow. The NFS version 4 protocol. SANE 2000, May 2000.
-
(2000)
SANE 2000
-
-
Pawlowski, B.1
Shepler, S.2
Beame, C.3
Callaghan, B.4
Eisler, M.5
Noveck, D.6
Robinson, D.7
Thurlow, R.8
-
61
-
-
85077741011
-
Storage-based intrusion detection: Watching storage activity for suspicious behavior
-
Washington, D.C., August
-
A. Pennington, J. Strunk, J. Griffin, C. Soules, G. Goodson, and G. Ganger. Storage-based intrusion detection: Watching storage activity for suspicious behavior, In 12th USENIX Security Symposium, Washington, D.C., August 2003.
-
(2003)
12th USENIX Security Symposium
-
-
Pennington, A.1
Strunk, J.2
Griffin, J.3
Soules, C.4
Goodson, G.5
Ganger, G.6
-
62
-
-
84858532769
-
-
PGPdisk. http://www.pgpi.org/products/pgpdisk/.
-
-
-
-
65
-
-
0342779118
-
A simplified approach to threshold and proactive RSA
-
T. Rabin. A simplified approach to threshold and proactive RSA. In Proceedings of Crypto, 1998.
-
(1998)
Proceedings of Crypto
-
-
Rabin, T.1
-
66
-
-
0033906295
-
Authenticating network attached storage
-
January
-
B. Reed, E. Chron, R. Burns, and D. D. E. Long. Authenticating network attached storage. IEEE Micro, 20(1):49-57, January 2000.
-
(2000)
IEEE Micro
, vol.20
, Issue.1
, pp. 49-57
-
-
Reed, B.1
Chron, E.2
Burns, R.3
Long, D.D.E.4
-
67
-
-
84962770253
-
Security considerations when designing a distributed file system using object storage devices
-
December
-
B. C. Reed, M. A. Smith, and D. Diklic. Security considerations when designing a distributed file system using object storage devices. In SISW, December 2002.
-
(2002)
SISW
-
-
Reed, B.C.1
Smith, M.A.2
Diklic, D.3
-
68
-
-
84943547553
-
Pond: The oceanstore prototype
-
S. Rhea, P. Eaton, D. Geels, H. Weatherspoon, B. Zhao, and J. Kubiatowicz. Pond: The oceanstore prototype. In Proceedings of the USENIX File and Storage Technologies Conference (FAST), 2003.
-
(2003)
Proceedings of the USENIX File and Storage Technologies Conference (FAST)
-
-
Rhea, S.1
Eaton, P.2
Geels, D.3
Weatherspoon, H.4
Zhao, B.5
Kubiatowicz, J.6
-
70
-
-
0024714097
-
Integrating security in a large distributed system
-
M. Satyanarayanan. Integrating security in a large distributed system. ACM Transactions on Computer Systems, 7(3):247-280, 1989.
-
(1989)
ACM Transactions on Computer Systems
, vol.7
, Issue.3
, pp. 247-280
-
-
Satyanarayanan, M.1
-
71
-
-
0025430451
-
Scalable, secure, and highly available distributed file access
-
May
-
M. Satyanarayanan. Scalable, secure, and highly available distributed file access. IEEE Computer, 23(5), May 1990.
-
(1990)
IEEE Computer
, vol.23
, Issue.5
-
-
Satyanarayanan, M.1
-
73
-
-
0018545449
-
How to share a secret
-
November
-
A. Shamir. How to share a secret. Comm. ACM, 24(11), November 1979.
-
(1979)
Comm. ACM
, vol.24
, Issue.11
-
-
Shamir, A.1
-
74
-
-
12844250119
-
NFS version 4 protocol
-
April
-
S. Shepler, B. Callaghan, D. Robinson, R. Thurlow, C. Beame, M. Eisler, and D. Noveck. NFS version 4 protocol. RFC 3530, April 2003.
-
(2003)
RFC
, vol.3530
-
-
Shepler, S.1
Callaghan, B.2
Robinson, D.3
Thurlow, R.4
Beame, C.5
Eisler, M.6
Noveck, D.7
-
75
-
-
84978374045
-
Self-securing storage: Protecting data in compromised systems
-
October
-
J. D. Strunk, G. R. Goodson, M. L. Scheinholtz, C. A. N. Soules, and G. R. Ganger. Self-Securing storage: Protecting data in compromised systems. In OSDI, October 2000.
-
(2000)
OSDI
-
-
Strunk, J.D.1
Goodson, G.R.2
Scheinholtz, M.L.3
Soules, C.A.N.4
Ganger, G.R.5
-
76
-
-
33244473388
-
The NFS distributed file service
-
November
-
The NFS distributed file service. A White Paper from SunSoft, November 1995.
-
(1995)
A White Paper from SunSoft
-
-
-
77
-
-
84858537280
-
-
E. Swank. SecureDrive. http://www.stack.nl/~galactus/remailers/ securedrive.html.
-
SecureDrive
-
-
Swank, E.1
-
80
-
-
84858537270
-
-
S. Winter. Sentry, http://www.softwinter.com/documentation/nt/sentry_2. htm.
-
Sentry
-
-
Winter, S.1
|