메뉴 건너뛰기




Volumn , Issue , 2005, Pages 9-25

Securing distributed storage: Challenges, techniques, and systems

Author keywords

Authorization; Confidentiality; Integrity; Intrusion detection; Privacy

Indexed keywords

AUTHORIZATION; CONFIDENTIALITY; INTEGRITY; INTRUSION DETECTION; PRIVACY;

EID: 33244454312     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1103780.1103783     Document Type: Conference Paper
Times cited : (92)

References (81)
  • 2
    • 84858536870 scopus 로고    scopus 로고
    • The Directive 2002/58/EC of the European Parliament and of the Council
    • The Directive 2002/58/EC of the European Parliament and of the Council. http://europa.eu.int/eur-lex/pri/en/oj/dat/2002/1_201/1_20120020731en00%370047. pdf.
  • 6
    • 8744256700 scopus 로고    scopus 로고
    • The Sarbanes-Oxley Act of 2002. http://news.findlaw.com/hdocs/docs/ gwbush/sarbanesoxley072302.pdf, 2002.
    • (2002) The Sarbanes-Oxley Act of 2002
  • 8
    • 0003516333 scopus 로고    scopus 로고
    • Intrusion detection systems: A survey and taxonomy
    • Chalmers University, Sweden
    • S. Axelsson. Intrusion detection systems: A survey and taxonomy. White Paper, Chalmers University, Sweden, 2000.
    • (2000) White Paper
    • Axelsson, S.1
  • 16
    • 1242295762 scopus 로고    scopus 로고
    • File integrity checkers. http://ww.serverfiles.com/Network-security- software/File-integrity-checkers/date/.
    • File Integrity Checkers
  • 17
    • 33244475234 scopus 로고    scopus 로고
    • Encrypting File System for Windows 2000
    • July
    • M. Corporation. Encrypting File System for Windows 2000. White Paper, July 1999.
    • (1999) White Paper
  • 23
    • 33244462962 scopus 로고    scopus 로고
    • LIPKEY - A low infrastructure public key mechanism using SPKM
    • June
    • M. Eisler. LIPKEY - a low infrastructure public key mechanism using SPKM. RFC 2847, June 2000.
    • (2000) RFC , vol.2847
    • Eisler, M.1
  • 24
    • 1642380692 scopus 로고    scopus 로고
    • RPCSEC_GSS protocol specification
    • September
    • M. Eisler, A. Chiu, and L. Ling. RPCSEC_GSS protocol specification. RFC 2203, September 1997.
    • (1997) RFC , vol.2203
    • Eisler, M.1    Chiu, A.2    Ling, L.3
  • 25
    • 0003229196 scopus 로고    scopus 로고
    • The SSL protocol version 3.0
    • (draft-freier-ssl-version3-02.txt), Networking Group, March
    • A. O. Freier, P. Karlton, and P. C. Kocher. The SSL Protocol Version 3.0. Internet Draft (draft-freier-ssl-version3-02.txt), Networking Group, March 1996. http://wp.netscape.com/eng/ssl3/ssl-toc.html.
    • (1996) Internet Draft
    • Freier, A.O.1    Karlton, P.2    Kocher, P.C.3
  • 31
    • 4244158697 scopus 로고    scopus 로고
    • Security for network attached storage devices
    • Carnegie Mellon University
    • H. Gobioff, G. Gibson, and D. Tygar. Security for network attached storage devices. Technical report, Carnegie Mellon University, 1997.
    • (1997) Technical Report
    • Gobioff, H.1    Gibson, G.2    Tygar, D.3
  • 33
    • 33244488406 scopus 로고    scopus 로고
    • Cryptology ePrint Archive, Report 2003/216
    • E.-J. Goh. Secure indexes. Cryptology ePrint Archive, Report 2003/216, 2003. http://eprint.iacr.org/2003/216/.
    • (2003) Secure Indexes
    • Goh, E.-J.1
  • 38
    • 84858535249 scopus 로고    scopus 로고
    • Jetico. BestCrypt. http://www.jetico.com/download.htm.
    • BestCrypt
  • 39
    • 33244456919 scopus 로고    scopus 로고
    • Evaluating security tools towards usable security: A usability taxonomy for the evaluation of security tools based on a categorization of user errors
    • Usability
    • J. Kaiser and M. Reichenbach. Evaluating security tools towards usable security: A usability taxonomy for the evaluation of security tools based on a categorization of user errors. Technical report, Usability, 2002.
    • (2002) Technical Report
    • Kaiser, J.1    Reichenbach, M.2
  • 42
    • 0003068282 scopus 로고    scopus 로고
    • Security architecture for the Internet protocol
    • Network Working Group, November
    • A. Kent and R. Atkinson. Security architecture for the Internet protocol. RFC 2401, Network Working Group, November 1998. http://www.ietf.org/rfc/ rfc2401.txt.
    • (1998) RFC , vol.2401
    • Kent, A.1    Atkinson, R.2
  • 43
    • 84948164689 scopus 로고    scopus 로고
    • Decentralized authentication mechanisms for object-based storage devices
    • October
    • V. Kher and Y. Kim. Decentralized authentication mechanisms for object-based storage devices. In IEEE SISW, October 2003.
    • (2003) IEEE SISW
    • Kher, V.1    Kim, Y.2
  • 46
    • 77952379905 scopus 로고    scopus 로고
    • Secure untrusted data repository (SUNDR)
    • December
    • J. Li, M. Krohn, D. Mazires, and D. Shasha. Secure untrusted data repository (SUNDR). In OSDI, December 2004.
    • (2004) OSDI
    • Li, J.1    Krohn, M.2    Mazires, D.3    Shasha, D.4
  • 47
    • 0042277157 scopus 로고
    • Generic security service application program interface
    • September
    • J. Linn. Generic security service application program interface. Request for Comments 1508, September 1993.
    • (1993) Request for Comments , vol.1508
    • Linn, J.1
  • 48
    • 0012023903 scopus 로고    scopus 로고
    • The kerberos version 5 GSS-API mechanism
    • June
    • J. Linn. The kerberos version 5 GSS-API mechanism. RFC 1964, June 1996.
    • (1996) RFC , vol.1964
    • Linn, J.1
  • 51
    • 0002586876 scopus 로고
    • A digital signature based on a conventional encryption function
    • R. Merkle. A digital signature based on a conventional encryption function. In CRYPTO, 1987.
    • (1987) CRYPTO
    • Merkle, R.1
  • 52
  • 56
    • 84880852861 scopus 로고    scopus 로고
    • Revocation and tracing schemes for stateless receivers
    • August
    • D. Naor, M. Naor, and J. Lotspiech. Revocation and tracing schemes for stateless receivers. In Proceedings of Crypto, volume 2139, pages 41-62, August 2001.
    • (2001) Proceedings of Crypto , vol.2139 , pp. 41-62
    • Naor, D.1    Naor, M.2    Lotspiech, J.3
  • 57
    • 0028514601 scopus 로고
    • Kerberos: An authentication service for computer networks
    • September
    • B. C. Neumann and T. Ts'o. Kerberos: An authentication service for computer networks. IEEE Communications, 32(9):33-38, September 1994.
    • (1994) IEEE Communications , vol.32 , Issue.9 , pp. 33-38
    • Neumann, B.C.1    Ts'o, T.2
  • 59
    • 84858544236 scopus 로고    scopus 로고
    • Information technology - SCSI Object-Based Storage Device Commands -2 (OSD-2)
    • October
    • Information technology - SCSI Object-Based Storage Device Commands -2 (OSD-2). T10 Working Draft, October 2004. http://www.t10.org/ftp/t10/drafts/ osd2/osd2r00.pdf.
    • (2004) T10 Working Draft
  • 62
    • 84858532769 scopus 로고    scopus 로고
    • PGPdisk. http://www.pgpi.org/products/pgpdisk/.
  • 65
    • 0342779118 scopus 로고    scopus 로고
    • A simplified approach to threshold and proactive RSA
    • T. Rabin. A simplified approach to threshold and proactive RSA. In Proceedings of Crypto, 1998.
    • (1998) Proceedings of Crypto
    • Rabin, T.1
  • 66
    • 0033906295 scopus 로고    scopus 로고
    • Authenticating network attached storage
    • January
    • B. Reed, E. Chron, R. Burns, and D. D. E. Long. Authenticating network attached storage. IEEE Micro, 20(1):49-57, January 2000.
    • (2000) IEEE Micro , vol.20 , Issue.1 , pp. 49-57
    • Reed, B.1    Chron, E.2    Burns, R.3    Long, D.D.E.4
  • 67
    • 84962770253 scopus 로고    scopus 로고
    • Security considerations when designing a distributed file system using object storage devices
    • December
    • B. C. Reed, M. A. Smith, and D. Diklic. Security considerations when designing a distributed file system using object storage devices. In SISW, December 2002.
    • (2002) SISW
    • Reed, B.C.1    Smith, M.A.2    Diklic, D.3
  • 70
    • 0024714097 scopus 로고
    • Integrating security in a large distributed system
    • M. Satyanarayanan. Integrating security in a large distributed system. ACM Transactions on Computer Systems, 7(3):247-280, 1989.
    • (1989) ACM Transactions on Computer Systems , vol.7 , Issue.3 , pp. 247-280
    • Satyanarayanan, M.1
  • 71
    • 0025430451 scopus 로고
    • Scalable, secure, and highly available distributed file access
    • May
    • M. Satyanarayanan. Scalable, secure, and highly available distributed file access. IEEE Computer, 23(5), May 1990.
    • (1990) IEEE Computer , vol.23 , Issue.5
    • Satyanarayanan, M.1
  • 73
    • 0018545449 scopus 로고
    • How to share a secret
    • November
    • A. Shamir. How to share a secret. Comm. ACM, 24(11), November 1979.
    • (1979) Comm. ACM , vol.24 , Issue.11
    • Shamir, A.1
  • 76
    • 33244473388 scopus 로고
    • The NFS distributed file service
    • November
    • The NFS distributed file service. A White Paper from SunSoft, November 1995.
    • (1995) A White Paper from SunSoft
  • 77
    • 84858537280 scopus 로고    scopus 로고
    • E. Swank. SecureDrive. http://www.stack.nl/~galactus/remailers/ securedrive.html.
    • SecureDrive
    • Swank, E.1
  • 79
    • 85084161247 scopus 로고    scopus 로고
    • Why Johnny can't encrypt: A usability evaluation of PGP 5.0
    • A. Whitten and J. D. Tygar. Why Johnny can't encrypt: A usability evaluation of PGP 5.0. In 8th USENIX Security Symposium, 1999.
    • (1999) 8th USENIX Security Symposium
    • Whitten, A.1    Tygar, J.D.2
  • 80
    • 84858537270 scopus 로고    scopus 로고
    • S. Winter. Sentry, http://www.softwinter.com/documentation/nt/sentry_2. htm.
    • Sentry
    • Winter, S.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.