-
2
-
-
21644453586
-
Threat analysis of the Domain Name System (DNS)
-
August
-
D. Atkins and R. Austein. Threat Analysis of the Domain Name System (DNS). RFC 3833, August 2004.
-
(2004)
RFC
, vol.3833
-
-
Atkins, D.1
Austein, R.2
-
4
-
-
84858532832
-
-
California Senate. California Database Breach Act (SB 1386)
-
California Senate. California Database Breach Act (SB 1386). http://info.sen.ca.gov/pub/01-02/bill/sen/sb.1351-1400/sb-1386-bill-20020926- chaptered.html, 2002.
-
(2002)
-
-
-
5
-
-
84858551005
-
-
Centers for Medicare & Medicaid Services. The Health Insurance Portability and Accountability Act of 1996 (HIPAA). http://www.cms.hhs.gov/ hipaa/, 1996.
-
(1996)
-
-
-
6
-
-
0028444938
-
RAID: High-performance, reliable secondary storage
-
P. M. Chen, E. K. Lee, G. A. Gibson, R. H. Katz, and D. A. Patterson. RAID: High-Performance, Reliable Secondary Storage. In A CM Computing Surveys 26(2), pages 145-185, 1994.
-
(1994)
A CM Computing Surveys
, vol.26
, Issue.2
, pp. 145-185
-
-
Chen, P.M.1
Lee, E.K.2
Gibson, G.A.3
Katz, R.H.4
Patterson, D.A.5
-
8
-
-
85084160792
-
Understanding data lifetime via whole system simulation
-
J. Chow, B. Pfaff, T. Garfinkel, K. Christopher, and M. Rosenblum. Understanding Data Lifetime via Whole System Simulation. In Proc. of 13th Usenix Security Symposium, 2004.
-
(2004)
Proc. of 13th Usenix Security Symposium
-
-
Chow, J.1
Pfaff, B.2
Garfinkel, T.3
Christopher, K.4
Rosenblum, M.5
-
10
-
-
84870699962
-
Threat modelling for security tokens in web applications
-
D. D. Cock, K. Wouters, D. Schellekens, D. Singele, and B. Preneel. Threat Modelling for Security Tokens in Web Applications. In Proc. of the IFIP TC6/TC11 International Conference on Communications and Multimedia Security (CMS), pages 183-193, 2004.
-
(2004)
Proc. of the IFIP TC6/TC11 International Conference on Communications and Multimedia Security (CMS)
, pp. 183-193
-
-
Cock, D.D.1
Wouters, K.2
Schellekens, D.3
Singele, D.4
Preneel, B.5
-
12
-
-
33244479789
-
Towards securing information end-to-end: Networked storage security update and best practices
-
February
-
A. Edmonds. Towards Securing Information End-to-End: Networked Storage Security Update and Best Practices. White Paper, February 2003.
-
(2003)
White Paper
-
-
Edmonds, A.1
-
13
-
-
33244480009
-
-
Federal Trade Commission. Gramm-Leach-Bliley Act of 1999
-
Federal Trade Commission. Gramm-Leach-Bliley Act of 1999.
-
-
-
-
14
-
-
3042825662
-
Remembrance of data passed: A study of disk sanitization practices
-
January/February
-
S. Garfinkel and A. Shelat. Remembrance of Data Passed: A Study of Disk Sanitization Practices. IEEE Security & Privacy, pages 17-27, January/February 2003.
-
(2003)
IEEE Security & Privacy
, pp. 17-27
-
-
Garfinkel, S.1
Shelat, A.2
-
17
-
-
33244465495
-
The emerging storage security challenge
-
September
-
J. Gruener and M. Kovar. The Emerging Storage Security Challenge. Yankee Group Report, September 2003.
-
(2003)
Yankee Group Report
-
-
Gruener, J.1
Kovar, M.2
-
18
-
-
21844445612
-
The techniques and challenges of immutable storage for applications in multimedia
-
R. Hasan, J. Tucek, P. Stanton, W. Yurcik, L. Brumbaugh, J. Rosendale, and R. Boonstra. The Techniques and Challenges of Immutable Storage for Applications in Multimedia. In IS&T/SPIE International Symposium Electronic Imaging / Storage and Retrieval Methods and Applications for Multimedia (EI121), 2005.
-
(2005)
IS&T/SPIE International Symposium Electronic Imaging / Storage and Retrieval Methods and Applications for Multimedia (EI121)
-
-
Hasan, R.1
Tucek, J.2
Stanton, P.3
Yurcik, W.4
Brumbaugh, L.5
Rosendale, J.6
Boonstra, R.7
-
20
-
-
33244459003
-
Understanding storage security
-
February
-
HP. Understanding Storage Security. RFC 3833, February 2005.
-
(2005)
RFC
, vol.3833
-
-
-
22
-
-
0031371938
-
Doc, wyatt, and virgil: Prototyping storage jamming defenses
-
J. McDermott, R. Gelinas, and S. Ornstein. Doc, Wyatt, and Virgil: Prototyping Storage Jamming Defenses. In 13th Annual Computer Security Applications Conference (ACSAC), 1997.
-
(1997)
13th Annual Computer Security Applications Conference (ACSAC)
-
-
McDermott, J.1
Gelinas, R.2
Ornstein, S.3
-
24
-
-
0005475811
-
Replication does survive information warfare attacks
-
J. P. McDermott. Replication Does Survive Information Warfare Attacks. In IFIP Workshop on Database Security, pages 219-228, 1997.
-
(1997)
IFIP Workshop on Database Security
, pp. 219-228
-
-
McDermott, J.P.1
-
27
-
-
85077741011
-
StOrage-Based Intrusion Detection: Watching storage activity for suspicious behavior
-
A. Pennington, J. Strunk, J. Griffin, C. Soules, G. Goodson, and G. Ganger. Storage-Based Intrusion Detection: Watching Storage Activity for Suspicious Behavior. In Proc. of Usenix Security Symposium, 2003.
-
(2003)
Proc. of Usenix Security Symposium
-
-
Pennington, A.1
Strunk, J.2
Griffin, J.3
Soules, C.4
Goodson, G.5
Ganger, G.6
-
29
-
-
33244492553
-
File profiling for insider threats
-
February
-
P. Reiher. File Profiling for Insider Threats. Technical Report, February 2002.
-
(2002)
Technical Report
-
-
Reiher, P.1
-
31
-
-
0042352263
-
Deciding when to forget in the elephant file system
-
D. S. Santry, M. J. Feeley, N. C. Hutchinson, A. C. Veitch, R. W. Carton, and J. Ofir. Deciding When to Forget in the Elephant File System. In Proc. of the Seventeenth ACM Symposium on Operating Systems Principles (SOSP), pages 110-123, 1999.
-
(1999)
Proc. of the Seventeenth ACM Symposium on Operating Systems Principles (SOSP)
, pp. 110-123
-
-
Santry, D.S.1
Feeley, M.J.2
Hutchinson, N.C.3
Veitch, A.C.4
Carton, R.W.5
Ofir, J.6
-
32
-
-
35248853499
-
How much security is enough to stop a thief?: The economics of outsider theft via computer systems and networks
-
S. Schechter and M. D. Smith. How Much Security Is Enough to Stop a Thief?: The Economics of Outsider Theft via Computer Systems and Networks. In Financial Cryptography, pages 122-137, 2003.
-
(2003)
Financial Cryptography
, pp. 122-137
-
-
Schechter, S.1
Smith, M.D.2
-
33
-
-
0002670359
-
Attack trees: Modeling security threats
-
December
-
B. Schneier. Attack Trees: Modeling Security Threats. Dr. Dobb's Journal, December 1999.
-
(1999)
Dr. Dobb's Journal
-
-
Schneier, B.1
-
37
-
-
84978374045
-
Self-securing storage: Protecting data in compromised systems
-
J. D. Strunk, G. R. Goodson, M. L. Scheinholtz, C. A. Soules, and G. R. Ganger. Self-Securing Storage: Protecting Data in Compromised Systems. In Proc. of the 4th Symposium on Operating Design and Implementation (OSDI), 2000.
-
(2000)
Proc. of the 4th Symposium on Operating Design and Implementation (OSDI)
-
-
Strunk, J.D.1
Goodson, G.R.2
Scheinholtz, M.L.3
Soules, C.A.4
Ganger, G.R.5
-
39
-
-
27144504167
-
Trade-offs in protecting storage: A meta-data comparison of cryptographic, backup/versioning, immutable/tamper-proof, and redundant storage solutions
-
J. Tucek, P. Stanton, E. Haubert, R. Hasan, L. Brumbaugh, and W. Yurcik. Trade-offs in Protecting Storage: A Meta-Data Comparison of Cryptographic, Backup/Versioning, Immutable/Tamper-Proof, and Redundant Storage Solutions. In 2nd IEEE - 13th NASA Goddard Conference on Mass Storage Systems and Technologies (MSST), 2005.
-
(2005)
2nd IEEE - 13th NASA Goddard Conference on Mass Storage Systems and Technologies (MSST)
-
-
Tucek, J.1
Stanton, P.2
Haubert, E.3
Hasan, R.4
Brumbaugh, L.5
Yurcik, W.6
-
40
-
-
84858551003
-
-
U.S. Securities and Exchange Commission. Sarbanes-Oxley Act of 2002. http://www.sarbanes-oxley-forum.com/.
-
-
-
-
41
-
-
33244460199
-
CA security hole points to data backup threats
-
August
-
J. Vijayan. CA Security Hole Points to Data Backup Threats. Computerworld, August 2005.
-
(2005)
Computerworld
-
-
Vijayan, J.1
-
42
-
-
0342410321
-
Survivable information storage systems
-
J. J. Wylie, M. W. Bigrigg, J. D. Strunk, G. R. Ganger, H. Kilite, and P. K. Khosla. Survivable Information Storage Systems. IEEE Computer, 33(8):61-68, 2000.
-
(2000)
IEEE Computer
, vol.33
, Issue.8
, pp. 61-68
-
-
Wylie, J.J.1
Bigrigg, M.W.2
Strunk, J.D.3
Ganger, G.R.4
Kilite, H.5
Khosla, P.K.6
|