-
2
-
-
21844467455
-
A Cryptographic File System For Unix
-
CCS, pp
-
M. Blaze, A Cryptographic File System For Unix, ACM Conf. on Comp, and Comm. Sec. (CCS), pp. 916, 1993.
-
(1993)
ACM Conf. on Comp, and Comm. Sec
, pp. 916
-
-
Blaze, M.1
-
3
-
-
4444361800
-
The Design and Implementation of a Transparent Cryptographic File System for Unix
-
G. Cattaneo, L. Catuogno, A. D. Sorbo, P. Persiano, The Design and Implementation of a Transparent Cryptographic File System for Unix, USENIX Ann. Tech. Conf., 2001.
-
(2001)
USENIX Ann. Tech. Conf
-
-
Cattaneo, G.1
Catuogno, L.2
Sorbo, A.D.3
Persiano, P.4
-
4
-
-
0034440650
-
An Architecture for GlobalScale Persistent Storage
-
J. Kubiatowicz, D. Bindel, Y. Chen, S. Czerwinski, P. Eaton, D. Geels, R. Gummadi, S. Rhea, H. Weatherspoon, W. Weimer, C. Wells, B. Zhao, An Architecture for GlobalScale Persistent Storage, Int. Conf. on Architectural Support for Programming Languages and Operating Systems (ASP-LOS), 2000.
-
(2000)
Int. Conf. on Architectural Support for Programming Languages and Operating Systems (ASP-LOS)
-
-
Kubiatowicz, J.1
Bindel, D.2
Chen, Y.3
Czerwinski, S.4
Eaton, P.5
Geels, D.6
Gummadi, R.7
Rhea, S.8
Weatherspoon, H.9
Weimer, W.10
Wells, C.11
Zhao, B.12
-
6
-
-
24644522168
-
-
A. Adya, W. J. Bolosky, M. Castro, G. Cermak, R. Chaiken, J. R. Douceur, J. Howell, J. R. Lorch, M. Theimer, R. P. Wattenhofer, FARSITE: Federated, Available, and Reliable Storage for an Incompletely Trusted Environment, OSDI, 2002.
-
(2002)
FARSITE: Federated, Available, and Reliable Storage for an Incompletely Trusted Environment, OSDI
-
-
Adya, A.1
Bolosky, W.J.2
Castro, M.3
Cermak, G.4
Chaiken, R.5
Douceur, J.R.6
Howell, J.7
Lorch, J.R.8
Theimer, M.9
Wattenhofer, R.P.10
-
8
-
-
85033460636
-
-
M. Kallahalla, E. Riedel, R. Swaminathan, Q. Wang, K. Fu, Plutus - Scalable Secure File Sharing on Untrusted Storage, USENIX FAST, 2003.
-
(2003)
Plutus - Scalable Secure File Sharing on Untrusted Storage, USENIX FAST
-
-
Kallahalla, M.1
Riedel, E.2
Swaminathan, R.3
Wang, Q.4
Fu, K.5
-
9
-
-
85033498470
-
-
E. Goh, H. Shacham, N. Modadugu, D. Boneh, SiRiUS: Securing Remote Untrusted Storage, NDSS, 2003.
-
(2003)
SiRiUS: Securing Remote Untrusted Storage, NDSS
-
-
Goh, E.1
Shacham, H.2
Modadugu, N.3
Boneh, D.4
-
11
-
-
0002679112
-
Network Attached Storage Architecture
-
G. Gibson, R. Van Meter, Network Attached Storage Architecture, Comm. ACM, Vol.43, No.11, 2000.
-
(2000)
Comm. ACM
, vol.43
, Issue.11
-
-
Gibson, G.1
Van Meter, R.2
-
15
-
-
0023962708
-
Cryptographic Implementation of a Tree Hierarchy for Access Control
-
R. S. Sandhu, Cryptographic Implementation of a Tree Hierarchy for Access Control, Information Processing Letters Vol. 27, no. 2, pp. 95-98, 1988.
-
(1988)
Information Processing Letters
, vol.27
, Issue.2
, pp. 95-98
-
-
Sandhu, R.S.1
-
16
-
-
18744363342
-
A Novel Key Management Scheme for Dynamic Access Control in a User Hierarchy
-
IEEE COMPSAC
-
T. Chen, Y. Chung,. Tian. A Novel Key Management Scheme for Dynamic Access Control in a User Hierarchy, IEEE COMPSAC, 2004.
-
(2004)
Tian
-
-
Chen, T.1
Chung, Y.2
-
18
-
-
33745793594
-
Dynamic and Efficient Key Management for Access Hierarchies
-
M. Atallah, K. Frikken, M. Blanton, Dynamic and Efficient Key Management for Access Hierarchies, ACM CCS, 2005.
-
(2005)
ACM CCS
-
-
Atallah, M.1
Frikken, K.2
Blanton, M.3
-
19
-
-
33749411730
-
-
M. Abd-El-Malek, G. R. Ganger, G. R. Goodson, M. K. Reiter, J. J. Wylie, Lazy Verification in Fault-tolerant Distributed Storage Systems, SRDS, 2005.
-
(2005)
Lazy Verification in Fault-tolerant Distributed Storage Systems, SRDS
-
-
Abd-El-Malek, M.1
Ganger, G.R.2
Goodson, G.R.3
Reiter, M.K.4
Wylie, J.J.5
-
21
-
-
21844448913
-
Protecting Multimedia Data in Storage: A Survey of Techniques Emphasizing Encryption
-
P. Stanton, W. Yurcik, L. Brumbaugh, Protecting Multimedia Data in Storage: A Survey of Techniques Emphasizing Encryption, SPIE, Volume 5682, pp. 18-29, 2004.
-
(2004)
SPIE
, vol.5682
, pp. 18-29
-
-
Stanton, P.1
Yurcik, W.2
Brumbaugh, L.3
-
22
-
-
0012994607
-
Performance of Elliptic Curve Cryptosystems
-
Technical Report, IC-00-08, May
-
J. Lopez and R. Dahab, Performance of Elliptic Curve Cryptosystems, Technical Report, IC-00-08, May 2000.
-
(2000)
-
-
Lopez, J.1
Dahab, R.2
|