메뉴 건너뛰기




Volumn , Issue , 2007, Pages 114-125

Capability based secure access control to networked storage devices

Author keywords

Access control; Capability based security protocol; Networked storage; Security; Storage; Virtualization

Indexed keywords

CONTROL SYSTEMS; DATA STORAGE EQUIPMENT; LAND USE; MECHANISMS; NETWORK COMPONENTS; SECURITY SYSTEMS; TELECOMMUNICATION NETWORKS;

EID: 47249111384     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/MSST.2007.4367968     Document Type: Conference Paper
Times cited : (11)

References (29)
  • 3
    • 47249095818 scopus 로고    scopus 로고
    • Scsi primary commands. http://www.t10.org/ftp/t10/drafts/spc4/spc4r09. pdf.
    • Scsi primary commands
  • 4
    • 47249116598 scopus 로고    scopus 로고
    • Storage networking industry association
    • Storage networking industry association. http://www.snia.org.
  • 5
    • 47249117037 scopus 로고    scopus 로고
    • Technical committee t10
    • Technical committee t10. http://www.t10.org.
  • 6
    • 47249153978 scopus 로고    scopus 로고
    • Virtual pc overview. http://www.microsoft.com/windows/virtualpc/ evaluation/techoverview.mspx.
    • Virtual pc overview
  • 7
    • 47249159906 scopus 로고    scopus 로고
    • Scsi object-based storage device commands. In T10 Technical Committee of INCITS, October 4, 2004.
    • Scsi object-based storage device commands. In T10 Technical Committee of INCITS, October 4, 2004.
  • 11
    • 21644433634 scopus 로고    scopus 로고
    • P. Barham, B. Dragovic, K. Fraser, S. Hand, T. Harris, A. Ho, R. Neugebauery, I. Pratt, and A. Warfield. Xen and the art of virtualization. In In Proceedings of the 19th ACM Symposium on Operating Systems Principles, October 2003.
    • P. Barham, B. Dragovic, K. Fraser, S. Hand, T. Harris, A. Ho, R. Neugebauery, I. Pratt, and A. Warfield. Xen and the art of virtualization. In In Proceedings of the 19th ACM Symposium on Operating Systems Principles, October 2003.
  • 18
    • 47249132115 scopus 로고    scopus 로고
    • Enforcing confinement in distributed storage and a cryptographic model for access control. Cryptology ePrint Archive
    • Report 2005/169
    • S. Halevi, P. A. Karger, and D. Naor. Enforcing confinement in distributed storage and a cryptographic model for access control. Cryptology ePrint Archive, Report 2005/169, 2005. http://eprint.iacr.org/.
    • (2005)
    • Halevi, S.1    Karger, P.A.2    Naor, D.3
  • 19
    • 0003653892 scopus 로고    scopus 로고
    • Postmark: A new file system benchmark
    • TR-3022
    • J. Katcher. Postmark: A new file system benchmark. In NetApp Technical Report TR-3022, 1997.
    • (1997) NetApp Technical Report
    • Katcher, J.1
  • 26
    • 0033906295 scopus 로고    scopus 로고
    • Authenticating network-attached storage
    • B. C. Reed, E. G. Chron, R. C. Burns, and D. D. E. Long. Authenticating network-attached storage. IEEE Micro, 20(1 ):49-57, 2000.
    • (2000) IEEE Micro , vol.20 , Issue.1 , pp. 49-57
    • Reed, B.C.1    Chron, E.G.2    Burns, R.C.3    Long, D.D.E.4
  • 27
    • 47249103437 scopus 로고    scopus 로고
    • R. Rose. Survey of system virtualization techniques
    • R. Rose. Survey of system virtualization techniques.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.