메뉴 건너뛰기




Volumn , Issue , 2008, Pages 21-26

Tahoe - The least-authority filesystem

Author keywords

Capabilities; Fault tolerance; Open source; Peer to peer

Indexed keywords

BACKUP SERVICE; CAPABILITIES; DESCRIPTORS; DISTRIBUTED STORAGE; ERASURE CODING; ERROR CONTROL CODE; FILESYSTEM; INFORMATION STORAGE AND RETRIEVAL; OPEN SOURCE; OPEN SOURCES; PEER-TO-PEER; PUBLIC KEY CRYPTOSYSTEMS; SECURITY AND PROTECTION;

EID: 67650346359     PISSN: 15437221     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1456469.1456474     Document Type: Conference Paper
Times cited : (134)

References (30)
  • 1
    • 70349238245 scopus 로고    scopus 로고
    • allmydata.org web site, 2007.
    • allmydata.org web site, 2007.
  • 2
    • 70349244305 scopus 로고    scopus 로고
    • R. Anderson. 'trusted computing' frequently asked questions, 2003. [Online; accessed 26-May-2008].
    • R. Anderson. 'trusted computing' frequently asked questions, 2003. [Online; accessed 26-May-2008].
  • 3
    • 35248822352 scopus 로고    scopus 로고
    • J. Black, P. Rogaway, and T. Shrimpton. Encryption-scheme security in the presence of key-dependent messages. In In Selected Areas in Cryptography, 2595 of LNCS, pages 62{75. Springer-Verlag, 2002.
    • J. Black, P. Rogaway, and T. Shrimpton. Encryption-scheme security in the presence of key-dependent messages. In In Selected Areas in Cryptography, volume 2595 of LNCS, pages 62{75. Springer-Verlag, 2002.
  • 4
    • 70349244304 scopus 로고    scopus 로고
    • One-up problem for (ec)dsa. Cryptology ePrint Archive
    • Report 2008/286
    • D. R. L. Brown. One-up problem for (ec)dsa. Cryptology ePrint Archive, Report 2008/286, 2008.
    • (2008)
    • Brown, D.R.L.1
  • 6
    • 70349241171 scopus 로고
    • Programming semantics for multiprogrammed computations
    • 26(1):29{35
    • J. B. Dennis and E. C. V. Horn. Programming semantics for multiprogrammed computations. Commun. ACM, 26(1):29{35, 1983.
    • (1983) Commun. ACM
    • Dennis, J.B.1    Horn, E.C.V.2
  • 11
    • 51849094729 scopus 로고    scopus 로고
    • On the (im)possibility of key dependent encryption. Cryptology ePrint Archive
    • Report 2008/164
    • I. Haitner and T. Holenstein. On the (im)possibility of key dependent encryption. Cryptology ePrint Archive, Report 2008/164, 2008.
    • (2008)
    • Haitner, I.1    Holenstein, T.2
  • 14
    • 74049103479 scopus 로고    scopus 로고
    • A. Juels and J. Burton S. Kaliski. Pors: proofs of retrievability for large files. In CCS '07: Proceedings of the 14th ACM conference on Computer and communications security, pages 584{597, New York, NY, USA, 2007. ACM.
    • A. Juels and J. Burton S. Kaliski. Pors: proofs of retrievability for large files. In CCS '07: Proceedings of the 14th ACM conference on Computer and communications security, pages 584{597, New York, NY, USA, 2007. ACM.
  • 15
    • 70349242721 scopus 로고    scopus 로고
    • J. Kelsey, B. Schneier, and D. Wagner. Protocol interactions and the chosen protocol attack. In In Proc. 1997 Security Protocols Workshop, pages 91{104. Springer-Verlag, 1997.
    • J. Kelsey, B. Schneier, and D. Wagner. Protocol interactions and the chosen protocol attack. In In Proc. 1997 Security Protocols Workshop, pages 91{104. Springer-Verlag, 1997.
  • 17
    • 36849013675 scopus 로고    scopus 로고
    • Beyond one-third faulty replicas in byzantine fault tolerant systems
    • USENIX
    • J. Li and D. Mazifieres. Beyond one-third faulty replicas in byzantine fault tolerant systems. In NSDI. USENIX, 2007.
    • (2007) NSDI
    • Li, J.1    Mazifieres, D.2
  • 20
    • 84958802026 scopus 로고    scopus 로고
    • R. C. Merkle. A digital signature based on a conventional encryption function. In CRYPTO '87: A Conference on the Theory and Applications of Cryptographic Techniques on Advances in Cryptology, pages 369{378, London, UK, 1988. Springer-Verlag.
    • R. C. Merkle. A digital signature based on a conventional encryption function. In CRYPTO '87: A Conference on the Theory and Applications of Cryptographic Techniques on Advances in Cryptology, pages 369{378, London, UK, 1988. Springer-Verlag.
  • 22
    • 33646166700 scopus 로고    scopus 로고
    • Capability myths demolished
    • Technical report, Combex, Inc
    • M. S. Miller, K. P. Yee, and J. Shapiro. Capability myths demolished. Technical report, Combex, Inc., 2003.
    • (2003)
    • Miller, M.S.1    Yee, K.P.2    Shapiro, J.3
  • 23
    • 0002885224 scopus 로고    scopus 로고
    • Prudent engineering practice for cryptographic protocols
    • 22:122{136
    • R. Needham. Prudent engineering practice for cryptographic protocols. IEEE Transactions on Software Engineering, 22:122{136, 1996.
    • (1996) IEEE Transactions on Software Engineering
    • Needham, R.1
  • 24
    • 84936033986 scopus 로고
    • The digital signature standard
    • NIST, 35(7):36{40
    • NIST. The digital signature standard. Commun. ACM, 35(7):36{40, 1992.
    • (1992) Commun. ACM
  • 26
    • 51549120471 scopus 로고    scopus 로고
    • B. Preneel and P. C. V. Oorschot. Mdx-mac and building fast macs from hash functions. pages 1{14. Springer-Verlag, 1995.
    • B. Preneel and P. C. V. Oorschot. Mdx-mac and building fast macs from hash functions. pages 1{14. Springer-Verlag, 1995.
  • 27
    • 0043126255 scopus 로고    scopus 로고
    • A method for obtaining digital signatures and public-key cryptosystems
    • Technical Report MIT/LCS/TM-82, MIT, 1977
    • R. L. Rivest, A. Shamir, and L. M. Adelman. A method for obtaining digital signatures and public-key cryptosystems. Technical Report MIT/LCS/TM-82, MIT, 1977.
    • Rivest, R.L.1    Shamir, A.2    Adelman, L.M.3
  • 28
    • 70349255206 scopus 로고    scopus 로고
    • L. Rizzo. the feasibility of software fec. Technical Report LR-970131, DEIT, 1997.
    • L. Rizzo. the feasibility of software fec. Technical Report LR-970131, DEIT, 1997.
  • 29
    • 70349233411 scopus 로고    scopus 로고
    • Wikipedia. Hushmail | Wikipedia, the free encyclopedia, 2008. [Online; accessed 26-May-2008].
    • Wikipedia. Hushmail | Wikipedia, the free encyclopedia, 2008. [Online; accessed 26-May-2008].
  • 30
    • 70349247360 scopus 로고    scopus 로고
    • Z. Wilcox-O'Hearn. convergent encryption reconsidered, 2008. [Online; accessed 18-Aug-2008].
    • Z. Wilcox-O'Hearn. convergent encryption reconsidered, 2008. [Online; accessed 18-Aug-2008].


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.