-
1
-
-
3042825662
-
A Study of Disk Sanitiza- 1. tion Practices
-
S. Garfinkel and A. Shelat, "A Study of Disk Sanitiza- 1. tion Practices," IEEE Security & Privacy, vol.1, no.1, 2003, pp. 17-27.
-
(2003)
IEEE Security & Privacy
, vol.1
, Issue.1
, pp. 17-27
-
-
Garfinkel, S.1
Shelat, A.2
-
2
-
-
84869623369
-
-
Special Publication 800-888, Computer Security Division, Information Technology Lab., National Inst. of Standards and Technology
-
Guidelines for Media Sanitization 2. , Special Publication 800-888, Computer Security Division, Information Technology Lab., National Inst. of Standards and Technology, Sept. 2006; http://csrc.nist.gov/publications/ nistpubs/800-88/NISTSP800-88-rev1.pdf.
-
(2006)
Guidelines for Media Sanitization
, vol.2
-
-
-
3
-
-
70349349755
-
-
DoD 5220.22R, US Dept. of Defense, Dec
-
Industrial Security Regulation 3. , DoD 5220.22R, US Dept. of Defense, Dec. 1985.
-
(1985)
Industrial Security Regulation 3
-
-
-
6
-
-
0035356837
-
Spin-Stand Imaging of Overwrit- 6. ten Data and Its Comparison with Magnetic Force Microscopy
-
1 June
-
D. Mayergoyz et al., "Spin-Stand Imaging of Overwrit- 6. ten Data and Its Comparison with Magnetic Force Microscopy," J. Applied Physics, 1 June 2001, pp. 6772-6774.
-
(2001)
J. Applied Physics
, pp. 6772-6774
-
-
Mayergoyz, D.1
-
7
-
-
20944433271
-
Whole-Track Imaging and Diagnostics of 7. Hard Disk Data Using the Spin-Stand Imaging Technique
-
17 May article 10P104
-
C. Tse et al., "Whole-Track Imaging and Diagnostics of 7. Hard Disk Data Using the Spin-Stand Imaging Technique," J. Applied Physics, 17 May 2005, article 10P104.
-
(2005)
J. Applied Physics
-
-
Tse, C.1
-
8
-
-
0004610703
-
Secure Deletion of Data from Magnet- 8. ic and Solid-State Memory
-
Usenix Assoc
-
P. Gutmann, "Secure Deletion of Data from Magnet- 8. ic and Solid-State Memory," Proc. 6th Usenix Security Symp., Usenix Assoc., 1996, pp. 8-24.
-
(1996)
Proc. 6th Usenix Security Symp.
, pp. 8-24
-
-
Gutmann, P.1
-
9
-
-
70349352717
-
-
M. Geiger and L. Cantor, 9. Counter-Forensic Privacy Tools: A Forensic Evaluation, tech. report CMU-ISRI-05-119, Inst. for Software Research, School of Computer Science, Carnegie Mellon Univ., 2005.
-
9. Counter-Forensic Privacy Tools: A Forensic Evaluation, Tech. Report CMU-ISRI-05-119
, pp. 05-119
-
-
Geiger, M.1
Cantor, L.2
-
10
-
-
31344435093
-
Drive- 10. Independent Data Recovery: The Current State-of-the- Art
-
Feb.
-
C.H. Sobey, L. Orto, and G. Sakaguchi, "Drive- 10. Independent Data Recovery: The Current State-of-the- Art," IEEE Trans. Magnetics, Feb. 2006, pp. 188-193.
-
(2006)
IEEE Trans. Magnetics
, pp. 188-193
-
-
Sobey, C.H.1
Orto, L.2
Sakaguchi, G.3
-
11
-
-
84869636505
-
-
Nat'l Security Agency, Central Security Service, 4 Dec.
-
Degausser Evaluated Products List 11. , Nat'l Security Agency, Central Security Service, 4 Dec. 2007; www.nsa.gov/ia/-files/Government/MDG/NSA-CSS-EPL- 9-12.PDF.
-
(2007)
Degausser Evaluated Products List
, vol.11
-
-
-
12
-
-
84869631363
-
Best Practices 12
-
Oct.
-
S. Foskett, "Best Practices," 12. Storage, Oct. 2006; http:// searchstorage.techtarget.com/magazineArchives/ 0,296887,sid5-yea2006,00.html.
-
(2006)
Storage
-
-
Foskett, S.1
-
13
-
-
0036706573
-
Wise Drives, 13
-
Aug.
-
G. Hughes, "Wise Drives," 13. IEEE Spectrum, Aug. 2002, pp. 37-41.
-
(2002)
IEEE Spectrum
, pp. 37-41
-
-
Hughes, G.1
-
14
-
-
85008036928
-
Trusted Computing for Disk Drives 14. and Other Peripherals
-
R. Thibadeau, "Trusted Computing for Disk Drives 14. and Other Peripherals," IEEE Security & Privacy, vol.4, no.5, 2006, pp. 26-33.
-
(2006)
IEEE Security & Privacy
, vol.4
, Issue.5
, pp. 26-33
-
-
Thibadeau, R.1
-
15
-
-
0003584029
-
-
Federal Information Processing Standards Publication 140-142, Information Technology Laboratory, National Inst. of Standards and Technology, 25 May
-
Security Requirements for Cryptographic Modules 15. , Federal Information Processing Standards Publication 140-142, Information Technology Laboratory, National Inst. of Standards and Technology, 25 May 2001; http://csrc. nist.gov/publications/fips/fips140-2/fips1402.pdf.
-
(2001)
Security Requirements for Cryptographic Modules
, vol.15
-
-
|