메뉴 건너뛰기




Volumn 7, Issue 4, 2009, Pages 29-34

Disposal of disk and tape data by secure sanitization

Author keywords

ANSI; Data encryption; Data sanitization; Degaussing; Enhanced secure erase; FIPS 140; Information resource management; Legal; Mass storage; NIST 800 88; Secure erase; Security and privacy protection; Storage management; Trusted Computing Group

Indexed keywords

ANSI; DATA ENCRYPTION; DATA SANITIZATION; ENHANCED SECURE ERASE; FIPS 140; INFORMATION RESOURCE MANAGEMENT; LEGAL; MASS STORAGE; NIST 800-88; SECURE ERASE; SECURITY AND PRIVACY PROTECTION; STORAGE MANAGEMENT; TRUSTED COMPUTING GROUP;

EID: 70349319750     PISSN: 15407993     EISSN: None     Source Type: Journal    
DOI: 10.1109/MSP.2009.89     Document Type: Article
Times cited : (27)

References (15)
  • 1
    • 3042825662 scopus 로고    scopus 로고
    • A Study of Disk Sanitiza- 1. tion Practices
    • S. Garfinkel and A. Shelat, "A Study of Disk Sanitiza- 1. tion Practices," IEEE Security & Privacy, vol.1, no.1, 2003, pp. 17-27.
    • (2003) IEEE Security & Privacy , vol.1 , Issue.1 , pp. 17-27
    • Garfinkel, S.1    Shelat, A.2
  • 2
    • 84869623369 scopus 로고    scopus 로고
    • Special Publication 800-888, Computer Security Division, Information Technology Lab., National Inst. of Standards and Technology
    • Guidelines for Media Sanitization 2. , Special Publication 800-888, Computer Security Division, Information Technology Lab., National Inst. of Standards and Technology, Sept. 2006; http://csrc.nist.gov/publications/ nistpubs/800-88/NISTSP800-88-rev1.pdf.
    • (2006) Guidelines for Media Sanitization , vol.2
  • 3
    • 70349349755 scopus 로고
    • DoD 5220.22R, US Dept. of Defense, Dec
    • Industrial Security Regulation 3. , DoD 5220.22R, US Dept. of Defense, Dec. 1985.
    • (1985) Industrial Security Regulation 3
  • 6
    • 0035356837 scopus 로고    scopus 로고
    • Spin-Stand Imaging of Overwrit- 6. ten Data and Its Comparison with Magnetic Force Microscopy
    • 1 June
    • D. Mayergoyz et al., "Spin-Stand Imaging of Overwrit- 6. ten Data and Its Comparison with Magnetic Force Microscopy," J. Applied Physics, 1 June 2001, pp. 6772-6774.
    • (2001) J. Applied Physics , pp. 6772-6774
    • Mayergoyz, D.1
  • 7
    • 20944433271 scopus 로고    scopus 로고
    • Whole-Track Imaging and Diagnostics of 7. Hard Disk Data Using the Spin-Stand Imaging Technique
    • 17 May article 10P104
    • C. Tse et al., "Whole-Track Imaging and Diagnostics of 7. Hard Disk Data Using the Spin-Stand Imaging Technique," J. Applied Physics, 17 May 2005, article 10P104.
    • (2005) J. Applied Physics
    • Tse, C.1
  • 8
    • 0004610703 scopus 로고    scopus 로고
    • Secure Deletion of Data from Magnet- 8. ic and Solid-State Memory
    • Usenix Assoc
    • P. Gutmann, "Secure Deletion of Data from Magnet- 8. ic and Solid-State Memory," Proc. 6th Usenix Security Symp., Usenix Assoc., 1996, pp. 8-24.
    • (1996) Proc. 6th Usenix Security Symp. , pp. 8-24
    • Gutmann, P.1
  • 10
    • 31344435093 scopus 로고    scopus 로고
    • Drive- 10. Independent Data Recovery: The Current State-of-the- Art
    • Feb.
    • C.H. Sobey, L. Orto, and G. Sakaguchi, "Drive- 10. Independent Data Recovery: The Current State-of-the- Art," IEEE Trans. Magnetics, Feb. 2006, pp. 188-193.
    • (2006) IEEE Trans. Magnetics , pp. 188-193
    • Sobey, C.H.1    Orto, L.2    Sakaguchi, G.3
  • 11
    • 84869636505 scopus 로고    scopus 로고
    • Nat'l Security Agency, Central Security Service, 4 Dec.
    • Degausser Evaluated Products List 11. , Nat'l Security Agency, Central Security Service, 4 Dec. 2007; www.nsa.gov/ia/-files/Government/MDG/NSA-CSS-EPL- 9-12.PDF.
    • (2007) Degausser Evaluated Products List , vol.11
  • 12
    • 84869631363 scopus 로고    scopus 로고
    • Best Practices 12
    • Oct.
    • S. Foskett, "Best Practices," 12. Storage, Oct. 2006; http:// searchstorage.techtarget.com/magazineArchives/ 0,296887,sid5-yea2006,00.html.
    • (2006) Storage
    • Foskett, S.1
  • 13
    • 0036706573 scopus 로고    scopus 로고
    • Wise Drives, 13
    • Aug.
    • G. Hughes, "Wise Drives," 13. IEEE Spectrum, Aug. 2002, pp. 37-41.
    • (2002) IEEE Spectrum , pp. 37-41
    • Hughes, G.1
  • 14
    • 85008036928 scopus 로고    scopus 로고
    • Trusted Computing for Disk Drives 14. and Other Peripherals
    • R. Thibadeau, "Trusted Computing for Disk Drives 14. and Other Peripherals," IEEE Security & Privacy, vol.4, no.5, 2006, pp. 26-33.
    • (2006) IEEE Security & Privacy , vol.4 , Issue.5 , pp. 26-33
    • Thibadeau, R.1
  • 15
    • 0003584029 scopus 로고    scopus 로고
    • Federal Information Processing Standards Publication 140-142, Information Technology Laboratory, National Inst. of Standards and Technology, 25 May
    • Security Requirements for Cryptographic Modules 15. , Federal Information Processing Standards Publication 140-142, Information Technology Laboratory, National Inst. of Standards and Technology, 25 May 2001; http://csrc. nist.gov/publications/fips/fips140-2/fips1402.pdf.
    • (2001) Security Requirements for Cryptographic Modules , vol.15


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.