메뉴 건너뛰기




Volumn , Issue , 2007, Pages 77-84

Non-volatile memory and disks: Avenues for policy architectures

Author keywords

Labels; NVRAM; Security; Storage

Indexed keywords

ACCESS CONTROL; MEMORY ARCHITECTURE; NETWORK SECURITY; RANDOM ACCESS STORAGE;

EID: 74049149531     PISSN: 15437221     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1314466.1314479     Document Type: Conference Paper
Times cited : (7)

References (48)
  • 3
    • 0003400255 scopus 로고
    • Integrity considerations for secure computer systems
    • Bedford, MA, Apr.
    • K. Biba. Integrity Considerations for Secure Computer Systems. Technical Report MTR-3153, MITRE Corporation, Bedford, MA, Apr. 1977.
    • (1977) Technical Report MTR-3153, MITRE Corporation
    • Biba, K.1
  • 9
    • 85084163550 scopus 로고    scopus 로고
    • Design and implementation of modular key management protocol and IP secure tunnel
    • USENIX Association Salt Lake City, Utah
    • P. Chen, J. Garay, A. Herzberg, and H. Krawczyk. Design and Implementation of Modular Key Management Protocol and IP Secure Tunnel. In Proceedings of 5th USENIX UNIX Security Symposium, pages 41-54. USENIX Association, 1996. Salt Lake City, Utah.
    • (1996) Proceedings of 5th USENIX UNIX Security Symposium , pp. 41-54
    • Chen, P.1    Garay, J.2    Herzberg, A.3    Krawczyk, H.4
  • 12
    • 0000338326 scopus 로고
    • Programming semantics for multiprogrammed computations
    • J. B. Dennis and E. C. V. Horn. Programming semantics for multiprogrammed computations. Commun. ACM, 9(3):143-155, 1966.
    • (1966) Commun. ACM , vol.9 , Issue.3 , pp. 143-155
    • Dennis, J.B.1    Horn, E.C.V.2
  • 18
    • 0346739133 scopus 로고    scopus 로고
    • Fast and Secure Distributed Read-Only File System
    • DOI 10.1145/505452.505453
    • K. Fu, M. F. Kaashoek, and D. Mazières. Fast and secure distributed read-only file system. ACM Trans. Comput. Syst., 20(1):1-24, Feb. 2002. (Pubitemid 135707562)
    • (2002) ACM Transactions on Computer Systems , vol.20 , Issue.1 , pp. 1-24
    • Fu, K.1    Kaashoek, M.F.2    Mazieres, D.3
  • 29
    • 0042352260 scopus 로고    scopus 로고
    • Separating key management from file system security
    • D. Mazières, M. Kaminsky, M. F. Kaashoek, and E. Witchel. Separating key management from file system security. In Proceedings of the 17th ACM Symposium on Operating Systems Principles (SOSP'99), pages 124-139, Kiawah Island, SC, USA, Dec. 1999. (Pubitemid 129548352)
    • (1999) Operating Systems Review (ACM) , vol.33 , Issue.5 , pp. 124-139
    • Mazieres, D.1    Kaminsky, M.2    Kaashoek, M.F.3    Witchel, E.4
  • 32
    • 38149124657 scopus 로고    scopus 로고
    • Integrity checking in cryptographic file systems with constant trusted storage
    • Boston, MA, USA, Aug.
    • A. Oprea and M. K. Reiter. Integrity Checking in Cryptographic File Systems with Constant Trusted Storage. In Proceedings of the 16th USENIX Security Symposium, Boston, MA, USA, Aug. 2007.
    • (2007) Proceedings of the 16th USENIX Security Symposium
    • Oprea, A.1    Reiter, M.K.2
  • 34
    • 85175132326 scopus 로고    scopus 로고
    • Panasas. Panasas: System Hardware. http://www.panasas.com/hardware.html, 2007.
    • (2007) Panasas: System Hardware
  • 38
    • 0035371016 scopus 로고    scopus 로고
    • Active disks for large-scale data processing
    • DOI 10.1109/2.928624
    • E. Riedel, C. Faloutsos, G. A. Gibson, and D. Nagle. Active Disk for Large-Scale Data Processing. IEEE Computer, pages 68-74, June 2001. (Pubitemid 32527648)
    • (2001) Computer , vol.34 , Issue.6 , pp. 68-74
    • Riedel, E.1    Faloutsos, C.2    Gibson, G.A.3    Nagle, D.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.