-
1
-
-
84978405320
-
FARSITE: Federated, available, and reliable storage for an incompletely trusted environment
-
Boston, MA, Dec.
-
A. Adya, W. J. Bolosky, M. Castro, G. Cermak, R. Chaiken, J. R. Douceur, J. Howell, J. R. Lorch, M. Theimer, and R. P. Wattenhofer. FARSITE: Federated, Available, and Reliable Storage for an Incompletely Trusted Environment. In Proceedings of the 5th USENIX Symposium on Operating Systems Design and Implementation (OSDI 2002), Boston, MA, Dec. 2002.
-
(2002)
Proceedings of the 5th USENIX Symposium on Operating Systems Design and Implementation (OSDI 2002)
-
-
Adya, A.1
Bolosky, W.J.2
Castro, M.3
Cermak, G.4
Chaiken, R.5
Douceur, J.R.6
Howell, J.7
Lorch, J.R.8
Theimer, M.9
Wattenhofer, R.P.10
-
3
-
-
0003400255
-
Integrity considerations for secure computer systems
-
Bedford, MA, Apr.
-
K. Biba. Integrity Considerations for Secure Computer Systems. Technical Report MTR-3153, MITRE Corporation, Bedford, MA, Apr. 1977.
-
(1977)
Technical Report MTR-3153, MITRE Corporation
-
-
Biba, K.1
-
6
-
-
77957841433
-
High-performance disk integrity through block chaining
-
Pennsylvania State University, University Park, PA, USA, June
-
K. Butler, S. McLaughlin, and P. McDaniel. High-Performance Disk Integrity through Block Chaining. Technical Report NAS-TR-0072-2007, Network and Security Research Center, Department of Computer Science and Engineering, Pennsylvania State University, University Park, PA, USA, June 2007.
-
(2007)
Technical Report NAS-TR-0072-2007, Network and Security Research Center, Department of Computer Science and Engineering
-
-
Butler, K.1
McLaughlin, S.2
McDaniel, P.3
-
7
-
-
4444361800
-
The design and implementation of a transparent cryptographic file system for UNIX
-
Boston, MA, USA, June
-
G. Cattaneo, L. Cauogno, A. D. Sorbo, and P. Persiano. The design and implementation of a transparent cryptographic file system for UNIX. In Proceedings of the 2001 USENIX Annual Technical Conference, Boston, MA, USA, June 2001.
-
(2001)
Proceedings of the 2001 USENIX Annual Technical Conference
-
-
Cattaneo, G.1
Cauogno, L.2
Sorbo, A.D.3
Persiano, P.4
-
8
-
-
34547471190
-
Design, implementation and evaluation of security in iSCSI-based network storage systems
-
Alexandria, Virginia, October
-
S. Chaitanya, K. Butler, P. McDaniel, and A. Sivasubramaniam. Design, Implementation and Evaluation of Security in iSCSI-based Network Storage Systems. In Proceedings of 2nd International Workshop on Storage Security and Survivability (StorageSS 2006), Alexandria, Virginia, October 2006.
-
(2006)
Proceedings of 2nd International Workshop on Storage Security and Survivability (StorageSS 2006)
-
-
Chaitanya, S.1
Butler, K.2
McDaniel, P.3
Sivasubramaniam, A.4
-
9
-
-
85084163550
-
Design and implementation of modular key management protocol and IP secure tunnel
-
USENIX Association Salt Lake City, Utah
-
P. Chen, J. Garay, A. Herzberg, and H. Krawczyk. Design and Implementation of Modular Key Management Protocol and IP Secure Tunnel. In Proceedings of 5th USENIX UNIX Security Symposium, pages 41-54. USENIX Association, 1996. Salt Lake City, Utah.
-
(1996)
Proceedings of 5th USENIX UNIX Security Symposium
, pp. 41-54
-
-
Chen, P.1
Garay, J.2
Herzberg, A.3
Krawczyk, H.4
-
12
-
-
0000338326
-
Programming semantics for multiprogrammed computations
-
J. B. Dennis and E. C. V. Horn. Programming semantics for multiprogrammed computations. Commun. ACM, 9(3):143-155, 1966.
-
(1966)
Commun. ACM
, vol.9
, Issue.3
, pp. 143-155
-
-
Dennis, J.B.1
Horn, E.C.V.2
-
15
-
-
0035474388
-
Building the IBM 4758 secure coprocessor
-
DOI 10.1109/2.955100
-
J. G. Dyer, M. Lindermann, R. Perez, R. Sailer, L. van Doorn, S. W. Smith, and S. Weingart. Building the IBM 4758 Secure Coprocessor. IEEE Computer, 39(10):57-66, Oct. 2001. (Pubitemid 32936296)
-
(2001)
Computer
, vol.34
, Issue.10
, pp. 57-66
-
-
Dyer, J.G.1
Lindemann, M.2
Perez, R.3
Sailer, R.4
Van Doorn, L.5
Smith, S.W.6
Weingart, S.7
-
18
-
-
0346739133
-
Fast and Secure Distributed Read-Only File System
-
DOI 10.1145/505452.505453
-
K. Fu, M. F. Kaashoek, and D. Mazières. Fast and secure distributed read-only file system. ACM Trans. Comput. Syst., 20(1):1-24, Feb. 2002. (Pubitemid 135707562)
-
(2002)
ACM Transactions on Computer Systems
, vol.20
, Issue.1
, pp. 1-24
-
-
Fu, K.1
Kaashoek, M.F.2
Mazieres, D.3
-
19
-
-
0005970563
-
A case for network-attached secure disks
-
Pittsburgh, PA, USA, Sept.
-
G. A. Gibson, D. F. Nagle, K. Amiri, F. W. Chang, E. Feinberg, H. Gobioff, C. Lee, B. Ozceri, E. Riedel, and D. Rochberg. A case for network-attached secure disks. Technical Report CMU-CS-96-142, Carnegie Mellon University, Pittsburgh, PA, USA, Sept. 1996.
-
(1996)
Technical Report CMU-CS-96-142, Carnegie Mellon University
-
-
Gibson, G.A.1
Nagle, D.F.2
Amiri, K.3
Chang, F.W.4
Feinberg, E.5
Gobioff, H.6
Lee, C.7
Ozceri, B.8
Riedel, E.9
Rochberg, D.10
-
20
-
-
85033498470
-
SiRiUS: Securing remote untrusted storage
-
San Diego, CA, USA, Feb.
-
E.-J. Goh, H. Shacham, N. Modadugu, and D. Boneh. SiRiUS: Securing Remote Untrusted Storage. In Proceedings of the 10th ISOC Symposium on Network and Distributed Systems (NDSS'03), San Diego, CA, USA, Feb. 2003.
-
(2003)
Proceedings of the 10th ISOC Symposium on Network and Distributed Systems (NDSS'03)
-
-
Goh, E.-J.1
Shacham, H.2
Modadugu, N.3
Boneh, D.4
-
22
-
-
39049162501
-
Understanding practical application development in security-typed languages
-
Miami, FL, USA, Dec.
-
B. Hicks, K. Ahmadizadeh, and P. McDaniel. Understanding Practical Application Development in Security-Typed Languages. In Proceedings of the 22nd Annual Computer Security Applications Conferences (ACSAC), Miami, FL, USA, Dec. 2006.
-
(2006)
Proceedings of the 22nd Annual Computer Security Applications Conferences (ACSAC)
-
-
Hicks, B.1
Ahmadizadeh, K.2
McDaniel, P.3
-
23
-
-
34548017123
-
From trusted to secure: Building and executing applications that enforce system security
-
San Jose, CA, USA, June
-
B. Hicks, S. J. R. Rodriguez, T. Jaeger, and P. McDaniel. From Trusted to Secure: Building and Executing Applications that Enforce System Security. In Proceedings of the USENIX Annual Technical Conference, San Jose, CA, USA, June 2007.
-
(2007)
Proceedings of the USENIX Annual Technical Conference
-
-
Hicks, B.1
Rodriguez, S.J.R.2
Jaeger, T.3
McDaniel, P.4
-
26
-
-
85033460636
-
Plutus: Scalable secure file sharing on untrusted storage
-
San Francisco, CA, Apr.
-
M. Kallahalla, E. Riedel, R. Swaminathan, Q. Wang, and K. Fu. Plutus: Scalable Secure File Sharing on Untrusted Storage. In Proceedings of the 2nd USENIX Conference on File and Storage Technologies (FAST'03), San Francisco, CA, Apr. 2003.
-
(2003)
Proceedings of the 2nd USENIX Conference on File and Storage Technologies (FAST'03)
-
-
Kallahalla, M.1
Riedel, E.2
Swaminathan, R.3
Wang, Q.4
Fu, K.5
-
28
-
-
77952379905
-
Secure untrusted data repository (SUNDR)
-
San Francisco, CA, Dec.
-
J. Li, M. Krohn, D. Mazières, and D. Shasha. Secure Untrusted Data Repository (SUNDR). In Proceedings of the 6th USENIX Symposium on Operating Systems Design and Implementation (OSDI 2004), San Francisco, CA, Dec. 2004.
-
(2004)
Proceedings of the 6th USENIX Symposium on Operating Systems Design and Implementation (OSDI 2004)
-
-
Li, J.1
Krohn, M.2
Mazières, D.3
Shasha, D.4
-
29
-
-
0042352260
-
Separating key management from file system security
-
D. Mazières, M. Kaminsky, M. F. Kaashoek, and E. Witchel. Separating key management from file system security. In Proceedings of the 17th ACM Symposium on Operating Systems Principles (SOSP'99), pages 124-139, Kiawah Island, SC, USA, Dec. 1999. (Pubitemid 129548352)
-
(1999)
Operating Systems Review (ACM)
, vol.33
, Issue.5
, pp. 124-139
-
-
Mazieres, D.1
Kaminsky, M.2
Kaashoek, M.F.3
Witchel, E.4
-
31
-
-
85084162873
-
Strong security for network-attached storage
-
Monterey, CA, USA, Jan.
-
E. L. Miller, W. E. Freeman, D. D. E. Long, and B. C. Reed. Strong Security for Network-Attached Storage. In Proceedings of the 1st USENIX Conference on File and Storage Technologies (FAST'02), Monterey, CA, USA, Jan. 2002.
-
(2002)
Proceedings of the 1st USENIX Conference on File and Storage Technologies (FAST'02)
-
-
Miller, E.L.1
Freeman, W.E.2
Long, D.D.E.3
Reed, B.C.4
-
32
-
-
38149124657
-
Integrity checking in cryptographic file systems with constant trusted storage
-
Boston, MA, USA, Aug.
-
A. Oprea and M. K. Reiter. Integrity Checking in Cryptographic File Systems with Constant Trusted Storage. In Proceedings of the 16th USENIX Security Symposium, Boston, MA, USA, Aug. 2007.
-
(2007)
Proceedings of the 16th USENIX Security Symposium
-
-
Oprea, A.1
Reiter, M.K.2
-
33
-
-
77957830611
-
Space-efficient block storage integrity
-
San Diego, CA, USA, Feb.
-
A. Oprea, M. K. Reiter, and K. Yang. Space-Efficient Block Storage Integrity. In Proceedings of the 12th ISOC Symposium on Network and Distributed Systems Security (NDSS'05), San Diego, CA, USA, Feb. 2005.
-
(2005)
Proceedings of the 12th ISOC Symposium on Network and Distributed Systems Security (NDSS'05)
-
-
Oprea, A.1
Reiter, M.K.2
Yang, K.3
-
34
-
-
85175132326
-
-
Panasas. Panasas: System Hardware. http://www.panasas.com/hardware.html, 2007.
-
(2007)
Panasas: System Hardware
-
-
-
35
-
-
16244398863
-
Energy-aware demand paging on NAND flash-based embedded sources
-
Newport Beach, CA, USA, Aug.
-
C. Park, J.-U. Kang, S.-Y. Park, and J.-S. Kim. Energy-Aware Demand Paging on NAND Flash-based Embedded Sources. In Proceedings of the International Symposium on Low Power Electronics and Design (ISLPED), Newport Beach, CA, USA, Aug. 2004.
-
(2004)
Proceedings of the International Symposium on Low Power Electronics and Design (ISLPED)
-
-
Park, C.1
Kang, J.-U.2
Park, S.-Y.3
Kim, J.-S.4
-
37
-
-
84962770253
-
Security considerations when designing a distributed file system using object storage devices
-
Greenbelt, MD, USA, Dec.
-
B. C. Reed, M. A. Smith, and D. Diklic. Security Considerations When Designing a Distributed File System Using Object Storage Devices. In Proceedings of the 1st IEEE Security in Storage Workshop (SISW'02), Greenbelt, MD, USA, Dec. 2002.
-
(2002)
Proceedings of the 1st IEEE Security in Storage Workshop (SISW'02)
-
-
Reed, B.C.1
Smith, M.A.2
Diklic, D.3
-
38
-
-
0035371016
-
Active disks for large-scale data processing
-
DOI 10.1109/2.928624
-
E. Riedel, C. Faloutsos, G. A. Gibson, and D. Nagle. Active Disk for Large-Scale Data Processing. IEEE Computer, pages 68-74, June 2001. (Pubitemid 32527648)
-
(2001)
Computer
, vol.34
, Issue.6
, pp. 68-74
-
-
Riedel, E.1
Faloutsos, C.2
Gibson, G.A.3
Nagle, D.4
-
39
-
-
85084162793
-
A framework for evaluating storage system security
-
Monterey, CA, USA, Jan.
-
E. Riedel, M. Kallahalla, and R. Swaminathan. A Framework for Evaluating Storage System Security. In Proceedings of the 1st USENIX Conference on File and Storage Technologies (FAST'02), Monterey, CA, USA, Jan. 2002.
-
(2002)
Proceedings of the 1st USENIX Conference on File and Storage Technologies (FAST'02)
-
-
Riedel, E.1
Kallahalla, M.2
Swaminathan, R.3
-
45
-
-
41149086013
-
Providing tunable consistency for a parallel file store
-
San Francisco, CA, USA, Dec.
-
M. Vilayannur, P. Nath, and A. Sivasubramaniam. Providing Tunable Consistency for a Parallel File Store. In Proceedings of the 4th USENIX Conference on File and Storage Technologies (FAST'05), San Francisco, CA, USA, Dec. 2003.
-
(2003)
Proceedings of the 4th USENIX Conference on File and Storage Technologies (FAST'05)
-
-
Vilayannur, M.1
Nath, P.2
Sivasubramaniam, A.3
-
47
-
-
0012579128
-
Cryptfs: A stackable vnode level encryption file system
-
New York, NY, USA
-
E. Zadok, I. Badulescu, and A. Shender. Cryptfs: A Stackable Vnode Level Encryption File System. Technical Report CUCS-021-98, Columbia University, New York, NY, USA, 1988.
-
(1988)
Technical Report CUCS-021-98, Columbia University
-
-
Zadok, E.1
Badulescu, I.2
Shender, A.3
|