-
1
-
-
84978405320
-
FARSITE: Federated, available, and reliable storage for an incompletely trusted environment
-
ADYA, A., BOLOSKY, W. J., CASTRO, M., CERMAK, G., CHAIKEN, R., DOUCEUR, J. R., HOWELL, J., LORCH, J. R., THEIMER, M., AND WATTENHOFER, R. P. 2002. FARSITE: Federated, available, and reliable storage for an incompletely trusted environment. In Proceedings of the 5th Symposium on Operating Systems Design and Implementation. 1-14.
-
(2002)
Proceedings of the 5th Symposium on Operating Systems Design and Implementation
, pp. 1-14
-
-
Adya, A.1
Bolosky, W.J.2
Castro, M.3
Cermak, G.4
Chaiken, R.5
Douceur, J.R.6
Howell, J.7
Lorch, J.R.8
Theimer, M.9
Wattenhofer, R.P.10
-
2
-
-
85206030572
-
-
ACM SIGMETRICS Perform. Eval. Rev.
-
ARPACI-DUSSEAU, A. C., ARPACI-DUSSEAU, R. H., BAIRAVASUNDARAM, L. N., DENEHY, T. E., POPOVICI, F. I., PRABHAKARAN, V., AND SIVATHANU, M. 2006. Semantically-smart disk systems: past, present, and future. ACM SIGMETRICS Perform. Eval. Rev. 33 , 4.
-
(2006)
Semantically-smart Disk Systems: Past, Present, and Future
, vol.33
, pp. 4
-
-
Arpaci-Dusseau, A.C.1
Arpaci-Dusseau, R.H.2
Bairavasundaram, L.N.3
Denehy, T.E.4
Popovici, F.I.5
Prabhakaran, V.6
Sivathanu, M.7
-
3
-
-
85084163253
-
Secure data deletion for Linux file systems
-
USENIX Association, Berkeley, CA
-
BAUER, S. AND PRIYANTHA, N. B. 2001. Secure data deletion for Linux file systems. In Procceding of the 10th USENIX Security Symposium. USENIX Association, Berkeley, CA, 153-164.
-
(2001)
Procceding of the 10th USENIX Security Symposium
, pp. 153-164
-
-
Bauer, S.1
Priyantha, N.B.2
-
5
-
-
4444222413
-
Data security issues relating to end of life equipment
-
IEEE, Los Alamitos, CA
-
BENNISON, P. AND LASHER, P. 2004. Data security issues relating to end of life equipment. In Procceding of the IEEE International Symposium on Electronics and the Environment. IEEE, Los Alamitos, CA, 317-320.
-
(2004)
Procceding of the IEEE International Symposium on Electronics and the Environment
, pp. 317-320
-
-
Bennison, P.1
Lasher, P.2
-
7
-
-
85206027394
-
Critical recording benefits from cryptic measures
-
BOHMAN, T. 2007. Critical recording benefits from cryptic measures. VME Critical Syst. 26-28.
-
(2007)
VME Critical Syst.
, pp. 26-28
-
-
Bohman, T.1
-
8
-
-
84957063575
-
On the security properties of OAEP as an all-or-nothing transform
-
Springer, Berlin
-
BOYKO, V. 1999. On the security properties of OAEP as an all-or-nothing transform. In Proceedings of Advances in Cryptology (Crypto'99). Springer, Berlin, 503-518.
-
(1999)
Proceedings of Advances in Cryptology (Crypto'99)
, pp. 503-518
-
-
Boyko, V.1
-
9
-
-
85206044417
-
-
National Bureau of Standards Special Publications D. Branstad et al. Eds., U.S. Department of Commerce, Washington, D.C.
-
CAMPBELL, C. 1978. Design and specification of cryptographic capabilities. In National Bureau of Standards Special Publications, D. Branstad et al. Eds., U.S. Department of Commerce, Washington, D.C., 54-66.
-
(1978)
Design and Specification of Cryptographic Capabilities
, pp. 54-66
-
-
Campbell, C.1
-
10
-
-
4444361800
-
The design and implementation of a transparent cryptographic filesystem for UNIX
-
USENIX Association, Berkeley, CA
-
CATTANEO, G., CATUOGNO, L., DEL SORBO, A., AND PERSIANO, P. 2001. The design and implementation of a transparent cryptographic filesystem for UNIX. In Proceedings of the Annual USENIX Technical Conference. USENIX Association, Berkeley, CA, 245-252.
-
(2001)
Proceedings of the Annual USENIX Technical Conference
, pp. 245-252
-
-
Cattaneo, G.1
Catuogno, L.2
Del Sorbo, A.3
Persiano, P.4
-
11
-
-
85034623360
-
Cryptanalysis of des with a reduced number of rounds sequences of linear factors in block ciphers
-
Lecture Notes in Computer Science, vol. LNCS, Springer, Berlin
-
CHAUM, D., AND EVERTSE, J.-H. 1985. Cryptanalysis of DES with a reduced number of rounds sequences of linear factors in block ciphers. In Proceedings of Advances in Cryptology (Crypto'85). Lecture Notes in Computer Science, vol. LNCS 218, Springer, Berlin, 192-211.
-
(1985)
Proceedings of Advances in Cryptology (Crypto'85)
, vol.218
, pp. 192-211
-
-
Chaum, D.1
Evertse, J.-H.2
-
12
-
-
85084160792
-
Understanding data lifetime via whole system simulation
-
USENIX Association, Berkeley, CA
-
CHOW, J., PFAFF, B., GARFINKEL, T., CHRISTOPHER, K., AND ROSENBLUM, M. 2004. Understanding data lifetime via whole system simulation. In Proceedings of the 12th USENIX Security Symposium. USENIX Association, Berkeley, CA, 2004.
-
(2004)
Proceedings of the 12th USENIX Security Symposium
, pp. 2004
-
-
Chow, J.1
Pfaff, B.2
Garfinkel, T.3
Christopher, K.4
Rosenblum, M.5
-
13
-
-
84889030419
-
Shredding your garbage: Reducing data lifetime through secure deallocation
-
USENIX Association, Berkeley, CA
-
CHOW, J., PFAFF, B., GARFINKEL, T., AND ROSENBLUM, M. 2005. Shredding your garbage: Reducing data lifetime through secure deallocation. In Proceedings of the USENIX Security Symposium. USENIX Association, Berkeley, CA, 331-346.
-
(2005)
Proceedings of the USENIX Security Symposium
, pp. 331-346
-
-
Chow, J.1
Pfaff, B.2
Garfinkel, T.3
Rosenblum, M.4
-
14
-
-
85206050822
-
-
Homepage
-
DARIK'S BOOT AND NUKE. 2008. Homepage. http://dban.sourceforge.net/.
-
(2008)
DARIK'S BOOT AND NUKE
-
-
-
15
-
-
38149110413
-
The CryptoGraphic disk driver
-
USENIX Association, Berkeley, CA
-
DOWDESWELL, R. AND IOANNIDIS, J. 2003. The CryptoGraphic disk driver. In Proceedings of the Annual USENIX Technical Conference (FREENIX Track). USENIX Association, Berkeley, CA, 179-186.
-
(2003)
Proceedings of the Annual USENIX Technical Conference (FREENIX Track)
, pp. 179-186
-
-
Dowdeswell, R.1
Ioannidis, J.2
-
17
-
-
0012983374
-
-
NIST Special Publication 800-38A. National Institute of Standards and Technology
-
DWORKIN, M. 2001. Recommendation for block cipher modes of operation, methods and techniques. NIST Special Publication 800-38A. National Institute of Standards and Technology. http://www.csrc.nist.gov/publications/nistpubs/800- 38a/sp800-38a.pdf.
-
(2001)
Recommendation for Block Cipher Modes of Operation, Methods and Techniques
-
-
Dworkin, M.1
-
18
-
-
0347015653
-
-
FEDERAL TRADE COMMISSION,Pub. L. No. 106-102, 113 Stat. 1338, codified at 15 U.S.C. §§6801-09
-
FEDERAL TRADE COMMISSION. 1999. Gramm-Leach-Bliley Financial Services Modernization Act, Pub. L. No. 106-102, 113 Stat. 1338, codified at 15 U.S.C. §§6801-09.
-
(1999)
Gramm-Leach-Bliley Financial Services Modernization Act
-
-
-
19
-
-
84949194630
-
A simple algebraic representation of Rijndael
-
In Proceedings of Selected Areas in Cryptography, Springer, Berlin
-
FERGUSON, N., SCHROEPPEL, R., AND WHITING, D. 2001. A simple algebraic representation of Rijndael. In Proceedings of Selected Areas in Cryptography. Lecture Notes in Computer Science, vol. 2259, Springer, Berlin, 103-111.
-
(2001)
Lecture Notes in Computer Science
, vol.2259
, pp. 103-111
-
-
Ferguson, N.1
Schroeppel, R.2
Whiting, D.3
-
20
-
-
44049086023
-
AES-CBC + Elephant diffuser: A disk encryption algorithm for Windows Vista
-
FERGUSON, N. 2006. AES-CBC + Elephant diffuser: A disk encryption algorithm for Windows Vista. Tech. rep. http://www.microsoft.com/downloads/ details.aspx?FamilyID=131dae03-39ae-48bea8d6- 8b0034c92555&DisplayLang=en.
-
(2006)
Tech. Rep.
-
-
Ferguson, N.1
-
22
-
-
77951430522
-
Data lifetime is a systems problem
-
Beyond the PC. ACM, New York
-
GARFINKEL, T., PFAFF, B., CHOW, J., AND ROSENBLUM, M. 2004. Data lifetime is a systems problem. In Proceedings of the 11th Workshop on ACM SIGOPS European Workshop: Beyond the PC. ACM, New York.
-
(2004)
Proceedings of the 11th Workshop on ACM SIGOPS European Workshop
-
-
Garfinkel, T.1
Pfaff, B.2
Chow, J.3
Rosenblum, M.4
-
25
-
-
85033498470
-
SiRiUS: Securing remote untrusted storage
-
GOH, E., SHACHAM, H., MODADUGU, N., AND BONEH, D. 2003. SiRiUS: Securing remote untrusted storage. In Proceedings of the ISOC Network and Distributed Systems Security Symposium (NDSS). 131-145.
-
(2003)
Proceedings of the ISOC Network and Distributed Systems Security Symposium (NDSS)
, pp. 131-145
-
-
Goh, E.1
Shacham, H.2
Modadugu, N.3
Boneh, D.4
-
26
-
-
0026911505
-
Magnetic force scanning tunneling microscope imaging of overwritten data
-
GOMEZ, R., ADLY, A., MAYERGOYZ, I., AND BURKE., E. 1992. Magnetic force scanning tunneling microscope imaging of overwritten data. IEEE Trans. Magnetics 28, 5, 3141-3143.
-
(1992)
IEEE Trans. Magnetics
, vol.28
, Issue.5
, pp. 3141-3143
-
-
Gomez, R.1
Adly, A.2
Mayergoyz, I.3
Burke., E.4
-
28
-
-
33947155733
-
-
NIST special publication, National Institute of Standards and Technology, Gaithersburg, MD
-
GRANCE, T., STEVENS, M., AND MYERS, M. 2003. Guide to selecting information security products. NIST special publication 800-36, National Institute of Standards and Technology, Gaithersburg, MD. http://csrc.nist.gov/ publications/nistpubs/800-36/NIST-SP800-36.pdf.
-
(2003)
Guide to Selecting Information Security Products
, pp. 800-836
-
-
Grance, T.1
Stevens, M.2
Myers, M.3
-
29
-
-
0004610703
-
Secure deletion of data from magnetic and solid-state memory
-
USENNIX Association, Berkeley, CA
-
GUTMANN, P. 1996. Secure deletion of data from magnetic and solid-state memory. In Proceedings of the 6th USENIX Security Symposium. USENNIX Association, Berkeley, CA, 77-90.
-
(1996)
Proceedings of the 6th USENIX Security Symposium
, pp. 77-90
-
-
Gutmann, P.1
-
30
-
-
70349230440
-
ECryptfs: A stacked cryptographic filesystem
-
HALCROW, M. 2007. eCryptfs: A stacked cryptographic filesystem. Linux J. 156, 2.
-
(2007)
Linux J.
, vol.156
, pp. 2
-
-
Halcrow, M.1
-
31
-
-
84976704061
-
The Zebra striped network file system
-
HARTMAN, J. AND OUSTERHOUT, J. 1995. The Zebra striped network file system. In ACM Trans. Comput. Syst. 13, 3, 274-310.
-
(1995)
ACM Trans. Comput. Syst.
, vol.13
, Issue.3
, pp. 274-310
-
-
Hartman, J.1
Ousterhout, J.2
-
33
-
-
85077701725
-
Lest we remember: Cold boot attacks on encryption keys
-
USENIX Association, Berkeley, CA
-
HALDERMAN, J. A., SCHOEN, S. D., HENINGER, N., CLARKSON, W., PAUL, W., CALANDRINO, J. A., FELDMAN, A. J., APPELBAUM, J., AND FELTEN, E. W. 2008. Lest we remember: Cold boot attacks on encryption keys. In Proceedings of the 17th USENIX Security Symposium (Sec'08). USENIX Association, Berkeley, CA.
-
(2008)
Proceedings of the 17th USENIX Security Symposium (Sec'08)
-
-
Halderman, J.A.1
Schoen, S.D.2
Heninger, N.3
Clarkson, W.4
Paul, W.5
Calandrino, J.A.6
Feldman, A.J.7
Appelbaum, J.8
Felten, E.W.9
-
34
-
-
35248863065
-
A tweakable enciphering mode
-
Proceedings of the Crypto'03, Springer, Berlin
-
HALEVI, S. AND ROGAWAY, P. 2003. A tweakable enciphering mode. In Proceedings of the Crypto'03. Lecture Notes in Computer Science, vol. 2729, Springer, Berlin, 482-499.
-
(2003)
Lecture Notes in Computer Science
, vol.2729
, pp. 482-499
-
-
Halevi, S.1
Rogaway, P.2
-
35
-
-
85206064455
-
IRS still losing laptops
-
HINES, M. 2007. IRS still losing laptops. InfoWorld. http://www. infoworld.com/article/07/04/05/HNirslostlaptops 1.html.
-
(2007)
InfoWorld
-
-
Hines, M.1
-
36
-
-
85206066544
-
-
HOHMANN, C. 2008. CryptoFS. http://reboot.animeirc.de/cryptofs/.
-
(2008)
CryptoFS
-
-
Hohmann, C.1
-
37
-
-
33749161511
-
-
Network Working Group RFC 3825, Standards Track
-
HOUSLEY, R. 2004. Cryptographic message syntax. Network Working Group RFC 3825, Standards Track. http://www.ietf.org/rfc/rfc3852.txt.
-
(2004)
Cryptographic Message Syntax
-
-
Housley, R.1
-
39
-
-
85206058146
-
-
IRONKEY
-
IRONKEY. 2007. Benefits of hardware-based encryption. https://learn.ironkey.com/docs/IronKey WhitepaperBenefits of Hardware Encryption.pdf.
-
(2007)
Benefits of Hardware-based Encryption
-
-
-
42
-
-
34547403849
-
Secure deletion myths, issues, and solutions
-
ACM, New York
-
JOUKOV, N., PAPAXENOPOULOS, H., AND ZADOK, E. 2006. Secure deletion myths, issues, and solutions. In Proceedings of the 2nd ACM Workshop on Storage Security and Survivability. ACM, New York.
-
(2006)
Proceedings of the 2nd ACM Workshop on Storage Security and Survivability
-
-
Joukov, N.1
Papaxenopoulos, H.2
Zadok, E.3
-
43
-
-
85033460636
-
Plutus: Scalable secure file sharing on untrusted storage
-
USENIX Association, Berkeley, CA
-
KALLAHALLA, M., RIEDEL, E., SWAMINATHAN, R., WANG, Q., AND FU, K. 2003. Plutus: Scalable secure file sharing on untrusted storage. In Proceedings of the 2nd USENIX Conference on File and Storage Technologies (FAST). USENIX Association, Berkeley, CA.
-
(2003)
Proceedings of the 2nd USENIX Conference on File and Storage Technologies (FAST)
-
-
Kallahalla, M.1
Riedel, E.2
Swaminathan, R.3
Wang, Q.4
K, F.U.5
-
44
-
-
0004216472
-
-
Private Communication in a Public World 2nd Ed Prentice Hall, Englewood Cliffs, NJ
-
KAUFMAN, C., PERLMAN, R., AND SPECINER, M. 2002. Network Security: Private Communication in a Public World 2nd Ed. Prentice Hall, Englewood Cliffs, NJ.
-
(2002)
Network Security
-
-
Kaufman, C.1
Perlman, R.2
Speciner, M.3
-
45
-
-
0003470642
-
Security architecture for the Internet Protocol
-
KENT, S. AND ATKINSON, R. 1998. Security architecture for the Internet Protocol. Technical rep. RFC 2401. http://www.ietf.org/rfc/rfc2401.txt.
-
(1998)
Technical Rep. RFC
, pp. 2401
-
-
Kent, S.1
Atkinson, R.2
-
46
-
-
84955573096
-
How to protect des against exhaustive key search
-
N. Koblitz Ed., Springer, Berlin
-
KILIAN, J. AND ROGAWAY, P. 1996. How to protect DES against exhaustive key search. In Proceedings of the 16th Annual International Conference on Advances in Cryptology (CRYPTO '96). N. Koblitz Ed., Springer, Berlin, 252-267.
-
(1996)
Proceedings of the 16th Annual International Conference on Advances in Cryptology (CRYPTO '96)
, pp. 252-267
-
-
Kilian, J.1
Rogaway, P.2
-
47
-
-
85206066297
-
-
KINGSTON TECHNOLOGY
-
KINGSTON TECHNOLOGY. 2008. Data traveler secure. http://www.kingston.com/ flash/dt secure.asp.
-
(2008)
Data Traveler Secure
-
-
-
48
-
-
0002024821
-
Vnodes: An architecture for multiple file system types in Sun UNIX
-
USENIX Association, Berkeley, CA
-
KLEIMAN, S. R. 1986. Vnodes: An architecture for multiple file system types in Sun UNIX. In Proceedings of the USENIX Annual Technical Conference. USENIX Association, Berkeley, CA, 238-247.
-
(1986)
Proceedings of the USENIX Annual Technical Conference
, pp. 238-247
-
-
Kleiman, S.R.1
-
51
-
-
17444407978
-
Tweakable block ciphers
-
Lecture Notes in Computer Science, Springer, Berlin
-
LISKOV, M., RIVEST, R., AND WAGNER, D. 2002. Tweakable block ciphers. In Advances in Cryptology (CRYPTO '02). Lecture Notes in Computer Science, Springer, Berlin.
-
(2002)
Advances in Cryptology (CRYPTO '02)
-
-
Liskov, M.1
Rivest, R.2
Wagner, D.3
-
52
-
-
0023984964
-
How to construct pseudorandom permutations from pseudorandom functions
-
LUBY, M. AND RACKOFF, C. 1988. How to construct pseudorandom permutations from pseudorandom functions. SIAM J. Comput. 17, 2, 373-386.
-
(1988)
SIAM J. Comput.
, vol.17
, Issue.2
, pp. 373-386
-
-
Luby, M.1
Rackoff, C.2
-
53
-
-
0042352260
-
Separating key management from file system security
-
ACM, New York
-
MAZIÈRES, D., KAMINSKY, M., KAASHOEK M., AND WITCHEL, E. 1999. Separating key management from file system security. In Proceedings of the 17th ACM Symposium on Operating System Principles. ACM, New York.
-
(1999)
Proceedings of the 17th ACM Symposium on Operating System Principles
-
-
Mazières, D.1
Kaminsky, M.2
Kaashoek, M.3
Witchel, E.4
-
54
-
-
0000400106
-
Magnetic imaging on a spin-stand
-
MAYERGOYZ, I., SEPRICO, C.,KRAFFT, C., AND TSE, C. 2000. Magnetic imaging on a spin-stand. J. Appl. Phys. 87, 9, 6824-6826.
-
(2000)
J. Appl. Phys.
, vol.87
, Issue.9
, pp. 6824-6826
-
-
Mayergoyz, I.1
Seprico, C.2
Krafft, C.3
Tse, C.4
-
55
-
-
85206032566
-
2.9 million US residents at risk of ID theft
-
MCNEVIN, G. 2007. 2.9 million US residents at risk of ID theft. Image Data Manager. http://www.idm.net.au/story.asp?id=8270.
-
(2007)
Image Data Manager
-
-
McNevin, G.1
-
57
-
-
33947186223
-
Encrypting file system in Windows XP and Windows Server 2003
-
MICROSOFT CORP
-
MICROSOFT CORP. 2002. Encrypting file system in Windows XP and Windows Server 2003. Tech. rep. http://technet.microsoft.com/en-us/library/bb457065. aspx.
-
(2002)
Tech. Rep.
-
-
-
58
-
-
85206037119
-
Microsoft office 2003 Eds
-
MICROSOFT CORP.
-
MICROSOFT CORP. 2003. Microsoft Office 2003 Eds. Security whitepaper. http://www.microsoft.com/technet/prodtechnol/office/office2003/operate/o3secdet. mspx.
-
(2003)
Security Whitepaper
-
-
-
59
-
-
85206036205
-
Bitlocker drive encryption: Executive overview
-
MICROSOFT CORP
-
MICROSOFT CORP. 2006. Bitlocker drive encryption: Executive overview. Tech. rep. http://technet.microsoft.com/en-us/windowsvista/aa906018.aspx#EQB.
-
(2006)
Tech. Rep.
-
-
-
61
-
-
85206037346
-
-
MICROSOFT CORP
-
MICROSOFT CORP. 2008. How EFS works. Tech. Rep. 2008. http://www.microsoft.com/technet/prodtechnol/windows2000serv/reskit/distrib/ dsck efs duwf.mspx? mfr=true.
-
(2008)
How EFS Works. Tech. Rep.
, vol.2008
-
-
-
62
-
-
85084162873
-
Strong security for network-attached storage
-
USENIX Association, Berkeley, CA
-
MILLER, E., LONG, D., FREEMAN, W., AND REED, B. 2002. Strong security for network-attached storage. In Proceedings of the 1st USENIX Conference on File and Storage Technologies (FAST). USENIX Association, Berkeley, CA.
-
(2002)
Proceedings of the 1st USENIX Conference on File and Storage Technologies (FAST)
-
-
Miller, E.1
Long, D.2
Freeman, W.3
Reed, B.4
-
64
-
-
85206020469
-
-
NESTER.
-
NESTER. 2008. Wipe homepage. http://wipe.sourceforge.net/.
-
(2008)
Wipe Homepage
-
-
-
66
-
-
70449683026
-
-
NIST, National Institute of Standards and Technology, Gaithersburg, MD.
-
NIST. 2008. Request for public comments on XTS. National Institute of Standards and Technology, Gaithersburg, MD. http://csrc.nist.gov/groups/ST/ documents/Request-for-PublicComment-on XTS.pdf.
-
(2008)
Request for Public Comments on XTS
-
-
-
67
-
-
78650108412
-
Efficient cryptographic techniques for securing storage systems
-
Carnegie Mellon University
-
OPREA, A. 2007. Efficient cryptographic techniques for securing storage systems. Tech. rep. CMU-CS-07-119, Carnegie Mellon University.
-
(2007)
Tech. Rep. CMU-CS-07-119
-
-
Oprea, A.1
-
69
-
-
84976723701
-
A case for redundant arrays of inexpensive disks
-
ACM SIGMOD). ACM, New York
-
PATTERSON, D., GIBSON, G., AND KATZ, R. 1988. A case for redundant arrays of inexpensive disks. In Proceeding of the International Conference on Management of Data (ACM SIGMOD). ACM, New York, 109-116.
-
(1988)
Proceeding of the International Conference on Management of Data
, pp. 109-116
-
-
Patterson, D.1
Gibson, G.2
Katz, R.3
-
71
-
-
84874283560
-
Secure deletion for a versioning file system
-
USENIX Association, Berkeley, CA
-
PETERSON, Z., BURNS, R., HERRING, J., STUBBLEFIELD, A., AND RUBIN, A. 2005. Secure deletion for a versioning file system. In Proceedings of the 4th USENIX Conference on File and Storage Technologies. USENIX Association, Berkeley, CA,143-154.
-
(2005)
Proceedings of the 4th USENIX Conference on File and Storage Technologies
, pp. 143-154
-
-
Peterson, Z.1
Burns, R.2
Herring, J.3
Stubblefield, A.4
Rubin, A.5
-
72
-
-
33244463191
-
Ext3cow: A time-shifting file system for regulatory compliance
-
PETERSON, Z. AND BURNS, R. 2005. Ext3cow: A time-shifting file system for regulatory compliance. ACM Trans. Storage 1, 2, 190-212.
-
(2005)
ACM Trans. Storage
, vol.1
, Issue.2
, pp. 190-212
-
-
Peterson, Z.1
Burns, R.2
-
75
-
-
85084162793
-
A framework for evaluating storage system security
-
USENIX Association, Berkeley, CA
-
RIEDEL, E.,KALLAHALLA, M., AND SWAMINATHAN, R. 2002. A framework for evaluating storage system security. In Proceedings of the 1st USENIX Conference on File and Storage Technologies (FAST'02). USENIX Association, Berkeley, CA, 15-30.
-
(2002)
Proceedings of the 1st USENIX Conference on File and Storage Technologies (FAST'02)
, pp. 15-30
-
-
Riedel, E.1
Kallahalla, M.2
Swaminathan, R.3
-
80
-
-
85206020850
-
Cryptographic message syntax standard
-
RSA LABORATORIES.
-
RSA LABORATORIES. 1993. Cryptographic message syntax standard. Tech. note, PKCS 7, v1.5. ftp://ftp.rsasecurity.com/pub/pkcs/ps/pkcs-7.ps.
-
(1993)
Tech. Note, PKCS 7, v1.5.
-
-
-
82
-
-
0000432429
-
Design and implementation of the Sun network file system
-
USENIX Association, Berkeley, CA
-
SANDBERG, R., GOLDBERG, D., KLEIMAN, S., WALSH, D., AND LYON, B. 1985. Design and implementation of the Sun network file system. In Proceedings of the USENIX Annual Technical Conference. USENIX Association, Berkeley, CA, 119-130.
-
(1985)
Proceedings of the USENIX Annual Technical Conference
, pp. 119-130
-
-
Sandberg, R.1
Goldberg, D.2
Kleiman, S.3
Walsh, D.4
Lyon, B.5
-
84
-
-
85206038727
-
-
SECUREDISK.
-
SECUREDISK. 2008. Hardware SecureDisk encryption. http://www.usbgear.com/ secure-disk-hardware-encryptedusbdrive.html.
-
(2008)
Hardware SecureDisk Encryption
-
-
-
85
-
-
0018545449
-
How to share a secret
-
SHAMIR, A. 1979. How to share a secret. Comm. ACM 22, 11, 612-613.
-
(1979)
Comm ACM
, vol.22
, Issue.11
, pp. 612-613
-
-
Shamir, A.1
-
89
-
-
85077206237
-
Semantically-smart disk systems
-
USENIX Association, Berkeley, CA
-
SIVATHANU, M., PRABHAKARAN, V., POPOVICI, F. I., DENEHY, T. E., ARPACI-DUSSEAU, A. C., AND ARPACI-DUSSEAU, R. H. 2003. Semantically-smart disk systems. In Proceedings of the 2nd USENIX Conference on File and Storage Technologies. USENIX Association, Berkeley, CA.
-
(2003)
Proceedings of the 2nd USENIX Conference on File and Storage Technologies
-
-
Sivathanu, M.1
Prabhakaran, V.2
Popovici, F.I.3
Denehy, T.E.4
Arpaci-Dusseau, A.C.5
Arpaci-Dusseau, R.H.6
-
90
-
-
85077070134
-
Life or death at block level
-
SIVANTHANU, M., BAIRAVASUNDARAM, L. N., ARPACI-DUSSEAU, A. C., AND ARPACI-DUSSEAU, R. H. 2004. Life or death at block level. In Proceedings of the 6th Symposium on Operating Systems Design and Implementation (OSDI'04). 379-394.
-
(2004)
Proceedings of the 6th Symposium on Operating Systems Design and Implementation (OSDI'04)
, pp. 379-394
-
-
Sivanthanu, M.1
Bairavasundaram, L.N.2
Arpaci-Dusseau, A.C.3
Arpaci-Dusseau, R.H.4
-
93
-
-
31344435093
-
Drive-independent data recovery: The current state-of-theart
-
SOBEY, C., ORTO, L., AND SAKAGUCHI, G. 2006. Drive-independent data recovery: The current state-of-theart. IEEE Trans. Magnetics 42, 2, 1, 188-193.
-
(2006)
IEEE Trans. Magnetics 42
, vol.2
, Issue.1
, pp. 188-193
-
-
Sobey, C.1
Orto, L.2
Sakaguchi, G.3
-
94
-
-
78651279231
-
Feistel finite set encryption mode
-
SPIES, T. 2008. Feistel finite set encryption mode. NIST proposed encryption mode. http://csrc.nist.gov/groups/ST/toolkit/BCM/documents/ proposedmodes/ffsem/ffsem-spec.pdf.
-
(2008)
NIST Proposed Encryption Mode
-
-
Spies, T.1
-
95
-
-
85206050180
-
Stolen laptop may hold ID numbers
-
SQUARE, L. 2007. Stolen laptop may hold ID numbers. The Daily Reveille. http://media.www.lsureveille.com/media/storage/paper868/news/2007/05/03/News/ Stolen.Laptop.May. Hold.Id.Numbers-2892874.shtml.
-
(2007)
The Daily Reveille
-
-
Square, L.1
-
97
-
-
85206067242
-
Help! i left my identity in the backseat of a taxi
-
SULLIVAN, B. 2005. Help! I left my identity in the backseat of a taxi. MSNBC: The Red Tape Chronicles. http://redtape.msnbc.com/2005/11/why you should .html.
-
(2005)
MSNBC: The Red Tape Chronicles
-
-
Sullivan, B.1
-
100
-
-
0005877091
-
-
U. S. DEPARTMENT OF DEFENSE, 5220.22- M, U.S Government Printing Office, Washington, D.C
-
U. S. DEPARTMENT OF DEFENSE. 1995. National Industrial Security Program Operating Manual. 5220.22- M, U.S. Government Printing Office, Washington, D.C.
-
(1995)
National Industrial Security Program Operating Manual
-
-
-
101
-
-
85206025607
-
-
WIRELESSWEEK, Wirel. Week
-
WIRELESSWEEK. 2007. Alcatel-Lucent loses computer disk. Wirel. Week http://www.wirelessweek.com/article.aspx?id=148070.
-
(2007)
Alcatel-Lucent Loses Computer Disk
-
-
-
102
-
-
85084161247
-
Why Johnny can't encrypt: A usability evaluation of pgp 5.0
-
USENIX Association, Berkeley, CA
-
WHITTEN, A. AND TYGAR, J. D. 1999. Why Johnny can't encrypt: A usability evaluation of pgp 5.0. In Proceedings of the 8th USENIX Security Symposium. USENIX Association, Berkeley, CA, 169-184.
-
(1999)
Proceedings of the 8th USENIX Security Symposium
, pp. 169-184
-
-
Whitten, A.1
Tygar, J.D.2
-
104
-
-
84948183524
-
Cryptographic file systems performance: What you don't know can hurt you
-
IEEE, Los Alamitos, CA
-
WRIGHT, C., DAVE, J., AND ZADOK, E. 2003. Cryptographic file systems performance: What you don't know can hurt you. In Proceedings of the IEEE Security in Storage Workshop (SISW). IEEE, Los Alamitos, CA, 47-61.
-
(2003)
Proceedings of the IEEE Security in Storage Workshop (SISW)
, pp. 47-61
-
-
Wright, C.1
Dave, J.2
Zadok, E.3
-
105
-
-
27144515662
-
NCryptfs: A secure and convenient cryptographic file system
-
USENIX Association, Berkeley, CA
-
WRIGHT, C. P., MARTINO, M., AND ZADOK, E. 2003. NCryptfs: A secure and convenient cryptographic file system. In Proceedings of the Annual USENIX Technical Conference. USENIX Association, Berkeley, CA, 197-210.
-
(2003)
Proceedings of the Annual USENIX Technical Conference
, pp. 197-210
-
-
Wright, C.P.1
Martino, M.2
Zadok, E.3
-
107
-
-
0012579128
-
Cryptfs: A stackable vnode level encryption file system
-
Computer Science Dept., Columbia University
-
ZADOK, E., BADULESCU, I., AND SHENDER, A. 1998. Cryptfs: A stackable vnode level encryption file system. Tech. rep. CUCS-021-98, Computer Science Dept., Columbia University.
-
(1998)
Tech. Rep. CUCS-021-98
-
-
Zadok, E.1
Badulescu, I.2
Shender, A.3
-
108
-
-
85084164648
-
FiST: A language for stackable file systems
-
USENIX Association, Berkeley, CA
-
ZADOK, E. AND NIEH, J. 2000. FiST: A language for stackable file systems. In Proceedings of the Annual USENIX Technical Conference. USENIX Association, Berkeley, CA, 55-70.
-
(2000)
Proceedings of the Annual USENIX Technical Conference
, pp. 55-70
-
-
Zadok, E.1
Nieh, J.2
|