메뉴 건너뛰기




Volumn , Issue , 2003, Pages 159-174

Block-level security for network-attached disks

Author keywords

[No Author keywords available]

Indexed keywords

ACCESS CONTROL; DIGITAL STORAGE; STORAGE MANAGEMENT;

EID: 84856598167     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (41)

References (26)
  • 1
    • 35048891868 scopus 로고    scopus 로고
    • Keying hash functions for message authentication
    • M. Bellare, R. Canetti, and H. Krawczyk. Keying hash functions for message authentication. Lecture Notes in CS, 1109:1–15, 1996.
    • (1996) Lecture Notes in CS , vol.1109 , pp. 1-15
    • Bellare, M.1    Canetti, R.2    Krawczyk, H.3
  • 3
    • 0022015288 scopus 로고
    • Secure communication using remote procedure calls
    • February
    • Andrew D. Birrell. Secure communication using remote procedure calls. ACM Transactions on Computer Systems, 3(1):1–14, February 1985.
    • (1985) ACM Transactions on Computer Systems , vol.3 , Issue.1 , pp. 1-14
    • Birrell, A.D.1
  • 4
    • 0014814325 scopus 로고
    • Space/time trade-offs in hash coding with allowable errors
    • Burton Bloom. Space/time trade-offs in hash coding with allowable errors. Communications of ACM, 13(7):422–426, 1970.
    • (1970) Communications of ACM , vol.13 , Issue.7 , pp. 422-426
    • Bloom, B.1
  • 12
    • 84976685665 scopus 로고
    • Efficient at-most-once messages based on synchronized clocks
    • May
    • Barbara Liskov, Liuba Shrira, and John Wroclawski. Efficient at-most-once messages based on synchronized clocks. ACM Transactions on Computer Systems, 9(2):125–142, May 1991.
    • (1991) ACM Transactions on Computer Systems , vol.9 , Issue.2 , pp. 125-142
    • Liskov, B.1    Shrira, L.2    Wroclawski, J.3
  • 16
    • 85080400393 scopus 로고    scopus 로고
    • A flow-based approach to datagram security
    • S. Mittra and T. Woo. A flow-based approach to datagram security. In Proc. ACM SIGCOMM, 1997.
    • (1997) Proc. ACM SIGCOMM
    • Mittra, S.1    Woo, T.2
  • 17
    • 79955056830 scopus 로고
    • NIST. FIPS
    • NIST. Secure hash algorithm, 1995. FIPS 180-1.
    • (1995) Secure Hash Algorithm , pp. 180-181
  • 19
    • 0033906295 scopus 로고    scopus 로고
    • Authenticating network attached storage
    • January
    • B. Reed, E. Chron, D. Long, and R. Burns. Authenticating network attached storage. IEEE Micro, 20(1), January 2000.
    • (2000) IEEE Micro , vol.20 , Issue.1
    • Reed, B.1    Chron, E.2    Long, D.3    Burns, R.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.