메뉴 건너뛰기




Volumn , Issue , 2009, Pages 159-172

Transparent mobile storage protection in trusted virtual domains

Author keywords

Mobile storage devices; Security; Trusted virtual domains; USB storage

Indexed keywords

CRYPTOGRAPHY; DATA PRIVACY; VIRTUAL STORAGE;

EID: 84924573886     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (16)

References (45)
  • 3
    • 33750228447 scopus 로고    scopus 로고
    • Secure key-updating for lazy revocation
    • Hamburg, Germany, September 18-20, Proceedings (2006), of Lecture Notes in Computer Science, Springer
    • BACKES, M., CACHIN, C., AND OPREA, A. Secure key-updating for lazy revocation. In Computer Security - ESORICS 2006, 11th European Symposium on Research in Computer Security, Hamburg, Germany, September 18-20, 2006, Proceedings (2006), vol. 4189 of Lecture Notes in Computer Science, Springer, pp. 327-346.
    • (2006) Computer Security - ESORICS 2006, 11th European Symposium on Research in Computer Security , vol.4189 , pp. 327-346
    • BACKES, M.1    CACHIN, C.2    OPREA, A.3
  • 16
    • 84867697860 scopus 로고    scopus 로고
    • EUROPEAN NETWORK AND INFORMATION SECURITY AGENCY (ENISA). June
    • EUROPEAN NETWORK AND INFORMATION SECURITY AGENCY (ENISA). Secure USB Flash Drives, June 2008. http://www.enisa.europa.eu/doc/pdf/publications/SecureUSBdrives_180608.pdf.
    • (2008) Secure USB Flash Drives
  • 23
    • 84947558992 scopus 로고    scopus 로고
    • A”paradoxical” indentity-based signature scheme resulting from zero-knowledge. In Advances in Cryptology - CRYPTO'88, 8th Annual International Cryptology Conference, Santa Barbara, California, USA, August 21-25, 1988, Proceedings (1990)
    • of Lecture Notes in Computer Science, Springer
    • GUILLOU, L. C., AND QUISQUATER, J.-J. A”paradoxical” indentity-based signature scheme resulting from zero-knowledge. In Advances in Cryptology - CRYPTO'88, 8th Annual International Cryptology Conference, Santa Barbara, California, USA, August 21-25, 1988, Proceedings (1990), vol. 403 of Lecture Notes in Computer Science, Springer, pp. 216-231.
    • , vol.403 , pp. 216-231
    • GUILLOU, L. C.1    QUISQUATER, J.-J.2
  • 27
    • 77952379905 scopus 로고    scopus 로고
    • Secure untrusted data repository (sundr)
    • LI, J., KROHN, M. N., MAZIÈRES, D., AND SHASHA, D. Secure untrusted data repository (sundr). In OSDI (2004), pp. 121-136.
    • (2004) OSDI , pp. 121-136
    • LI, J.1    KROHN, M. N.2    MAZIÈRES, D.3    SHASHA, D.4
  • 28
    • 84883516955 scopus 로고
    • On micro-kernel construction
    • LIEDTKE, J. On micro-kernel construction. In SOSP (1995), pp. 237-250.
    • (1995) SOSP , pp. 237-250
    • LIEDTKE, J.1
  • 29
  • 30
    • 84897617999 scopus 로고    scopus 로고
    • MICROSFOT CORP
    • MICROSFOT CORP. Bitlocker drive encryption, 2006. http://technet.microsoft.com/en- us/windows/ aa905065.aspx.
    • (2006) Bitlocker drive encryption
  • 33
    • 44649188693 scopus 로고    scopus 로고
    • The impact of unavailability on the effectiveness of enterprise information security technologies
    • Tokyo, Japan, May 19-21, Proceedings (2008), of Lecture Notes in Computer Science, Springer
    • PARKIN, S. E., KASSAB, R. Y., AND VAN MOORSEL, A. P. A. The impact of unavailability on the effectiveness of enterprise information security technologies. In Service Availability, 5th International Service Availability Symposium, ISAS 2008, Tokyo, Japan, May 19-21, 2008, Proceedings (2008), vol. 5017 of Lecture Notes in Computer Science, Springer, pp. 43-58.
    • (2008) Service Availability, 5th International Service Availability Symposium, ISAS 2008 , vol.5017 , pp. 43-58
    • PARKIN, S. E.1    KASSAB, R. Y.2    VAN MOORSEL, A. P. A.3
  • 34
    • 33244463191 scopus 로고    scopus 로고
    • Ext3cow: a time-shifting file system for regulatory compliance
    • PETERSON, Z., AND BURNS, R. Ext3cow: a time-shifting file system for regulatory compliance. ACM Transactions on Storage (TOS) 1, 2 (2005), 190-212.
    • (2005) ACM Transactions on Storage (TOS) , vol.1 , Issue.2 , pp. 190-212
    • PETERSON, Z.1    BURNS, R.2
  • 36
    • 85084164523 scopus 로고    scopus 로고
    • Access and integrity control in a public-access, high-assurance configuration management system
    • San Francisco, CA, USA, August 5-9, (2002), USENIX
    • SHAPIRO, J. S., AND VANDERBURGH, J. Access and integrity control in a public-access, high-assurance configuration management system. In Proceedings of the 11th USENIX Security Symposium, San Francisco, CA, USA, August 5-9, 2002 (2002), USENIX, pp. 109-120.
    • (2002) Proceedings of the 11th USENIX Security Symposium , pp. 109-120
    • SHAPIRO, J. S.1    VANDERBURGH, J.2
  • 37
    • 85030405831 scopus 로고    scopus 로고
    • Concord: A secure mobile data authorization framework for regulatory compliance
    • November 9-14, San Diego, CA, USA (2008), USENIX Association
    • SINGARAJU, G., AND KANG, B. H. Concord: A secure mobile data authorization framework for regulatory compliance. In Proceedings of the 22nd Large Installation System Administration Conference, LISA 2008, November 9-14, 2008, San Diego, CA, USA (2008), USENIX Association, pp. 91-102.
    • (2008) Proceedings of the 22nd Large Installation System Administration Conference, LISA 2008 , pp. 91-102
    • SINGARAJU, G.1    KANG, B. H.2
  • 41
    • 85036459874 scopus 로고
    • Design, implementation, and evaluation of a Revision Control System
    • IEEE Computer Society Press Los Alamitos, CA, USA
    • TICHY, W. Design, implementation, and evaluation of a Revision Control System. In Proceedings of the 6th international conference on Software engineering (1982), IEEE Computer Society Press Los Alamitos, CA, USA, pp. 58-67.
    • (1982) Proceedings of the 6th international conference on Software engineering , pp. 58-67
    • TICHY, W.1
  • 43
    • 77952371831 scopus 로고    scopus 로고
    • TRUSTED COMPUTING GROUP. version 1.2 rev. 103, July
    • TRUSTED COMPUTING GROUP. TPM main specification, version 1.2 rev. 103, July 2007. https://www.trustedcomputinggroup.org.
    • (2007) TPM main specification
  • 44
    • 77952122969 scopus 로고    scopus 로고
    • VPFS: Building a virtual private file system with a small trusted computing base
    • Glasgow, Scotland, UK, April 1-4, (2008), ACM
    • WEINHOLD, C., AND HÄRTIG, H. VPFS: Building a virtual private file system with a small trusted computing base. In Proceedings of the 2008 EuroSys Conference, Glasgow, Scotland, UK, April 1-4, 2008 (2008), ACM, pp. 81-93.
    • (2008) Proceedings of the 2008 EuroSys Conference , pp. 81-93
    • WEINHOLD, C.1    HÄRTIG, H.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.