메뉴 건너뛰기




Volumn 2002-January, Issue , 2002, Pages 172-182

A secure directory service based on exclusive encryption

Author keywords

Access control; Authorization; Cryptography; Data mining; Data privacy; Encoding; File servers; Law; Legal factors; Protection

Indexed keywords

ACCESS CONTROL; DATA MINING; DATA PRIVACY; ENCODING (SYMBOLS); SECURITY OF DATA; SECURITY SYSTEMS; SYNTACTICS;

EID: 84948975979     PISSN: 10639527     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/CSAC.2002.1176289     Document Type: Conference Paper
Times cited : (3)

References (46)
  • 7
    • 84867248592 scopus 로고
    • Untraceable off-line cash in wallets with observers
    • S. Brands, "Untraceable Off-Line Cash in Wallets with Observers", CRYPTO '93, 1993, pp. 302-318
    • (1993) CRYPTO '93 , pp. 302-318
    • Brands, S.1
  • 17
    • 0012525797 scopus 로고    scopus 로고
    • Fully polynomial byzantine agreement for n 3t processors in t+1 rounds
    • J. Garay and Y. Moses, "Fully Polynomial Byzantine Agreement for n 3t Processors in t+1 Rounds", SIAM Journal of Computing, 27(1), 1998
    • (1998) SIAM Journal of Computing , vol.27 , Issue.1
    • Garay, J.1    Moses, Y.2
  • 18
    • 84885890419 scopus 로고    scopus 로고
    • Gnutella. http://gnutelladev.wego.com
    • Gnutella
  • 22
    • 0017996760 scopus 로고
    • Time, clocks, and the ordering of events in a distributed system
    • L. Lamport, "Time, Clocks, and the Ordering of Events in a Distributed System", CACM, 21(7), 1978
    • (1978) CACM , vol.21 , Issue.7
    • Lamport, L.1
  • 23
    • 84976699318 scopus 로고
    • The byzantine generals problem
    • ACM
    • L. Lamport, R. Shostak, and M. Pease, "The Byzantine Generals Problem", TPLS 4(3), ACM, 1982
    • (1982) TPLS , vol.4 , Issue.3
    • Lamport, L.1    Shostak, R.2    Pease, M.3
  • 25
    • 0032313627 scopus 로고    scopus 로고
    • Secure and scalable replication in phalanx
    • IEEE, Oct
    • D. Malkhi and M. Reiter, "Secure and Scalable Replication in Phalanx", 17th SRDS, IEEE, Oct 1998, pp. 51-60
    • (1998) 17th SRDS , pp. 51-60
    • Malkhi, D.1    Reiter, M.2
  • 26
    • 0035703990 scopus 로고    scopus 로고
    • Don't trust your file server
    • May
    • D. Mazières and D. Shasha, "Don't Trust Your File Server", 8th HotOS, May 2001, pp. 113-118
    • (2001) 8th HotOS , pp. 113-118
    • Mazières, D.1    Shasha, D.2
  • 28
    • 84949043139 scopus 로고    scopus 로고
    • Microsoft. MSDN, Apr
    • Microsoft, "File Name Conventions", MSDN, Apr 2002
    • (2002) File Name Conventions
  • 29
    • 0003508568 scopus 로고
    • National Bureau of Standards, FIPS Publication #46, NTIS, Apr
    • National Bureau of Standards, "Data Encryption Standard", FIPS Publication #46, NTIS, Apr 1977
    • (1977) Data Encryption Standard
  • 30
    • 0003508568 scopus 로고
    • National Bureau of Standards. FIPS Publication #81, NTIS, Dec
    • National Bureau of Standards, "Data Encryption Standard Modes of Operation", FIPS Publication #81, NTIS, Dec 1980
    • (1980) Data Encryption Standard Modes of Operation
  • 32
    • 84949201174 scopus 로고    scopus 로고
    • Practical automated filter generation to explicitly enforce implicit input assumptions
    • Dec
    • V. Razmov and D. R. Simon, "Practical Automated Filter Generation to Explicitly Enforce Implicit Input Assumptions", 17th ACSAC, Dec 2001
    • (2001) 17th ACSAC
    • Razmov, V.1    Simon, D.R.2
  • 33
    • 84947912552 scopus 로고    scopus 로고
    • All-or-nothing encryption and the package transform
    • Springer-Verlag, 1997
    • R. L. Rivest, "All-Or-Nothing Encryption and The Package Transform", Fast Software Encryption 1997, LNCS 1267, Springer-Verlag, 1997, pp. 210-218
    • (1997) Fast Software Encryption, LNCS , vol.1267 , pp. 210-218
    • Rivest, R.L.1
  • 35
    • 0025564050 scopus 로고
    • Implementing fault-tolerant services using the state machine approach: A tutorial
    • F. Schneider, "Implementing Fault-Tolerant Services Using The State Machine Approach: A Tutorial", Computing Surveys, ACM, 22(4), 1990
    • (1990) Computing Surveys ACM , vol.22 , Issue.4
    • Schneider, F.1
  • 37
    • 0018545449 scopus 로고
    • How to share a secret
    • A. Shamir, "How to Share a Secret", CACM, 22(11), pp. 612-613, 1979
    • (1979) CACM , vol.22 , Issue.11 , pp. 612-613
    • Shamir, A.1
  • 40
    • 0031540744 scopus 로고    scopus 로고
    • Frangipani: A scalable distributed file system
    • ACM, Dec
    • C. Thekkath, T. Mann, and E. Lee, "Frangipani: A Scalable Distributed File System", 16th SOSP, ACM, Dec 1997, pp. 224-237
    • (1997) 16th SOSP , pp. 224-237
    • Thekkath, C.1    Mann, T.2    Lee, E.3
  • 42
    • 84948983471 scopus 로고    scopus 로고
    • Unicode Standard Annex #28: Unicode 3, 2, Mar
    • The Unicode Consortium, Unicode Standard Annex #28: Unicode 3.2, Mar 2002, http://www.unicode.org/unicode/reports/tr28/tr28-3
    • (2002) The Unicode Consortium
  • 43
    • 85084163931 scopus 로고    scopus 로고
    • Publius: A robust, tamper-evident censorship-resistant web publishing system
    • Aug
    • M. Waldman, A. D. Rubin, and L. F. Cranor, "Publius: A Robust, Tamper-Evident Censorship-Resistant Web Publishing System", 9th USENIX Security Symposium, Aug 2000, pp. 59-72
    • (2000) 9th USENIX Security Symposium , pp. 59-72
    • Waldman, M.1    Rubin, A.D.2    Cranor, L.F.3
  • 44
    • 0003340383 scopus 로고    scopus 로고
    • UTF-8, a transformation format of ISO 10646
    • Jan
    • F. Yergeau, "UTF-8, a Transformation Format of ISO 10646", RFC 2279, Jan 1998
    • (1998) RFC , vol.2279
    • Yergeau, F.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.