메뉴 건너뛰기




Volumn , Issue , 2000, Pages

How to build a trusted database system on untrusted storage

Author keywords

[No Author keywords available]

Indexed keywords

APPLICATION PROGRAMS; CRYPTOGRAPHY; DIGITAL STORAGE; SYSTEMS ANALYSIS;

EID: 84968422314     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (109)

References (29)
  • 1
    • 84955621400 scopus 로고    scopus 로고
    • Tamper resistant software: An implementation
    • Lecture Notes in Computer Science Cambridge, UK
    • D. Aucsmith. Tamper resistant software: an implementation. In Proc. International Workshop on Information Hiding, Lecture Notes in Computer Science, Vol. 1174, Cambridge, UK, 1996, pp. 317-333.
    • (1996) Proc. International Workshop on Information Hiding , vol.1174 , pp. 317-333
    • Aucsmith, D.1
  • 3
    • 85084161619 scopus 로고
    • Heuristic cleaning algorithms in log-structured file systems
    • New Orleans, LA
    • T. Blackwell, J. Harris, and M. Seltzer. Heuristic cleaning algorithms in log-structured file systems. In Proc. USENIX Technical Conference, New Orleans, LA, 1995, pp. 249-264.
    • (1995) Proc. USENIX Technical Conference , pp. 249-264
    • Blackwell, T.1    Harris, J.2    Seltzer, M.3
  • 4
    • 0038223020 scopus 로고    scopus 로고
    • Forward integrity for secure audit logs
    • Computer Science and Engineering Department, University of California at San Diego
    • M. Bellare and B. Yee. Forward integrity for secure audit logs. Technical Report, Computer Science and Engineering Department, University of California at San Diego, 1997.
    • (1997) Technical Report
    • Bellare, M.1    Yee, B.2
  • 5
    • 0027684663 scopus 로고
    • Operating system protection through program evolution
    • Oxford
    • F. Cohen. Operating system protection through program evolution. In Computers & Security, 12(6), Oxford, 1993.
    • (1993) Computers & Security , vol.12 , Issue.6
    • Cohen, F.1
  • 14
    • 84883778394 scopus 로고    scopus 로고
    • August
    • Infineon Technologies. Eurochip II-SLE 5536, http://www.infineon.com/cgi/ecrm.dll/ecrm/scripts/prod-ov.jsp?oid=14702&cat-oid=-8233, August 2000.
    • (2000) Eurochip II-SLE 5536
  • 15
    • 84860063023 scopus 로고    scopus 로고
    • August
    • InterTrust Technologies Corp. Digital rights management. http://www.intertrust.com/de/index.html, August 2000.
    • (2000) Digital Rights Management
  • 16
    • 85029376135 scopus 로고    scopus 로고
    • August
    • IBM. Cryptolope technology, http://www.software.ibm.com/security/cryptolope, August 2000.
    • (2000) Cryptolope Technology
  • 22
    • 0024641589 scopus 로고
    • Efficient dispersal of information for security, load balancing, and fault tolerance
    • T. Rabin. Efficient dispersal of information for security, load balancing, and fault tolerance. Journal of the ACM, 36(2), 1989, pp. 335-348.
    • (1989) Journal of the ACM , vol.36 , Issue.2 , pp. 335-348
    • Rabin, T.1
  • 25
    • 85084161255 scopus 로고    scopus 로고
    • Cryptographic support for secure logs on untrusted machines
    • San Antonio, TX
    • B. Schneier and J. Kelsey. Cryptographic support for secure logs on untrusted machines. In Proc. USENIX Security Symposium, San Antonio, TX, 1998, pp. 52-62.
    • (1998) Proc. USENIX Security Symposium , pp. 52-62
    • Schneier, B.1    Kelsey, J.2
  • 27
    • 85029390978 scopus 로고    scopus 로고
    • August
    • Wave Systems Corp. The Embassy e-commerce system. http://www.wave.com/technology/Embassywhitepaper.pdf, August 2000.
    • (2000) The Embassy E-commerce System
  • 28
  • 29
    • 84947804767 scopus 로고
    • Licentiate's thesis, Helsinki University of Technology
    • T. Ylonen. Shadow paging is feasible. Licentiate's thesis, Helsinki University of Technology, 1994.
    • (1994) Shadow Paging is Feasible
    • Ylonen, T.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.