메뉴 건너뛰기




Volumn , Issue , 2003, Pages 29-42

Plutus: Scalable secure file sharing on untrusted storage

Author keywords

[No Author keywords available]

Indexed keywords

PUBLIC KEY CRYPTOGRAPHY;

EID: 85033460636     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (452)

References (51)
  • 4
    • 35048891868 scopus 로고    scopus 로고
    • Keying hash functions for message authentication
    • M. Bellare, R. Canetti, and H. Krawczyk. Keying hash functions for message authentication. In CRYPTO, pages 1–15, 1996.
    • (1996) CRYPTO , pp. 1-15
    • Bellare, M.1    Canetti, R.2    Krawczyk, H.3
  • 5
    • 0027764777 scopus 로고
    • A cryptographic file system for UNIX
    • M. Blaze. A cryptographic file system for UNIX. In CCS, 1993.
    • (1993) CCS
    • Blaze, M.1
  • 6
    • 0000552770 scopus 로고    scopus 로고
    • Twenty years of attacks on the RSA cryptosystem
    • D. Boneh. Twenty years of attacks on the RSA cryptosystem. Notices of the AMS, 46, 1999.
    • (1999) Notices of the AMS , vol.46
    • Boneh, D.1
  • 7
    • 85013791146 scopus 로고    scopus 로고
    • Proactive recovery in a byzantine-fault-tolerant system
    • October
    • M. Castro and B. Liskov. Proactive recovery in a Byzantine-fault-tolerant system. In OSDI, pages 273–288, October 2000.
    • (2000) OSDI , pp. 273-288
    • Castro, M.1    Liskov, B.2
  • 10
    • 85077196808 scopus 로고    scopus 로고
    • Trusted linux: An operating system approach
    • February
    • C. Dalton and T. Choo. Trusted linux: An operating system approach. CACM, 44(2), February 2001.
    • (2001) CACM , vol.44 , Issue.2
    • Dalton, C.1    Choo, T.2
  • 11
    • 0035204340 scopus 로고    scopus 로고
    • Optimizing file availability in a secure serverless distributed file system
    • J. R. Douceur and R. P. Wattenhofer. Optimizing file availability in a secure serverless distributed file system. In SRDS, pages 4–13, 2001.
    • (2001) SRDS , pp. 4-13
    • Douceur, J.R.1    Wattenhofer, R.P.2
  • 12
    • 0037542382 scopus 로고    scopus 로고
    • Storage management and caching in PAST, a large-scale, persistent peer-to-peer storage utility
    • P. Druschel and A. Rowstron. Storage management and caching in PAST, a large-scale, persistent peer-to-peer storage utility. In SOSP, 2001.
    • (2001) SOSP
    • Druschel, P.1    Rowstron, A.2
  • 16
    • 85084162114 scopus 로고    scopus 로고
    • Embedded inodes and explicit grouping: Exploiting disk bandwidth for small files
    • G. Ganger and M. Kaashoek. Embedded inodes and explicit grouping: Exploiting disk bandwidth for small files. In USENIX Tech. Conf., pages 1–17, 1997.
    • (1997) USENIX Tech. Conf. , pp. 1-17
    • Ganger, G.1    Kaashoek, M.2
  • 18
    • 0023978621 scopus 로고
    • The cedar file system
    • March
    • D. Gifford, R. Needham, and M. Schroeder. The Cedar file system. In CACM, pages 288–298, March 1988.
    • (1988) CACM , pp. 288-298
    • Gifford, D.1    Needham, R.2    Schroeder, M.3
  • 21
    • 85033498470 scopus 로고    scopus 로고
    • Sirius: Securing remote untrusted storage
    • To appear
    • E. Goh, H. Shacham, N. Modadugu, and D. Boneh. SiRiUS: Securing remote untrusted storage. In NDSS, 2003. To appear.
    • (2003) NDSS
    • Goh, E.1    Shacham, H.2    Modadugu, N.3    Boneh, D.4
  • 26
    • 0018518477 scopus 로고
    • How to make a multiprocessor computer that correctly executes multiprocessor programs
    • L. Lamport. How to make a multiprocessor computer that correctly executes multiprocessor programs. IEEE Trans. on Computers, C-28(9):690–691, 1979.
    • (1979) IEEE Trans. On Computers , vol.C-28 , Issue.9 , pp. 690-691
    • Lamport, L.1
  • 27
    • 0019634370 scopus 로고
    • Password authentication with insecure communication
    • L. Lamport. Password authentication with insecure communication. CACM, 24(11):770–772, 1981.
    • (1981) CACM , vol.24 , Issue.11 , pp. 770-772
    • Lamport, L.1
  • 28
  • 30
    • 84978429558 scopus 로고    scopus 로고
    • Separating key management from file system security
    • December
    • D. Mazières, M. Kaminsky, M. Kaashoek, and E. Witchel. Separating key management from file system security. In SOSP, pages 124–139, December 1999.
    • (1999) SOSP , pp. 124-139
    • Mazières, D.1    Kaminsky, M.2    Kaashoek, M.3    Witchel, E.4
  • 31
    • 0035703990 scopus 로고    scopus 로고
    • Don’t trust your file server
    • May
    • D. Mazières and D. Shasha. Don’t trust your file server. In HotOS, pages 113–118, May 2001.
    • (2001) HotOS , pp. 113-118
    • Mazières, D.1    Shasha, D.2
  • 32
    • 21844454934 scopus 로고    scopus 로고
    • Building secure file systems out of byzantine storage
    • D. Mazières and D. Shasha. Building secure file systems out of byzantine storage. In PODC, pages 1–15, 2002.
    • (2002) PODC , pp. 1-15
    • Mazières, D.1    Shasha, D.2
  • 34
    • 84958802026 scopus 로고
    • A digital signature based on a conventional encryption function
    • R. C. Merkle. A digital signature based on a conventional encryption function. In CRYPTO, volume 293, pages 369–378, 1987.
    • (1987) CRYPTO , vol.293 , pp. 369-378
    • Merkle, R.C.1
  • 35
    • 4644274612 scopus 로고    scopus 로고
    • Strong security for distributed file systems
    • January
    • E. Miller, D. Long, W. Freeman, and B. Reed. Strong security for distributed file systems. In FAST, pages 1–13, January 2002.
    • (2002) FAST , pp. 1-13
    • Miller, E.1    Long, D.2    Freeman, W.3    Reed, B.4
  • 36
    • 33645436028 scopus 로고    scopus 로고
    • Ivy: A read/write peer-to-peer file system
    • December
    • A. Muthitacharoen, R. Morris, T. Gil, and B. Chen. Ivy: A read/write peer-to-peer file system. In OSDI, December 2002.
    • (2002) OSDI
    • Muthitacharoen, A.1    Morris, R.2    Gil, T.3    Chen, B.4
  • 37
    • 85077187617 scopus 로고    scopus 로고
    • OpenAFS. http://www.openafs.org/.
  • 38
    • 85084160673 scopus 로고    scopus 로고
    • Venti: A new approach to archival data storage
    • January
    • S. Quinlan and S. Dorward. Venti: A new approach to archival data storage. In FAST, pages 89–102, January 2002.
    • (2002) FAST , pp. 89-102
    • Quinlan, S.1    Dorward, S.2
  • 39
    • 0024641589 scopus 로고
    • Efficient dispersal of information for security, load balancing and fault tolerance
    • M. Rabin. Efficient dispersal of information for security, load balancing and fault tolerance. JACM, 36(2):335–348, 1989.
    • (1989) JACM , vol.36 , Issue.2 , pp. 335-348
    • Rabin, M.1
  • 40
    • 85084162793 scopus 로고    scopus 로고
    • A framework for evalauting storage system security
    • January
    • E. Riedel, M. Kallahalla, and R. Swaminathan. A framework for evalauting storage system security. In FAST, pages 15–30, January 2002.
    • (2002) FAST , pp. 15-30
    • Riedel, E.1    Kallahalla, M.2    Swaminathan, R.3
  • 41
    • 47249105152 scopus 로고    scopus 로고
    • Deciding when to forget in the elephant file system
    • December
    • D. Santry, M. Feeley, N. Hutchinson, A. Veitch, R. Carton, and J. Ofir. Deciding when to forget in the elephant file system. In SOSP, pages 110–123, December 1999.
    • (1999) SOSP , pp. 110-123
    • Santry, D.1    Feeley, M.2    Hutchinson, N.3    Veitch, A.4    Carton, R.5    Ofir, J.6
  • 44
    • 0025564050 scopus 로고
    • Implementing fault-tolerant services using the state machine approach: A tutorial
    • December
    • F. Schneider. Implementing fault-tolerant services using the state machine approach: A tutorial. ACM Computing Surveys, 22(4):299–319, December 1990.
    • (1990) ACM Computing Surveys , vol.22 , Issue.4 , pp. 299-319
    • Schneider, F.1
  • 47
    • 84978374045 scopus 로고    scopus 로고
    • Self-securing storage: Protecting data in compromised systems
    • October
    • J. Strunk, G. Goodson, M. Scheinholtz, C. Soules, and G. Ganger. Self-securing storage: protecting data in compromised systems. In OSDI, October 2000.
    • (2000) OSDI
    • Strunk, J.1    Goodson, G.2    Scheinholtz, M.3    Soules, C.4    Ganger, G.5
  • 49
    • 84977284109 scopus 로고
    • How to make replicated data secure
    • D. Tygar and M. Herlihy. How to make replicated data secure. In CRYPTO, pages 379–391, 1987.
    • (1987) CRYPTO , pp. 379-391
    • Tygar, D.1    Herlihy, M.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.