Insider Threats are Getting Worse within Industries: Isolated Secondary Backup Required
暂无分享,去创建一个
[1] Kazuhiko Kato,et al. Protection and Recovery of Disk Encryption Key Using Smart Cards , 2008, Fifth International Conference on Information Technology: New Generations (itng 2008).
[2] Anand Sivasubramaniam,et al. Multi-level Crypto Disk: Secondary Storage with Flexible Performance Versus Security Trade-offs , 2010, 2010 IEEE International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems.
[3] Min Liang,et al. Research and design of full disk encryption based on virtual machine , 2010, 2010 3rd International Conference on Computer Science and Information Technology.
[4] Ilsun You,et al. Safe Authentication Protocol for Secure USB Memories , 2010, J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl..
[5] Mahmut Kandemir,et al. Securing Disk-Resident Data through Application Level Encryption , 2007 .
[6] A. Tomlinson,et al. Secure Virtual Disk Images for Grid Computing , 2008, 2008 Third Asia-Pacific Trusted Infrastructure Technologies Conference.
[7] Ethan L. Miller,et al. An experimental analysis of cryptographic overhead in performance-critical systems , 1999, MASCOTS '99. Proceedings of the Seventh International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems.
[8] Li Jun,et al. Trusted full disk encryption model based on TPM , 2010, The 2nd International Conference on Information Science and Engineering.
[9] Fangyong Hou,et al. Secure Disk with Authenticated Encryption and IV Verification , 2009, 2009 Fifth International Conference on Information Assurance and Security.
[10] Jian He,et al. Research on Storage Security Based on Trusted Computing Platform , 2008, 2008 International Symposium on Electronic Commerce and Security.
[11] Tom Coughlin,et al. Disposal of Disk and Tape Data by Secure Sanitization , 2009, IEEE Security & Privacy.
[12] Wen-Zhi Chen,et al. Cerberus: A Novel Hypervisor to Provide Trusted and Isolated Code Execution , 2010, 2010 International Conference of Information Science and Management Engineering.
[13] Shinsaku Kiyomoto,et al. Towards Secure Cloud Computing Architecture - A Solution Based on Software Protection Mechanism , 2011, J. Internet Serv. Inf. Secur..