Design for a Decentralized Security System For Network Attached Storage
暂无分享,去创建一个
[1] Steven M. Bellovin,et al. Limitations of the Kerberos authentication system , 1990, CCRV.
[2] Shivakumar Venkataraman,et al. The TickerTAIP parallel RAID architecture , 1993, ISCA '93.
[3] Ronald L. Rivest,et al. The RC5 Encryption Algorithm , 1994, FSE.
[4] Neil Haller,et al. The S/KEY One-Time Password System , 1995, RFC.
[5] N.E. Hastings,et al. TCP/IP spoofing fundamentals , 1996, Conference Proceedings of the 1996 IEEE Fifteenth Annual International Phoenix Conference on Computers and Communications.
[6] Jeanna Neefe Matthews,et al. Serverless network file systems , 1996, TOCS.
[7] Jim Reid. Plugging the holes in host-based authentication , 1996, Comput. Secur..
[8] Hugo Krawczyk,et al. Keying Hash Functions for Message Authentication , 1996, CRYPTO.
[9] Chandramohan A. Thekkath,et al. Frangipani: a scalable distributed file system , 1997, SOSP.
[10] Garth A. Gibson,et al. Filesystems for Network-Attached Secure Disks, , 1997 .
[11] Ethan L. Miller,et al. An experimental analysis of cryptographic overhead in performance-critical systems , 1999, MASCOTS '99. Proceedings of the Seventh International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems.