Enhanced Data Security Framework for Storage Area Networks
暂无分享,去创建一个
[1] Erez Zadok,et al. Proceedings of the General Track: 2003 Usenix Annual Technical Conference Ncryptfs: a Secure and Convenient Cryptographic File System , 2022 .
[2] Yvo Desmedt,et al. Man-in-the-Middle Attack , 2005, Encyclopedia of Cryptography and Security.
[3] H. Apte,et al. Serverless Network File Systems , 2006 .
[4] Hervé Debar,et al. A neural network component for an intrusion detection system , 1992, Proceedings 1992 IEEE Computer Society Symposium on Research in Security and Privacy.
[5] Walter L. McKnight. What Is Information Assurance , 2002 .
[6] Erik Riedel,et al. A Framework for Evaluating Storage System Security , 2002, FAST.
[7] Howard Gobioff,et al. Security for Network Attached Storage Devices , 1997 .
[8] Kotagiri Ramamohanarao,et al. Network Security Framework , 2006 .
[9] Robert J. T. Morris,et al. The evolution of storage systems , 2003, IBM Syst. J..
[10] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[11] Himanshu Dwivedi. Securing Storage: A Practical Guide to SAN and NAS Security , 2005 .
[12] Janice C. Sipior,et al. A Framework for Information Security Management Based on Guiding Standards: A United States Perspective , 2008 .
[13] Jim Zelenka,et al. A cost-effective, high-bandwidth storage architecture , 1998, ASPLOS VIII.
[14] Tom Clark. Designing Storage Area Networks , 1999 .
[15] Dorothy E. Denning,et al. An Intrusion-Detection Model , 1987, IEEE Transactions on Software Engineering.
[16] Mohammad Banikazemi,et al. Storage-based intrusion detection for storage area networks (SANs) , 2005, 22nd IEEE / 13th NASA Goddard Conference on Mass Storage Systems and Technologies (MSST'05).
[17] Ethan L. Miller,et al. Design for a Decentralized Security System For Network Attached Storage , 2000, IEEE Symposium on Mass Storage Systems.
[18] Gregory R. Ganger,et al. Storage-Based Intrusion Detection , 2010, TSEC.
[19] Benjamin Aziz,et al. Configuring storage-area networks using mandatory security , 2009, J. Comput. Secur..
[20] Gerald L. Kovacich,et al. What is Information Assurance , 2001 .