A two layered approach for securing an object store network
暂无分享,去创建一个
Ran Canetti | Shai Halevi | Noam Rinetzky | Dalit Naor | Michael Factor | Alain Azagury | Ohad Rodeh | Ealan A. Henis | Julian Satran | R. Canetti | S. Halevi | E. Henis | M. Factor | D. Naor | A. Azagury | J. Satran | N. Rinetzky | O. Rodeh
[1] Amos Fiat,et al. Competitive Paging Algorithms , 1991, J. Algorithms.
[2] Hugo Krawczyk,et al. Security Analysis of IKE's Signature-Based Key-Exchange Protocol , 2002, CRYPTO.
[3] Vincent Rijmen,et al. The Design of Rijndael , 2002, Information Security and Cryptography.
[4] Jim Zelenka,et al. File server scaling with network-attached secure disks , 1997, SIGMETRICS '97.
[5] Hugo Krawczyk,et al. Analysis of Key-Exchange Protocols and Their Use for Building Secure Channels , 2001, EUROCRYPT.
[6] David Mazières,et al. Separating key management from file system security , 1999, SOSP.
[7] Giuseppe Cattaneo,et al. Design and Implementation of a Transparent Cryptographic File System for Unix , 2007 .
[8] Noam Rinetzky,et al. Towards an object store , 2003, 20th IEEE/11th NASA Goddard Conference on Mass Storage Systems and Technologies, 2003. (MSST 2003). Proceedings..
[9] Erik Riedel,et al. A Framework for Evaluating Storage System Security , 2002, FAST.
[10] Jim Zelenka,et al. A cost-effective, high-bandwidth storage architecture , 1998, ASPLOS VIII.
[11] Darrell D. E. Long,et al. Strong Security for Network-Attached Storage , 2002, FAST.
[12] Matt Blaze,et al. A cryptographic file system for UNIX , 1993, CCS '93.
[13] Matt Blaze,et al. Key Management in an Encrypting File System , 1994, USENIX Summer.
[14] Vincent Rijmen,et al. The Design of Rijndael: AES - The Advanced Encryption Standard , 2002 .
[15] Randal C. Burns,et al. Authenticating Network-Attached Storage , 2000, IEEE Micro.
[16] Garth A. Gibson,et al. Security for a high performance commodity storage subsystem , 1999 .