SiRiUS: Securing Remote Untrusted Storage
暂无分享,去创建一个
Hovav Shacham | Dan Boneh | Nagendra Modadugu | Eu-Jin Goh | D. Boneh | H. Shacham | Eu-Jin Goh | N. Modadugu
[1] Dan Walsh,et al. Design and implementation of the Sun network filesystem , 1985, USENIX Conference Proceedings.
[2] Ralph C. Merkle,et al. A Digital Signature Based on a Conventional Encryption Function , 1987, CRYPTO.
[3] Samuel J. Leffler,et al. The design and implementation of the 4.3 BSD Unix operating system , 1991, Addison-Wesley series in computer science.
[4] Matt Blaze,et al. A cryptographic file system for UNIX , 1993, CCS '93.
[5] Marshall K. McKusick,et al. Union Mounts in 4.4BSD-Lite , 1995, USENIX.
[6] Brent Callaghan,et al. NFS Version 3 Protocol Specification , 1995, RFC.
[7] Andy Barnhart,et al. The common Internet file system , 1997 .
[8] Erez Zadok,et al. Cryptfs: A Stackable Vnode Level Encryption File System , 1998 .
[9] Brent Callaghan,et al. NFS Illustrated , 1999 .
[10] Miguel Oom Temudo de Castro,et al. Practical Byzantine fault tolerance , 1999, OSDI '99.
[11] David Mazières,et al. Separating key management from file system security , 1999, SOSP.
[12] Monica Chew,et al. Extended Cryptographic File System , 1999 .
[13] Kevin Fu,et al. Group Sharing and Random Access in Cryptographic Storage File Systems , 1999 .
[14] Declan Patrick O'Shanahan. CryptosFS: Fast Cryptographic Secure NFS , 2000 .
[15] Radek Vingralek,et al. How to build a trusted database system on untrusted storage , 2000, OSDI.
[16] Amos Fiat,et al. Tracing traitors , 2000, IEEE Trans. Inf. Theory.
[17] Dennis Shasha,et al. Don't trust your file server , 2001, Proceedings Eighth Workshop on Hot Topics in Operating Systems.
[18] Moni Naor,et al. Revocation and Tracing Schemes for Stateless Receivers , 2001, CRYPTO.
[19] David Mazières,et al. A Toolkit for User-Level File Systems , 2001, USENIX Annual Technical Conference, General Track.
[20] Morris J. Dworkin,et al. SP 800-38A 2001 edition. Recommendation for Block Cipher Modes of Operation: Methods and Techniques , 2001 .
[21] Giuseppe Cattaneo,et al. Design and Implementation of a Transparent Cryptographic File System for Unix , 2007 .
[22] E. Miller,et al. Strong security for distributed file systems , 2001, Conference Proceedings of the 2001 IEEE International Performance, Computing, and Communications Conference (Cat. No.01CH37210).
[23] Adi Shamir,et al. The LSD Broadcast Encryption Scheme , 2002, CRYPTO.
[24] Brian D. Noble,et al. Zero-interaction authentication , 2002, MobiCom '02.
[25] Miguel Castro,et al. Farsite: federated, available, and reliable storage for an incompletely trusted environment , 2002, OPSR.
[26] Robert Tappan Morris,et al. Ivy: a read/write peer-to-peer file system , 2002, OSDI '02.
[27] Qian Wang,et al. Plutus: Scalable Secure File Sharing on Untrusted Storage , 2003, FAST.
[28] Matthew K. Franklin,et al. Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.
[29] Morris Dworkin,et al. Special Publication 800-38C, Recommendation for Block Cipher Modes of Operation: the CCM Mode for Authentication and Confidentiality , 2003 .
[30] Silvio Micali,et al. On-line/off-line digital signatures , 1996, Journal of Cryptology.