Scale and performance in a distributed file system
ACM Transactions on Computer Systems (TOCS)
Integrating security in a large distributed system
ACM Transactions on Computer Systems (TOCS)
The design and implementation of a log-structured file system
SOSP '91 Proceedings of the thirteenth ACM symposium on Operating systems principles
Authentication in distributed systems: theory and practice
ACM Transactions on Computer Systems (TOCS)
Random oracles are practical: a paradigm for designing efficient protocols
CCS '93 Proceedings of the 1st ACM conference on Computer and communications security
Authentication in the Taos operating system
ACM Transactions on Computer Systems (TOCS) - Special issue on operating systems principles
File-system development with stackable layers
ACM Transactions on Computer Systems (TOCS) - Special issue on operating systems principles
A coherent distributed file cache with directory write-behind
ACM Transactions on Computer Systems (TOCS)
Description of a New Variable-Length Key, 64-bit Block Cipher (Blowfish)
Fast Software Encryption, Cambridge Security Workshop
Operating system services for wide-area applications
Operating system services for wide-area applications
SSH: secure login connections over the internet
SSYM'96 Proceedings of the 6th conference on USENIX Security Symposium, Focusing on Applications of Cryptography - Volume 6
A future-adaptive password scheme
ATEC '99 Proceedings of the annual conference on USENIX Annual Technical Conference
The exact security of digital signatures-how to sign with RSA and Rabin
EUROCRYPT'96 Proceedings of the 15th annual international conference on Theory and application of cryptographic techniques
Active network vision and reality: lessions from a capsule-based system
Proceedings of the seventeenth ACM symposium on Operating systems principles
OceanStore: an architecture for global-scale persistent storage
ASPLOS IX Proceedings of the ninth international conference on Architectural support for programming languages and operating systems
A low-bandwidth network file system
SOSP '01 Proceedings of the eighteenth ACM symposium on Operating systems principles
Wide-area cooperative storage with CFS
SOSP '01 Proceedings of the eighteenth ACM symposium on Operating systems principles
Fast and secure distributed read-only file system
ACM Transactions on Computer Systems (TOCS)
Deferring trust in fluid replication
EW 9 Proceedings of the 9th workshop on ACM SIGOPS European workshop: beyond the PC: new challenges for the operating system
A system architecture for pervasive computing
EW 9 Proceedings of the 9th workshop on ACM SIGOPS European workshop: beyond the PC: new challenges for the operating system
Practical byzantine fault tolerance and proactive recovery
ACM Transactions on Computer Systems (TOCS)
Building secure file systems out of byzantine storage
Proceedings of the twenty-first annual symposium on Principles of distributed computing
LegionFS: a secure and scalable file system supporting cross-domain high-performance applications
Proceedings of the 2001 ACM/IEEE conference on Supercomputing
Tarzan: a peer-to-peer anonymizing network layer
Proceedings of the 9th ACM conference on Computer and communications security
Enhancing the Scalability and Usability of Computational Grids via Logical User Accounts and Virtual
IPDPS '01 Proceedings of the 15th International Parallel & Distributed Processing Symposium
IPTPS '01 Revised Papers from the First International Workshop on Peer-to-Peer Systems
The Design and Implementation of a Transparent Cryptographic File System for UNIX
Proceedings of the FREENIX Track: 2001 USENIX Annual Technical Conference
Proceedings of the 11th USENIX Security Symposium
A Toolkit for User-Level File Systems
Proceedings of the General Track: 2002 USENIX Annual Technical Conference
Cryptographic access control in a distributed file system
Proceedings of the eighth ACM symposium on Access control models and technologies
Farsite: federated, available, and reliable storage for an incompletely trusted environment
ACM SIGOPS Operating Systems Review - OSDI '02: Proceedings of the 5th symposium on Operating systems design and implementation
Ivy: a read/write peer-to-peer file system
ACM SIGOPS Operating Systems Review - OSDI '02: Proceedings of the 5th symposium on Operating systems design and implementation
An integrated experimental environment for distributed systems and networks
ACM SIGOPS Operating Systems Review - OSDI '02: Proceedings of the 5th symposium on Operating systems design and implementation
WebDAVA: An Administrator-Free Approach To Web File-Sharing
WETICE '03 Proceedings of the Twelfth International Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises
Decentralized user authentication in a global file system
SOSP '03 Proceedings of the nineteenth ACM symposium on Operating systems principles
SHARP: an architecture for secure resource peering
SOSP '03 Proceedings of the nineteenth ACM symposium on Operating systems principles
Separating agreement from execution for byzantine fault tolerant services
SOSP '03 Proceedings of the nineteenth ACM symposium on Operating systems principles
Experience with an evolving overlay network testbed
ACM SIGCOMM Computer Communication Review
Unmanaged Internet Protocol: taming the edge network management crisis
ACM SIGCOMM Computer Communication Review
A layered naming architecture for the internet
Proceedings of the 2004 conference on Applications, technologies, architectures, and protocols for computer communications
DSM '04 Proceedings of the 1st international doctoral symposium on Middleware
Virtual Appliances for Deploying and Maintaining Software
LISA '03 Proceedings of the 17th USENIX conference on System administration
Securely Replicated Web Documents
IPDPS '05 Proceedings of the 19th IEEE International Parallel and Distributed Processing Symposium (IPDPS'05) - Papers - Volume 01
Farsite: federated, available, and reliable storage for an incompletely trusted environment
OSDI '02 Proceedings of the 5th symposium on Operating systems design and implementationCopyright restrictions prevent ACM from being able to make the PDFs for this conference available for downloading
Ivy: a read/write peer-to-peer file system
OSDI '02 Proceedings of the 5th symposium on Operating systems design and implementationCopyright restrictions prevent ACM from being able to make the PDFs for this conference available for downloading
An integrated experimental environment for distributed systems and networks
OSDI '02 Proceedings of the 5th symposium on Operating systems design and implementationCopyright restrictions prevent ACM from being able to make the PDFs for this conference available for downloading
Strong Security for Network-Attached Storage
FAST '02 Proceedings of the 1st USENIX Conference on File and Storage Technologies
A Framework for Evaluating Storage System Security
FAST '02 Proceedings of the 1st USENIX Conference on File and Storage Technologies
Plutus: Scalable Secure File Sharing on Untrusted Storage
FAST '03 Proceedings of the 2nd USENIX Conference on File and Storage Technologies
Speculative execution in a distributed file system
Proceedings of the twentieth ACM symposium on Operating systems principles
Toward securing untrusted storage without public-key operations
Proceedings of the 2005 ACM workshop on Storage security and survivability
Secure capabilities for a petabyte-scale object-based distributed file system
Proceedings of the 2005 ACM workshop on Storage security and survivability
Operating System Level Support for Resource Sharing Across Multiple Domains
HPCASIA '05 Proceedings of the Eighth International Conference on High-Performance Computing in Asia-Pacific Region
Augmenting storage with an intrusion response primitive to ensure the security of critical data
ASIACCS '06 Proceedings of the 2006 ACM Symposium on Information, computer and communications security
Event-driven programming for robust software
EW 10 Proceedings of the 10th workshop on ACM SIGOPS European workshop
Forensic analysis of database tampering
Proceedings of the 2006 ACM SIGMOD international conference on Management of data
Protecting file systems with transient authentication
Wireless Networks
Speculative execution in a distributed file system
ACM Transactions on Computer Systems (TOCS)
Modeling and improving security of a local disk system for write-intensive workloads
ACM Transactions on Storage (TOS)
Design and implementation of a secure wide-area object middleware
Computer Networks: The International Journal of Computer and Telecommunications Networking
REX: secure, extensible remote execution
ATEC '04 Proceedings of the annual conference on USENIX Annual Technical Conference
NSDI'04 Proceedings of the 1st conference on Symposium on Networked Systems Design and Implementation - Volume 1
Fast and secure distributed read-only file system
OSDI'00 Proceedings of the 4th conference on Symposium on Operating System Design & Implementation - Volume 4
Proactive recovery in a Byzantine-fault-tolerant system
OSDI'00 Proceedings of the 4th conference on Symposium on Operating System Design & Implementation - Volume 4
Middleboxes no longer considered harmful
OSDI'04 Proceedings of the 6th conference on Symposium on Opearting Systems Design & Implementation - Volume 6
Capability file names: separating authorisation from user management in an internet file system
SSYM'01 Proceedings of the 10th conference on USENIX Security Symposium - Volume 10
Capability file names: separating authorisation from user management in an internet file system
SSYM'01 Proceedings of the 10th conference on USENIX Security Symposium - Volume 10
A data-oriented (and beyond) network architecture
Proceedings of the 2007 conference on Applications, technologies, architectures, and protocols for computer communications
Persistent personal names for globally connected mobile devices
OSDI '06 Proceedings of the 7th symposium on Operating systems design and implementation
Proceedings of the 2007 ACM workshop on Storage security and survivability
Non-volatile memory and disks:: avenues for policy architectures
Proceedings of the 2007 ACM workshop on Computer security architecture
Alpaca: extensible authorization for distributed services
Proceedings of the 14th ACM conference on Computer and communications security
Stateless data concealment for distributed systems
Journal of Computer and System Sciences
Stork: package management for distributed VM environments
LISA'07 Proceedings of the 21st conference on Large Installation System Administration Conference
VegaFS: file sharing crossing multiple domains
International Journal of High Performance Computing and Networking
A user-level secure grid file system
Proceedings of the 2007 ACM/IEEE conference on Supercomputing
Integrity checking in cryptographic file systems with constant trusted storage
SS'07 Proceedings of 16th USENIX Security Symposium on USENIX Security Symposium
A nine year study of file system and storage benchmarking
ACM Transactions on Storage (TOS)
Decentralized access control in distributed file systems
ACM Computing Surveys (CSUR)
Accountable internet protocol (aip)
Proceedings of the ACM SIGCOMM 2008 conference on Data communication
Forensic analysis of database tampering
ACM Transactions on Database Systems (TODS)
Proceedings of the 1st Workshop on Social Network Systems
Proceedings of the 15th ACM conference on Computer and communications security
A look in the mirror: attacks on package managers
Proceedings of the 15th ACM conference on Computer and communications security
Parameterized access control: from design to prototype
Proceedings of the 4th international conference on Security and privacy in communication netowrks
Privacy analysis and enhancements for data sharing in *nix systems
International Journal of Information and Computer Security
Efficient access to many samall files in a filesystem for grid computing
GRID '07 Proceedings of the 8th IEEE/ACM International Conference on Grid Computing
Design considerations for a network of information
CoNEXT '08 Proceedings of the 2008 ACM CoNEXT Conference
Integrity Protection for Revision Control
ACNS '09 Proceedings of the 7th International Conference on Applied Cryptography and Network Security
On protecting integrity and confidentiality of cryptographic file system for outsourced storage
Proceedings of the 2009 ACM workshop on Cloud computing security
Proceedings of the 5th international conference on Emerging networking experiments and technologies
LANES: an inter-domain data-oriented routing architecture
Proceedings of the 2009 workshop on Re-architecting the internet
PACISSO: P2P access control incorporating scalability and self-organization for storage systems
PACISSO: P2P access control incorporating scalability and self-organization for storage systems
Policy-based access control for weakly consistent replication
Proceedings of the 5th European conference on Computer systems
Fileteller: paying and getting paid for file storage
FC'02 Proceedings of the 6th international conference on Financial cryptography
A survey of peer-to-peer security issues
ISSS'02 Proceedings of the 2002 Mext-NSF-JSPS international conference on Software security: theories and systems
Constructing secure mobile agent systems using the agent operating system
International Journal of Intelligent Information and Database Systems
A survey of confidential data storage and deletion methods
ACM Computing Surveys (CSUR)
Tiled-MapReduce: optimizing resource usages of data-parallel applications on multicore with tiling
Proceedings of the 19th international conference on Parallel architectures and compilation techniques
Object storage on CRAQ: high-throughput chain replication for read-mostly workloads
USENIX'09 Proceedings of the 2009 conference on USENIX Annual technical conference
Quality of security adaptation in parallel disk systems
Journal of Parallel and Distributed Computing
Scalable routing on flat names
Proceedings of the 6th International COnference
Depot: cloud storage with minimal trust
OSDI'10 Proceedings of the 9th USENIX conference on Operating systems design and implementation
Key management for large-scale distributed storage systems
EuroPKI'09 Proceedings of the 6th European conference on Public key infrastructures, services and applications
On name-based inter-domain routing
Computer Networks: The International Journal of Computer and Telecommunications Networking
Keypad: an auditing file system for theft-prone devices
Proceedings of the sixth conference on Computer systems
Strong security for network-attached storage
FAST'02 Proceedings of the 1st USENIX conference on File and storage technologies
A framework for evaluating storage system security
FAST'02 Proceedings of the 1st USENIX conference on File and storage technologies
Communications of the ACM
Depot: Cloud Storage with Minimal Trust
ACM Transactions on Computer Systems (TOCS)
Information-centric networking: seeing the forest for the trees
Proceedings of the 10th ACM Workshop on Hot Topics in Networks
XIA: an architecture for an evolvable and trustworthy internet
Proceedings of the 10th ACM Workshop on Hot Topics in Networks
Verifying and enforcing network paths with icing
Proceedings of the Seventh COnference on emerging Networking EXperiments and Technologies
An NFSv4-Based security scheme for NAS
ISPA'05 Proceedings of the 2005 international conference on Parallel and Distributed Processing and Applications
On consistency of encrypted files
DISC'06 Proceedings of the 20th international conference on Distributed Computing
Secure identity and location decoupling using peer-to-peer networks
ICN'05 Proceedings of the 4th international conference on Networking - Volume Part II
Secure overlay for service centric wireless sensor networks
ESAS'04 Proceedings of the First European conference on Security in Ad-hoc and Sensor Networks
Serval: an end-host stack for service-centric networking
NSDI'12 Proceedings of the 9th USENIX conference on Networked Systems Design and Implementation
XIA: efficient support for evolvable internetworking
NSDI'12 Proceedings of the 9th USENIX conference on Networked Systems Design and Implementation
Tiled-MapReduce: Efficient and Flexible MapReduce Processing on Multicore with Tiling
ACM Transactions on Architecture and Code Optimization (TACO)
Nephele: Scalable Access Control for Federated File Services
Journal of Grid Computing
Less pain, most of the gain: incrementally deployable ICN
Proceedings of the ACM SIGCOMM 2013 conference on SIGCOMM
On name-based group communication: Challenges, concepts, and transparent deployment
Computer Communications
A secure file sharing service for distributed computing environments
The Journal of Supercomputing
Hi-index | 0.02 |
No secure network file system has ever grown to span the Internet. Existing systems all lack adequate key management for security at a global scale. Given the diversity of the Internet, any particular mechanism a file system employs to manage keys will fail to support many types of use.We propose separating key management from file system security, letting the world share a single global file system no matter how individuals manage keys. We present SFS, a secure file system that avoids internal key management. While other file systems need key management to map file names to encryption keys, SFS file names effectively contain public keys, making them self-certifying pathnames. Key management in SFS occurs outside of the file system, in whatever procedure users choose to generate file names.Self-certifying pathnames free SFS clients from any notion of administrative realm, making inter-realm file sharing trivial. They let users authenticate servers through a number of different techniques. The file namespace doubles as a key certification namespace, so that people can realize many key management schemes using only standard file utilities. Finally, with self-certifying pathnames, people can bootstrap one key management mechanism using another. These properties make SFS more versatile than any file system with built-in key management.