Scale and performance in a distributed file system
ACM Transactions on Computer Systems (TOCS)
Coda: A Highly Available File System for a Distributed Workstation Environment
IEEE Transactions on Computers
A cryptographic file system for UNIX
CCS '93 Proceedings of the 1st ACM conference on Computer and communications security
File-system development with stackable layers
ACM Transactions on Computer Systems (TOCS) - Special issue on operating systems principles
The design and implementation of the 4.4BSD operating system
The design and implementation of the 4.4BSD operating system
Separating key management from file system security
Proceedings of the seventeenth ACM symposium on Operating systems principles
Communications of the ACM
Cryptography: Theory and Practice,Second Edition
Cryptography: Theory and Practice,Second Edition
Linux Kernel Module Programming Guide
Linux Kernel Module Programming Guide
Linux Kernel Internals
How to Manage Persistent State in DRM Systems
DRM '01 Revised Papers from the ACM CCS-8 Workshop on Security and Privacy in Digital Rights Management
Cryptographic File Systems Performance: What You Don't Know Can Hurt You
SISW '03 Proceedings of the Second IEEE International Security in Storage Workshop
Strong Security for Network-Attached Storage
FAST '02 Proceedings of the 1st USENIX Conference on File and Storage Technologies
A Framework for Evaluating Storage System Security
FAST '02 Proceedings of the 1st USENIX Conference on File and Storage Technologies
Securing distributed storage: challenges, techniques, and systems
Proceedings of the 2005 ACM workshop on Storage security and survivability
Cryptography as an operating system service: A case study
ACM Transactions on Computer Systems (TOCS)
Augmenting storage with an intrusion response primitive to ensure the security of critical data
ASIACCS '06 Proceedings of the 2006 ACM Symposium on Information, computer and communications security
Protecting file systems with transient authentication
Wireless Networks
Mobile Device Security Using Transient Authentication
IEEE Transactions on Mobile Computing
ASIACCS '07 Proceedings of the 2nd ACM symposium on Information, computer and communications security
Cryptographic device support for FreeBSD
BSDC'03 Proceedings of the BSD Conference 2003 on BSD Conference
Towards a deep-packet-filter toolkit for securing legacy resources
LISA '05 Proceedings of the 19th conference on Large Installation System Administration Conference - Volume 19
GnatDb: a small-footprint, secure database system
VLDB '02 Proceedings of the 28th international conference on Very Large Data Bases
Proceedings of the 2007 ACM workshop on Storage security and survivability
A cryptographic access control architecture secure against privileged attackers
Proceedings of the 2007 ACM workshop on Computer security architecture
Non-volatile memory and disks:: avenues for policy architectures
Proceedings of the 2007 ACM workshop on Computer security architecture
Stateless data concealment for distributed systems
Journal of Computer and System Sciences
Integrity checking in cryptographic file systems with constant trusted storage
SS'07 Proceedings of 16th USENIX Security Symposium on USENIX Security Symposium
Secure deletion for NAND flash file system
Proceedings of the 2008 ACM symposium on Applied computing
Athos: Efficient Authentication of Outsourced File Systems
ISC '08 Proceedings of the 11th international conference on Information Security
Proceedings of the 15th ACM conference on Computer and communications security
An Optimal Share Transfer Problem on Secret Sharing Storage Systems
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
MPISec I/O: Providing Data Confidentiality in MPI-I/O
CCGRID '09 Proceedings of the 2009 9th IEEE/ACM International Symposium on Cluster Computing and the Grid
PACISSO: P2P access control incorporating scalability and self-organization for storage systems
PACISSO: P2P access control incorporating scalability and self-organization for storage systems
A novel secure distributed disk system
ICACT'09 Proceedings of the 11th international conference on Advanced Communication Technology - Volume 2
gVault: a gmail based cryptographic network file system
Proceedings of the 21st annual IFIP WG 11.3 working conference on Data and applications security
Buffer cache level encryption for embedded secure operating system
EUC'07 Proceedings of the 2007 international conference on Embedded and ubiquitous computing
A direction to avoid re-encryption in cryptographic file sharing
NPC'07 Proceedings of the 2007 IFIP international conference on Network and parallel computing
ESORICS'09 Proceedings of the 14th European conference on Research in computer security
A survey of confidential data storage and deletion methods
ACM Computing Surveys (CSUR)
Transparent mobile storage protection in trusted virtual domains
LISA'09 Proceedings of the 23rd conference on Large installation system administration
On securing untrusted clouds with cryptography
Proceedings of the 9th annual ACM workshop on Privacy in the electronic society
A multi-user steganographic file system on untrusted shared storage
Proceedings of the 26th Annual Computer Security Applications Conference
Strong security for network-attached storage
FAST'02 Proceedings of the 1st USENIX conference on File and storage technologies
A framework for evaluating storage system security
FAST'02 Proceedings of the 1st USENIX conference on File and storage technologies
An NFSv4-Based security scheme for NAS
ISPA'05 Proceedings of the 2005 international conference on Parallel and Distributed Processing and Applications
Encrypted watermarks and linux laptop security
WISA'04 Proceedings of the 5th international conference on Information Security Applications
Secure key-updating for lazy revocation
ESORICS'06 Proceedings of the 11th European conference on Research in Computer Security
Key derivation algorithms for monotone access structures in cryptographic file systems
ESORICS'06 Proceedings of the 11th European conference on Research in Computer Security
Integration of a cryptographic file system and access control
WISI'06 Proceedings of the 2006 international conference on Intelligence and Security Informatics
A cloud provider-agnostic secure storage protocol
CRITIS'10 Proceedings of the 5th international conference on Critical Information Infrastructures Security
Hypervisor-based background encryption
Proceedings of the 27th Annual ACM Symposium on Applied Computing
Iris: a scalable cloud file system with efficient integrity checks
Proceedings of the 28th Annual Computer Security Applications Conference
Supporting security and consistency for cloud database
CSS'12 Proceedings of the 4th international conference on Cyberspace Safety and Security
ECFS: An Enterprise-Class Cryptographic File System for Linux
International Journal of Information Security and Privacy
SmartK: Smart cards in operating systems at kernel level
Information Security Tech. Report
ASCDS: a smartphone confidential data storage scheme
International Journal of Wireless and Mobile Computing
Hi-index | 0.00 |