SOSP '91 Proceedings of the thirteenth ACM symposium on Operating systems principles
A cryptographic file system for UNIX
CCS '93 Proceedings of the 1st ACM conference on Computer and communications security
Secure deletion of data from magnetic and solid-state memory
SSYM'96 Proceedings of the 6th conference on USENIX Security Symposium, Focusing on Applications of Cryptography - Volume 6
STACS'99 Proceedings of the 16th annual conference on Theoretical aspects of computer science
IEEE Security and Privacy
DISP: Practical, efficient, secure and fault-tolerant distributed data storage
ACM Transactions on Storage (TOS)
Reliability and security of RAID storage systems and D2D archives using SATA disk drives
ACM Transactions on Storage (TOS)
ISICT '04 Proceedings of the 2004 international symposium on Information and communication technologies
IEEE Security and Privacy
Toward a threat model for storage systems
Proceedings of the 2005 ACM workshop on Storage security and survivability
Satisfiability-based framework for enabling side-channel attacks on cryptographic software
Proceedings of the conference on Design, automation and test in Europe: Designers' forum
Data lifetime is a systems problem
Proceedings of the 11th workshop on ACM SIGOPS European workshop
Scrubbing Stubborn Data: An Evaluation of Counter-Forensic Privacy Tools
IEEE Security and Privacy
Trusted Computing for Disk Drives and Other Peripherals
IEEE Security and Privacy
Complete delete vs. time machine computing
ACM SIGOPS Operating Systems Review
A study of information privacy and data sanitization problems: student paper
Journal of Computing Sciences in Colleges
Taking advantages of a disadvantage: Digital forensics and steganography using document metadata
Journal of Systems and Software
Threats to privacy in the forensic analysis of database systems
Proceedings of the 2007 ACM SIGMOD international conference on Management of data
Secure deletion for a versioning file system
FAST'05 Proceedings of the 4th conference on USENIX Conference on File and Storage Technologies - Volume 4
End user concern about security and privacy threats
Proceedings of the 3rd symposium on Usable privacy and security
Aiding side-channel attacks on cryptographic software with satisfiability-based analysis
IEEE Transactions on Very Large Scale Integration (VLSI) Systems
Queue - Power Management
Seeing the invisible: forensic uses of anomaly detection and machine learning
ACM SIGOPS Operating Systems Review
When cryptography meets storage
Proceedings of the 4th ACM international workshop on Storage security and survivability
Extending digital repository architectures to support disk image preservation and access
Proceedings of the 11th annual international ACM/IEEE joint conference on Digital libraries
Digital forensics on a virtual machine
Proceedings of the 49th Annual Southeast Regional Conference
Dark clouds on the horizon: using cloud storage as attack vector and online slack space
SEC'11 Proceedings of the 20th USENIX conference on Security
AmazonIA: when elasticity snaps back
Proceedings of the 18th ACM conference on Computer and communications security
Personal computer privacy: analysis for korean PC users
IWSEC'06 Proceedings of the 1st international conference on Security
Parasites: Parasites: what you can't see can hurt you
Network Security
Data node encrypted file system: efficient secure deletion for flash memory
Security'12 Proceedings of the 21st USENIX conference on Security symposium
TrueErase: per-file secure deletion for the storage data path
Proceedings of the 28th Annual Computer Security Applications Conference
Secure data deletion from persistent media
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security
Memory efficient sanitization of a deduplicated storage system
FAST'13 Proceedings of the 11th USENIX conference on File and Storage Technologies
Hi-index | 0.00 |
Many discarded hard drives contain information that is both confidential and recoverable, as the authors' own experiment shows. The availability of this information is little publicized, but awareness of it will surely spread.