What people are saying - Write a review
We haven't found any reviews in the usual places.
Techniques and Applications
Verifiable Audit Trails for a Versioning File System
Storagebased File System Integrity Checker
2 other sections not shown
access control adversary algorithm allocated applications attacks audit authentication bits buffers cache checksums client computation overheads confidentiality copy database decrypt deleted distributed file system efficient encrypted data encryption scheme erasable memory fault tolerance Figure file server file system hardware hash function hash tree HMAC IEEE implementation inode input integrity assurance integrity checking integrity violations Kefence kernel logical disk material nodes metadata NASD network attached storage number of keys Operating Systems outsourced overheads owner password perfect secret sharing performance Plutus prefetching private key Proceedings protection protocol pseudo-random public key public-key cryptography Pvault entry re-encrypt redundancy replication request scenario secret recovery secret sharing schemes SecureParser share files signature storage blowup storage device storage systems stored symmetric key Symposium techniques threat modeling tion tuples UNIX untrusted Update USENIX user's verifiable secret sharing verify vmalloc