Protecting File Systems with Transient Authentication.
Mark D. CornerBrian D. NoblePublished in: Wirel. Networks (2005)
Keyphrases
- file system
- unauthorized access
- biometric authentication
- data transfer
- user authentication
- flash memory
- storage systems
- steady state
- access patterns
- storage devices
- access control
- multi tiered
- continuous media
- search tools
- application specific
- distributed data
- authentication mechanism
- security analysis
- image authentication
- authentication scheme
- database