C
search
search
reviewers
reviewers
feeds
feeds
assignments
assignments
settings
logout
IEEE Security in Storage Workshop
2002
2004
2005
2007
2002
2007
Keyphrases
Publications
2007
Boris Dolgunov
Enabling Optimal Security for Removable Storage Devices.
IEEE Security in Storage Workshop
(2007)
Fourth International IEEE Security in Storage Workshop, SISW 2007, San Diego, California, USA, September 27, 2007
IEEE Security in Storage Workshop
(2007)
Ramya Prabhakar
,
Seung Woo Son
,
Christina M. Patrick
,
Sri Hari Krishna Narayanan
,
Mahmut T. Kandemir
Securing Disk-Resident Data through Application Level Encryption.
IEEE Security in Storage Workshop
(2007)
V. Sriram
,
Ganesh M. Narayan
,
K. Gopinath
SAFIUS - A Secure and Accountable Filesystem over Untrusted Storage.
IEEE Security in Storage Workshop
(2007)
V. H. Gupta
,
K. Gopinath
VSR: An Information Theoretical Secure Verifiable Secret Redistribution Protocol for Long-term Archival Storage.
IEEE Security in Storage Workshop
(2007)
Erel Geron
,
Avishai Wool
CRUST: Cryptographic Remote Untrusted Storage without Public Keys.
IEEE Security in Storage Workshop
(2007)
Gaspare Sala
,
Daniele Sgandurra
,
Fabrizio Baiardi
Security and Integrity of a Distributed File Storage in a Virtual Environment.
IEEE Security in Storage Workshop
(2007)
2005
3rd International IEEE Security in Storage Workshop (SISW 2005), December 13, 2005, San Francisco, California, USA
IEEE Security in Storage Workshop
(2005)
Kevin M. Greenan
,
Mark W. Storer
,
Ethan L. Miller
,
Carlos Maltzahn
POTSHARDS : Storing Data for the Long-term Without Encryption.
IEEE Security in Storage Workshop
(2005)
Germano Caronni
,
Raphael Rom
,
Glenn Scott
Maintaining Object Ordering in a Shared P2P Storage Environment.
IEEE Security in Storage Workshop
(2005)
Patrick R. Eaton
,
Hakim Weatherspoon
,
John Kubiatowicz
Efficiently Binding Data to Owners in Distributed Content-Addressable Storage Systems.
IEEE Security in Storage Workshop
(2005)
Radia J. Perlman
File System Design with Assured Delete.
IEEE Security in Storage Workshop
(2005)
David A. McGrew
Efficient Authentication of Large, Dynamic Data Sets Using Galois/Counter Mode (GCM).
IEEE Security in Storage Workshop
(2005)
Xin Zhao
,
Kevin Borders
,
Atul Prakash
Towards Protecting Sensitive Files in a Compromised System.
IEEE Security in Storage Workshop
(2005)
Douglas Thain
,
Christopher Moretti
,
Paul Madrid
,
Philip Snowberger
,
Jeffrey Hemmes
The Consequences of Decentralized Security in a Cooperative Storage System.
IEEE Security in Storage Workshop
(2005)
Michael Backes
,
Christian Cachin
,
Alina Oprea
Lazy Revocation in Cryptographic File Systems.
IEEE Security in Storage Workshop
(2005)
Nikolai Joukov
,
Erez Zadok
Adding Secure Deletion to Your Favorite File System.
IEEE Security in Storage Workshop
(2005)
Jianjun Shen
,
Sihan Qing
,
Qingni Shen
,
Liping Li
Optimization of Covert Channel Identification.
IEEE Security in Storage Workshop
(2005)
Michael Factor
,
David Nagle
,
Dalit Naor
,
Erik Riedel
,
Julian Satran
The OSD Security Protocol.
IEEE Security in Storage Workshop
(2005)
2003
Michael Neve
,
Eric Peeters
,
David Samyde
,
Jean-Jacques Quisquater
Memories: A Survey of Their Secure Uses in Smart Cards.
IEEE Security in Storage Workshop
(2003)
Jianzhong Huang
,
Changsheng Xie
,
Bin Cai
Research and Implement of an Encrypted File System Used to NAS.
IEEE Security in Storage Workshop
(2003)
Ernesto Damiani
,
Sabrina De Capitani di Vimercati
,
Mario Finetti
,
Stefano Paraboschi
,
Pierangela Samarati
,
Sushil Jajodia
Implementation of a Storage Mechanism for Untrusted DBMSs.
IEEE Security in Storage Workshop
(2003)
2nd International IEEE Security in Storage Workshop (SISW 2003), Information Assurance, The Storage Security Perspective, 31 October 2003, Washington, DC, USA
IEEE Security in Storage Workshop
(2003)
Ludwig Seitz
,
Jean-Marc Pierson
,
Lionel Brunie
Key Management for Encrypted Data Storage in Distributed Systems.
IEEE Security in Storage Workshop
(2003)
Charles P. Wright
,
Jay Dave
,
Erez Zadok
Cryptographic File Systems Performance: What You Don't Know Can Hurt You.
IEEE Security in Storage Workshop
(2003)
Micah Beck
,
James S. Plank
,
Jeremy Millar
,
Scott Atchley
,
Stephen Soltesz
,
Alessandro Bassi
,
Huadong Liu
Information Security on the Logistical Network: An End-to-End Approach.
IEEE Security in Storage Workshop
(2003)
Yongge Wang
,
Yuliang Zheng
Fast and Secure Magnetic WORM Storage Systems.
IEEE Security in Storage Workshop
(2003)
Vishal Kher
,
Yongdae Kim
Decentralized Authentication Mechanisms for Object-based Storage Devices.
IEEE Security in Storage Workshop
(2003)
2002
Adrian Baldwin
,
Simon Shiu
Encryption and Key management in a SAN.
IEEE Security in Storage Workshop
(2002)
Donald Beaver
Network Security and Storage Security: Symmetries and Symmetry-Breaking.
IEEE Security in Storage Workshop
(2002)
Theodore M. Wong
,
Chenxi Wang
,
Jeannette M. Wing
Verifiable Secret Redistribution for Archive System.
IEEE Security in Storage Workshop
(2002)
Benjamin Reed
,
Mark A. Smith
,
Dejan Diklic
Security Considerations When Designing a Distributed File System Using Object Storage Devices.
IEEE Security in Storage Workshop
(2002)
Alain Azagury
,
Ran Canetti
,
Michael Factor
,
Shai Halevi
,
Ealan Henis
,
Dalit Naor
,
Noam Rinetzky
,
Ohad Rodeh
,
Julian Satran
A Two Layered Approach for Securing an Object Store Network.
IEEE Security in Storage Workshop
(2002)
Yongdae Kim
,
Maithili Narasimha
,
Fabio Maino
,
Gene Tsudik
Secure Group Services for Storage Area Networks.
IEEE Security in Storage Workshop
(2002)
David Samyde
,
Sergei P. Skorobogatov
,
Ross J. Anderson
,
Jean-Jacques Quisquater
On a New Way to Read Data from Memory.
IEEE Security in Storage Workshop
(2002)
Proceedings of the First International IEEE Security in Storage Workshop, SISW 2002, Greenbelt, Maryland, USA, December 11, 2002
IEEE Security in Storage Workshop
(2002)
Yevgeniy Dodis
,
Moti Yung
Exposure-Resilience for Free: The Hierarchical ID-based Encryption Case.
IEEE Security in Storage Workshop
(2002)
Axelle Apvrille
,
James Hughes
,
Vincent Girier
Streamed or Detached Triple Integrity for a Time Stamped Secure Storage System.
IEEE Security in Storage Workshop
(2002)
Shuang-Yi Tang
,
Ying-Ping Lu
,
David Hung-Chang Du
Performance Study of Software-Based iSCSI Security.
IEEE Security in Storage Workshop
(2002)