Although cryptographic techniques areplaying an increasingly important role in modern computing system security,userlevel tools for encrypting file data arecumbersome and suffer from a number of inherent vulnerabilities. The Cryptographic File System (CFS) pushes encryption services into the file system itself. CFS supports securestorage at the system level through a standardUnix file system interface to encrypted files. Users associate a cryptographic key with the directories they wish to protect. Files in these directories (as well as their pathname components) aretransparently encrypted and decrypted with the specified key without further user intervention; cleartext is never stored on a disk or sent to a remote file server.CFS can use a...
Passwords in the UNIX operating system are encrypted with the crypt algorithm and kept in the public...
Securing file resources under Linux is a team effort. No one library, application, or kernel feature...
This paper focuses on security of information saved on hard disk drives using encryption. The posibi...
Although cryptographic techniques areplaying an increasingly important role in modern computing syst...
Part 3: Invited Keynote PapersInternational audienceFor the reasons of flexibility and availability,...
Thesis (M.S.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer S...
Data encryption has become an increasingly important factor in everyday work. Users seek a method of...
Abstract — Many organizations have great deal of confidential information which is stored on compute...
File System is an important component of a secure operating system. The need to build data protectio...
As distributed computing systems grow in size, complexity and variety of application, the problem of...
Often, increased security comes at the expense of user convenience, performance, or compatibility wi...
We have developed a scheme to secure networkattached storage systems against many types of attacks. ...
Although storing information securely is one of the most important roles expected for computer syste...
This thesis is about encrypted filesystems and is aimed mainly for Linux solutions. At first there i...
Abstract—Governments, military, different private organiza-tions, financial institutions and hospita...
Passwords in the UNIX operating system are encrypted with the crypt algorithm and kept in the public...
Securing file resources under Linux is a team effort. No one library, application, or kernel feature...
This paper focuses on security of information saved on hard disk drives using encryption. The posibi...
Although cryptographic techniques areplaying an increasingly important role in modern computing syst...
Part 3: Invited Keynote PapersInternational audienceFor the reasons of flexibility and availability,...
Thesis (M.S.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer S...
Data encryption has become an increasingly important factor in everyday work. Users seek a method of...
Abstract — Many organizations have great deal of confidential information which is stored on compute...
File System is an important component of a secure operating system. The need to build data protectio...
As distributed computing systems grow in size, complexity and variety of application, the problem of...
Often, increased security comes at the expense of user convenience, performance, or compatibility wi...
We have developed a scheme to secure networkattached storage systems against many types of attacks. ...
Although storing information securely is one of the most important roles expected for computer syste...
This thesis is about encrypted filesystems and is aimed mainly for Linux solutions. At first there i...
Abstract—Governments, military, different private organiza-tions, financial institutions and hospita...
Passwords in the UNIX operating system are encrypted with the crypt algorithm and kept in the public...
Securing file resources under Linux is a team effort. No one library, application, or kernel feature...
This paper focuses on security of information saved on hard disk drives using encryption. The posibi...