Abstract. We model networked storage systems with distributed, cryptographically enforced file-access control in an applied pi calculus. The calculus contains cryptographic primitives and supports file-system constructs, including access revocation. We establish that the networked storage systems implement simpler, centralized storage specifications with local access-control checks. More specifically, we prove that the former systems preserve safety properties of the latter systems. Focusing on security, we then derive strong secrecy and integrity guarantees for the networked storage systems.
In this paper we propose a protocol that allows end-users in a decentralized setup (without requirin...
The Internet enables global sharing of data across organizational boundaries. Traditional access con...
Cryptographic access control promises to offer easily distributed trust and broader applicability, w...
We study some of the concepts, protocols, and algorithms for access control in distributed systems, ...
We have developed a scheme to secure networkattached storage systems against many types of attacks. ...
Traditional access control mechanisms rely on a reference monitor to mediate access to protected res...
Formal techniques have played a significant role in the study of secure communication in recent year...
Abstract—We present the design and implementation of PCFS, a file system that adapts proof-carrying ...
We present an architecture for network authenticated disks that can be used to implement distributed...
Abstract A crucial element of distributed cryptographic file systems are key management solutions th...
Abstract. In computing systems, trust is an expectation on the dynamic behavior of an agent; static ...
In a distributed file system built on network attached storage, client computers access data directl...
We initiate a program to develop a principled the-ory of secure systems. Our main technical result i...
Many applications require the ability to obtain exclu-sive access to data, where an application is g...
We study some of the concepts, protocols, and algorithms for access control in distributed systems, ...
In this paper we propose a protocol that allows end-users in a decentralized setup (without requirin...
The Internet enables global sharing of data across organizational boundaries. Traditional access con...
Cryptographic access control promises to offer easily distributed trust and broader applicability, w...
We study some of the concepts, protocols, and algorithms for access control in distributed systems, ...
We have developed a scheme to secure networkattached storage systems against many types of attacks. ...
Traditional access control mechanisms rely on a reference monitor to mediate access to protected res...
Formal techniques have played a significant role in the study of secure communication in recent year...
Abstract—We present the design and implementation of PCFS, a file system that adapts proof-carrying ...
We present an architecture for network authenticated disks that can be used to implement distributed...
Abstract A crucial element of distributed cryptographic file systems are key management solutions th...
Abstract. In computing systems, trust is an expectation on the dynamic behavior of an agent; static ...
In a distributed file system built on network attached storage, client computers access data directl...
We initiate a program to develop a principled the-ory of secure systems. Our main technical result i...
Many applications require the ability to obtain exclu-sive access to data, where an application is g...
We study some of the concepts, protocols, and algorithms for access control in distributed systems, ...
In this paper we propose a protocol that allows end-users in a decentralized setup (without requirin...
The Internet enables global sharing of data across organizational boundaries. Traditional access con...
Cryptographic access control promises to offer easily distributed trust and broader applicability, w...