This paper presents a novel cryptographic capability system addressing the security and performance needs of network attached storage systems in which file management functions occur at a different location than the file storage device. In our NASD system file managers issue capabilities to client machines, which can then directly access files stored on the network attached storage device without intervention by a file server. These capabilities may be reused by the client, so that interaction with the file manager is kept to a minimum. Our system emphasizes performance and scalability while separating the roles of decision maker (issuing capabilities) and verifier (validating a capability). We have demonstrated our system with adaptations ...
Although cryptographic techniques areplaying an increasingly important role in modern computing syst...
Data on the file system in mobile internetworked working environments are exposed data to a number o...
Network-attached storage enables network-striped data transfers directly between client and storage ...
This paper presents a novel cryptographic capability system addressing the security and performance ...
(NASD) storage architecture, prototype implementations of NASD drives, array management for our arch...
The principal trend in the design of computer systems is the expectation of much greater computation...
Emerging applications such as data warehousing, multimedia content distribution, electronic commerce...
We have developed a scheme to secure networkattached storage systems against many types of attacks. ...
As storage interconnects evolve from single-host small-scale systems, such as traditional SCSI, to t...
We propose a practical and efficient method for adding security to network-attached disks (NADs). In...
We present an architecture for network authenticated disks that can be used to implement distributed...
Computer security is of growing importance in the increasingly networked computing environment.This ...
An architecture for network-authenticated disks that implements distributed file systems without fil...
Thesis (M.S.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer S...
The article provides a comparative analysis of the basic network protocols for accessing files in co...
Although cryptographic techniques areplaying an increasingly important role in modern computing syst...
Data on the file system in mobile internetworked working environments are exposed data to a number o...
Network-attached storage enables network-striped data transfers directly between client and storage ...
This paper presents a novel cryptographic capability system addressing the security and performance ...
(NASD) storage architecture, prototype implementations of NASD drives, array management for our arch...
The principal trend in the design of computer systems is the expectation of much greater computation...
Emerging applications such as data warehousing, multimedia content distribution, electronic commerce...
We have developed a scheme to secure networkattached storage systems against many types of attacks. ...
As storage interconnects evolve from single-host small-scale systems, such as traditional SCSI, to t...
We propose a practical and efficient method for adding security to network-attached disks (NADs). In...
We present an architecture for network authenticated disks that can be used to implement distributed...
Computer security is of growing importance in the increasingly networked computing environment.This ...
An architecture for network-authenticated disks that implements distributed file systems without fil...
Thesis (M.S.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer S...
The article provides a comparative analysis of the basic network protocols for accessing files in co...
Although cryptographic techniques areplaying an increasingly important role in modern computing syst...
Data on the file system in mobile internetworked working environments are exposed data to a number o...
Network-attached storage enables network-striped data transfers directly between client and storage ...