Petascale, high-performance file systems often hold sensitive data and thus require security, but authentication and authorization can dramatically reduce performance. Existing security solutions perform poorly in these environments because they cannot scale with the number of nodes, highly distributed data, and demanding workloads. To address these issues, we developed Maat, a security protocol designed to provide strong, scalable security to these systems. Maat introduces three new techniques. Extended capabilities limit the number of capabilities needed by allowing a capa bility to authorize I/O for any number of client-file pairs. Automatic Revocation uses short capability lifetimes to allow capability expiration to act as global revocat...
File systems provide an interface for applications to obtain exclusive access to files, in which a p...
Many applications require the ability to obtain exclu-sive access to data, where an application is g...
While using the growing utilization of very network-attached storage systems, several works has focu...
This paper describes DSFS, a decentralized security system for large parallel file system. DSFS stor...
As the size and scale of supercomputers continues to increase at an exponential rate the numbe...
Emerging applications such as data warehousing, multimedia content distribution, electronic commerce...
Scalable atomic and parallel access to noncontiguous regions of a file is essential to exploit high ...
We have developed a scheme to secure networkattached storage systems against many types of attacks. ...
This presentation will present a pragmatic security approach that could be used to systems that proc...
CMU-CS-87-143f i) Many distributed systems manage some form of long-lived data, such as files or dat...
We develop IDEAS, an identity-based security architecture for large-scale and high-performance stora...
Abstract. In this paper we present the design of a scalable and secure cryptographic service that ca...
When using the growing use of very network-attached storage systems, several works has focussed on s...
File systems provide an interface for applications to obtain exclusive access to files, in which a p...
We study the problem of key establishment for secure many-to-many communications. The problem is ins...
File systems provide an interface for applications to obtain exclusive access to files, in which a p...
Many applications require the ability to obtain exclu-sive access to data, where an application is g...
While using the growing utilization of very network-attached storage systems, several works has focu...
This paper describes DSFS, a decentralized security system for large parallel file system. DSFS stor...
As the size and scale of supercomputers continues to increase at an exponential rate the numbe...
Emerging applications such as data warehousing, multimedia content distribution, electronic commerce...
Scalable atomic and parallel access to noncontiguous regions of a file is essential to exploit high ...
We have developed a scheme to secure networkattached storage systems against many types of attacks. ...
This presentation will present a pragmatic security approach that could be used to systems that proc...
CMU-CS-87-143f i) Many distributed systems manage some form of long-lived data, such as files or dat...
We develop IDEAS, an identity-based security architecture for large-scale and high-performance stora...
Abstract. In this paper we present the design of a scalable and secure cryptographic service that ca...
When using the growing use of very network-attached storage systems, several works has focussed on s...
File systems provide an interface for applications to obtain exclusive access to files, in which a p...
We study the problem of key establishment for secure many-to-many communications. The problem is ins...
File systems provide an interface for applications to obtain exclusive access to files, in which a p...
Many applications require the ability to obtain exclu-sive access to data, where an application is g...
While using the growing utilization of very network-attached storage systems, several works has focu...