Connection to the Internet becomes common in many households. Many people use connection to Internet during their ways too, so the access to remote files is required more than before. The one of aims of this thesis is an analysis of available possibilities for network file sharing including their security considerations. Available possibilities include protocols such as SMB/CIFS, AFS, NFS, … and applications that offer other functionality instead of one of previous protocol implementation. The next aim is a draft of new protocol for secure file sharing. This protocol doesn't depend on any operating system. This protocol is implemented in Windows environment and supports active access to remote files
In untrusted and trusted computing environments, the problem of secure file transfer between various...
Computer technology has grown at a pace unrivaled by that of any other technology in history. Couple...
This master’s thesis is devoted to safe operating remote station. The security of data and electroni...
Connection to the Internet becomes common in many households. Many people use connection to Internet...
Summary Paper deals with common protocol for distributed network file system. Focus is on CIFS proto...
Technological trends such as the availability of mobile computers and the expanding network infrastr...
The goal of this diploma thesis was to implement a service, which allows users to save and share dat...
ABSTRACT: Today‟s economy is increasingly based on information flow. Getting the right information t...
Data on the file system in mobile internetworked working environments are exposed data to a number o...
This paper deals with defining and implementing high-level protocols for computer networks, a subjec...
We have developed a scheme to secure networkattached storage systems against many types of attacks. ...
Sharing of files is a major application of computer networks, with examples ranging from LAN-based n...
(eng) This paper presents the implementation of the ORFA client. ORFA aims at providing an efficient...
This thesis will present an approach on how to build a system to exchange files stored in the 'cloud...
Abstract- The popularity of wireless services is increasing in the recent years, especially accessin...
In untrusted and trusted computing environments, the problem of secure file transfer between various...
Computer technology has grown at a pace unrivaled by that of any other technology in history. Couple...
This master’s thesis is devoted to safe operating remote station. The security of data and electroni...
Connection to the Internet becomes common in many households. Many people use connection to Internet...
Summary Paper deals with common protocol for distributed network file system. Focus is on CIFS proto...
Technological trends such as the availability of mobile computers and the expanding network infrastr...
The goal of this diploma thesis was to implement a service, which allows users to save and share dat...
ABSTRACT: Today‟s economy is increasingly based on information flow. Getting the right information t...
Data on the file system in mobile internetworked working environments are exposed data to a number o...
This paper deals with defining and implementing high-level protocols for computer networks, a subjec...
We have developed a scheme to secure networkattached storage systems against many types of attacks. ...
Sharing of files is a major application of computer networks, with examples ranging from LAN-based n...
(eng) This paper presents the implementation of the ORFA client. ORFA aims at providing an efficient...
This thesis will present an approach on how to build a system to exchange files stored in the 'cloud...
Abstract- The popularity of wireless services is increasing in the recent years, especially accessin...
In untrusted and trusted computing environments, the problem of secure file transfer between various...
Computer technology has grown at a pace unrivaled by that of any other technology in history. Couple...
This master’s thesis is devoted to safe operating remote station. The security of data and electroni...