Separating key management from file system security
- 12 December 1999
- proceedings article
- Published by Association for Computing Machinery (ACM)
- Vol. 33 (5) , 124-139
- https://doi.org/10.1145/319151.319160
Abstract
No abstract availableThis publication has 12 references indexed in Scilit:
- The Exact Security of Digital Signatures-How to Sign with RSA and RabinPublished by Springer Nature ,1996
- A coherent distributed file cache with directory write-behindACM Transactions on Computer Systems, 1994
- Authentication in the Taos operating systemACM Transactions on Computer Systems, 1994
- File-system development with stackable layersACM Transactions on Computer Systems, 1994
- Random oracles are practicalPublished by Association for Computing Machinery (ACM) ,1993
- Authentication in distributed systemsACM Transactions on Computer Systems, 1992
- The design and implementation of a log-structured file systemPublished by Association for Computing Machinery (ACM) ,1991
- Integrating security in a large distributed systemACM Transactions on Computer Systems, 1989
- Scale and performance in a distributed file systemACM Transactions on Computer Systems, 1988
- A Global Authentication Service without Global TrustPublished by Institute of Electrical and Electronics Engineers (IEEE) ,1986