Sciweavers

171 search results - page 35 / 35
» Securing Provenance-Based Audits
Sort
View
USENIX
1994
13 years 6 months ago
Key Management in an Encrypting File System
As distributed computing systems grow in size, complexity and variety of application, the problem of protecting sensitive data from unauthorized disclosure and tampering becomes i...
Matt Blaze