Sciweavers

192 search results - page 1 / 39
» Self-Securing Storage: Protecting Data in Compromised System...
Sort
View
OSDI
2000
ACM
13 years 6 months ago
Self-Securing Storage: Protecting Data in Compromised Systems
John D. Strunk, Garth R. Goodson, Michael L. Schei...
ACSAC
2010
IEEE
13 years 3 months ago
Keeping data secret under full compromise using porter devices
We address the problem of confidentiality in scenarios where the attacker is not only able to observe the communication between principals, but can also fully compromise the commu...
Christina Pöpper, David A. Basin, Srdjan Capk...
SISW
2005
IEEE
13 years 10 months ago
Towards Protecting Sensitive Files in a Compromised System
Protecting sensitive files from a compromised system helps administrator to thwart many attacks, discover intrusion trails, and fast restore the system to a safe state. However, ...
Xin Zhao, Kevin Borders, Atul Prakash
IPPS
2007
IEEE
13 years 11 months ago
Design Alternatives for a High-Performance Self-Securing Ethernet Network Interface
This paper presents and evaluates a strategy for integrating the Snort network intrusion detection system into a high-performance programmable Ethernet network interface card (NIC...
Derek L. Schuff, Vijay S. Pai
MSS
2005
IEEE
84views Hardware» more  MSS 2005»
13 years 11 months ago
Storage-Based Intrusion Detection for Storage Area Networks (SANs)
Storage systems are the next frontier for providing protection against intrusion. Since storage systems see changes to persistent data, several types of intrusions can be detected...
Mohammad Banikazemi, Dan E. Poff, Bülent Abal...