Sciweavers

171 search results - page 35 / 35
» Securing Provenance-Based Audits
Sort
View
79
Voted
USENIX
1994
14 years 10 months ago
Key Management in an Encrypting File System
As distributed computing systems grow in size, complexity and variety of application, the problem of protecting sensitive data from unauthorized disclosure and tampering becomes i...
Matt Blaze