Sciweavers

72 search results - page 4 / 15
» Securing sensitive content in a view-only file system
Sort
View
USS
2010
13 years 4 months ago
AdJail: Practical Enforcement of Confidentiality and Integrity Policies on Web Advertisements
Web publishers frequently integrate third-party advertisements into web pages that also contain sensitive publisher data and end-user personal data. This practice exposes sensitiv...
Mike Ter Louw, Karthik Thotta Ganesh, V. N. Venkat...
USENIX
1994
13 years 7 months ago
Key Management in an Encrypting File System
As distributed computing systems grow in size, complexity and variety of application, the problem of protecting sensitive data from unauthorized disclosure and tampering becomes i...
Matt Blaze
USS
2008
13 years 8 months ago
Defeating Encrypted and Deniable File Systems: TrueCrypt v5.1a and the Case of the Tattling OS and Applications
We examine the security requirements for creating a Deniable File System (DFS), and the efficacy with which the TrueCrypt disk-encryption software meets those requirements. We fin...
Alexei Czeskis, David J. St. Hilaire, Karl Koscher...
KES
2005
Springer
13 years 12 months ago
A Preliminary Design for a Privacy-Friendly Free P2P Media File Distribution System
In most P2P business models, in which users purchase the media, it is necessary to securely identify the user in order to facilitate payment. In this paper, we present a technique ...
Ron G. van Schyndel
JSW
2007
90views more  JSW 2007»
13 years 6 months ago
Fine-Grained and Scalable Message Protection in Sensitive Organizations
Abstract— Today electronic messaging services are indispensable to individuals and organizations. If a message contains sensitive information, the integrity and confidentiality ...
Joon S. Park, Ganesh Devarajan