Sciweavers

151 search results - page 7 / 31
» Unifying File System Protection
Sort
View
HICSS
2007
IEEE
171views Biometrics» more  HICSS 2007»
15 years 1 months ago
Unified Architecture for Large-Scale Attested Metering
We introduce a secure architecture called an attested meter for advanced metering that supports large-scale deployments, flexible configurations, and enhanced protection for consu...
Michael LeMay, George Gross, Carl A. Gunter, Sanja...
ICDE
2008
IEEE
129views Database» more  ICDE 2008»
15 years 11 months ago
Fuzzy Multi-Dimensional Search in the Wayfinder File System
With the explosion in the amount of semi-structured data users access and store, there is a need for complex search tools to retrieve often very heterogeneous data in a simple and ...
Amélie Marian, Christopher Peery, Thu D. Ng...
USENIX
1993
14 years 10 months ago
The Design and Implementation of the Inversion File System
This paper describes the design, implementation, and performance of the Inversion file system. Inversion provides a rich set of services to file system users, and manages a larg...
Michael A. Olson
91
Voted
CW
2005
IEEE
15 years 3 months ago
A Capability-Based Transparent Cryptographic File System
Data on the file system in mobile internetworked working environments are exposed data to a number of threats ranging from physical theft of storage devices to industrial espiona...
Frank Graf, Stephen D. Wolthusen
85
Voted
SACMAT
2003
ACM
15 years 2 months ago
Cryptographic access control in a distributed file system
Traditional access control mechanisms rely on a reference monitor to mediate access to protected resources. Reference monitors are inherently centralized and existing attempts to ...
Anthony Harrington, Christian Damsgaard Jensen