Sciweavers

151 search results - page 7 / 31
» Unifying File System Protection
Sort
View
HICSS
2007
IEEE
171views Biometrics» more  HICSS 2007»
14 years 2 months ago
Unified Architecture for Large-Scale Attested Metering
We introduce a secure architecture called an attested meter for advanced metering that supports large-scale deployments, flexible configurations, and enhanced protection for consu...
Michael LeMay, George Gross, Carl A. Gunter, Sanja...
ICDE
2008
IEEE
129views Database» more  ICDE 2008»
15 years 7 days ago
Fuzzy Multi-Dimensional Search in the Wayfinder File System
With the explosion in the amount of semi-structured data users access and store, there is a need for complex search tools to retrieve often very heterogeneous data in a simple and ...
Amélie Marian, Christopher Peery, Thu D. Ng...
USENIX
1993
14 years 6 days ago
The Design and Implementation of the Inversion File System
This paper describes the design, implementation, and performance of the Inversion file system. Inversion provides a rich set of services to file system users, and manages a larg...
Michael A. Olson
CW
2005
IEEE
14 years 4 months ago
A Capability-Based Transparent Cryptographic File System
Data on the file system in mobile internetworked working environments are exposed data to a number of threats ranging from physical theft of storage devices to industrial espiona...
Frank Graf, Stephen D. Wolthusen
SACMAT
2003
ACM
14 years 4 months ago
Cryptographic access control in a distributed file system
Traditional access control mechanisms rely on a reference monitor to mediate access to protected resources. Reference monitors are inherently centralized and existing attempts to ...
Anthony Harrington, Christian Damsgaard Jensen