Next: About this document ...
Up: Block-Level Security for Network-Attached
Previous: Acknowledgments
- 1
-
M. Bellare, R. Canetti, and H. Krawczyk.
Keying hash functions for message authentication.
Lecture Notes in CS, 1109:1-15, 1996.
- 2
-
A. D. Birrell and B. J. Nelson.
Implementing remote procedure calls.
ACM Transactions on Computer Systems, 2(1):39-59, February
1984.
- 3
-
Andrew D. Birrell.
Secure communication using remote procedure calls.
ACM Transactions on Computer Systems, 3(1):1-14, February
1985.
- 4
-
Burton Bloom.
Space/time trade-offs in hash coding with allowable errors.
Communications of ACM, 13(7):422-426, 1970.
- 5
-
W. Freeman and E. Miller.
Design for a decentralized security system for network-attached
storage.
In Proceedings of the 17th IEEE Symposium on Mass Storage
Systems and Technologies, pages 361-373, March 2000.
- 6
-
Eran Gabber and Abraham Silberschatz.
Agora: A minimal distributed protocol for electronic commerce.
In The Second USENIX Workshop on Electronic Commerce
Proceedings, pages 223-232, 1996.
- 7
-
G. Gibson, D. Nagle, K. Amiri, F. Chang, H. Gobioff, E. Riedel, D. Rochberg,
and J. Zelenka.
Filesystems for network-attached secure disks.
Technical Report CMU-CS-97-112, Carnegie Mellon, March 1997.
- 8
-
G. A. Gibson, D. F. Nagle, K. Amiri, J. Butler, Fay W. Chang, H. Gobioff,
C. Hardin, E. Riedel, D. Rochberg, and J. A. Zelenka.
Cost-effective, high-bandwidth storage architecture.
In Proceedings of the 8th Conf. on Architectural Support for
Programming Languages and Operating Systems, pages 92-103, October 1998.
- 9
-
Howard Gobioff.
Security for a High Performance Commodity Storage Subsystem.
PhD thesis, CMU, 1999.
- 10
-
Howard Gobioff, Garth Gibson, and Doug Tygar.
Security for network attached storage devices.
Technical Report CMU-CS-97-185, Carnegie Mellon, October 1997.
- 11
-
Kent Koeninger.
CXFS: A clustered SAN filesystem from SGI.
https://www.sgi.com/Products/PDF/2691.pdf.
- 12
-
Barbara Liskov, Liuba Shrira, and John Wroclawski.
Efficient at-most-once messages based on synchronized clocks.
ACM Transactions on Computer Systems, 9(2):125-142, May 1991.
- 13
-
D. Mazières and D. Shasha.
Don't trust your file server.
In Proceedings of the 8th IEEE Workshop on Hot Topics in
Operating Systems (HotOS-VIII), pages 99-104, May 2001.
- 14
-
M.K. McKusick, W.N. Joy, S.J. Leffler, and R.S. Fabry.
A fast file system for UNIX.
ACM Trans. on Computer Systems, 2(3):181-197, 1984.
- 15
-
Ethan L. Miller, William E. Freeman, Darrell D. E. Long, and Benjamin C. Reed.
Strong security for network-attached storage.
In Proceedings of the FAST 2002 Conference on File And Storage
Technologies, pages 1-14, January 2002.
- 16
-
S. Mittra and T. Woo.
A flow-based approach to datagram security.
In Proc. ACM SIGCOMM, 1997.
- 17
-
NIST.
Secure hash algorithm, 1995.
FIPS 180-1.
- 18
-
Matthew T. O'Keefe.
Shared file systems and Fibre Channel.
In Proceedings of the Sixth NASA Goddard Conference on Mass
Storage Systems, pages 1-16. IEEE Computer Society Press, 1998.
- 19
-
B. Reed, E. Chron, D. Long, and R. Burns.
Authenticating network attached storage.
IEEE Micro, 20(1), January 2000.
- 20
-
Hans Reiser.
Reiserfs v.3 whitepaper, 2000.
https://www.namesys.com/.
- 21
-
Erik Riedel, Mahesh Kallahalla, and Ram Swaminathan.
A framework for evaluating storage system security.
In Proceedings of the 1st Conference on File and Storage
Technologies (FAST), pages 15-30, January 2002.
- 22
-
R. Sandber, D. Goldberg, S. Kleiman, D. Walsh, and B. Lyon.
Design and implementation of the Sun network file system.
In Proceedings of USENIX Summer Conference, 1985.
- 23
-
Bruce Schneier.
Applied Cryptography.
John Wiley & Sons, 1996.
- 24
-
V. Srinivasan and J. C. Mogul.
Spritely NFS: Experiements with cache-consistency protocols.
In Proceedings of the Twelfth ACM Symposium on Operating Systems
Principles, pages 45-57, December 1989.
- 25
-
Tivoli.
Tivoli SANergy: Helping you reach your full SAN potential.
https://www.tivoli.com/products/documents/datasheets/sanergy_ds.pdf.
- 26
-
Rodney Van Meter, Gregory Finn, and Steven Hotz.
Derived virtual devices: A secure distributed file system mechanism.
In Ben Kobler, editor, Proc. Fifth NASA Goddard Conference on
Mass Storage Systems and Technologies, September 1996.
Mark Lillibridge
2003-01-06