Default Cover Image

Proceedings First International IEEE Security in Storage Workshop

Dec. 11 2002 to Dec. 11 2002

Greenbelt, MD, USA

Table of Contents

Program CommitteeFreely available from IEEE.pp. viii
Introduction and Motivation
Network Security and Storage Security: Symmetries and Symmetry-BreakingFull-text access may be available. Sign in or learn about subscription options.pp. 3
Introduction and Motivation
A Two Layered Approach for Securing an Object Store NetworkFull-text access may be available. Sign in or learn about subscription options.pp. 10
Introduction and Motivation
Security Considerations When Designing a Distributed File System Using Object Storage DevicesFull-text access may be available. Sign in or learn about subscription options.pp. 24
Introduction and Motivation
Encryption and Key management in a SANFull-text access may be available. Sign in or learn about subscription options.pp. 35
Introduction and Motivation
Exposure-Resilience for Free: The Hierarchical ID-based Encryption CaseFull-text access may be available. Sign in or learn about subscription options.pp. 45
Introduction and Motivation
Streamed or Detached Triple Integrity for a Time Stamped Secure Storage SystemFull-text access may be available. Sign in or learn about subscription options.pp. 53
Introduction and Motivation
On a New Way to Read Data from MemoryFull-text access may be available. Sign in or learn about subscription options.pp. 65
Introduction and Motivation
Performance Study of Software-Based iSCSI SecurityFull-text access may be available. Sign in or learn about subscription options.pp. 70
Introduction and Motivation
Secure Group Services for Storage Area NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 80
Introduction and Motivation
Verifiable Secret Redistribution for Archive SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 94
Introduction and Motivation
Author's IndexFreely available from IEEE.pp. 107
Showing 13 out of 13